|
1 | 1 | <div class="flex-container"> |
2 | 2 | <img src="https://github.com/ProfessionalLinuxUsersGroup/img/blob/main/Assets/Logos/ProLUG_Round_Transparent_LOGO.png?raw=true" width="64" height="64"></img> |
3 | 3 | <p> |
4 | | - <h1>Under Construction</h1> |
| 4 | + <h1>Unit 9 Worksheet - Certificate and Key Madness</h1> |
5 | 5 | </p> |
6 | 6 | </div> |
| 7 | + |
| 8 | +## Instructions |
| 9 | + |
| 10 | +--- |
| 11 | + |
| 12 | +Fill out this sheet as you progress through the lab and discussions. Hold your worksheets until |
| 13 | +the end to turn them in as a final submission packet. |
| 14 | + |
| 15 | +### Resources / Important Links |
| 16 | + |
| 17 | +- <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf/> |
| 18 | +- <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf/> |
| 19 | +- <https://www.sans.org/information-security-policy/> |
| 20 | +- <https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/> |
| 21 | +- <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf> |
| 22 | +- <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf> |
| 23 | + |
| 24 | + |
| 25 | +#### Downloads |
| 26 | + |
| 27 | +The worksheet has been provided below. The document(s) can be transposed to |
| 28 | +the desired format so long as the content is preserved. For example, the `.txt` |
| 29 | +could be transposed to a `.md` file. |
| 30 | + |
| 31 | +- <a href="./assets/downloads/u9/u9_worksheet.txt" target="_blank" download>📥 u9_worksheet(`.txt`)</a> |
| 32 | +- <a href="./assets/downloads/u9/u9_worksheet.pdf" target="_blank" download>📥 u9_worksheet(`.pdf`)</a> |
| 33 | + |
| 34 | +### Unit 9 Recording |
| 35 | + |
| 36 | +- Coming Soon |
| 37 | + |
| 38 | +#### Discussion Post #1 |
| 39 | + |
| 40 | +Read the Security Services section, pages 22-23 of |
| 41 | +https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf and |
| 42 | +answer the following questions. |
| 43 | + |
| 44 | +1. How do these topics align with what you already know about system security? |
| 45 | + |
| 46 | +2. Were any of the terms or concepts new to you? |
| 47 | + |
| 48 | +<div class="warning"> |
| 49 | + |
| 50 | +Submit your input by following the link below. |
| 51 | + |
| 52 | +The discussion posts are done in Discord Forums. |
| 53 | + |
| 54 | +</div> |
| 55 | + |
| 56 | +- [Link to Discussion Forum](https://discord.com/channels/611027490848374811/1377483939706310736) |
| 57 | + |
| 58 | +#### Discussion Post #2 |
| 59 | + |
| 60 | +Review the TLS Overview section, pages 4-7 of https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf and answer the following questions. |
| 61 | + |
| 62 | +1. What are the three subprotocols of TLS? |
| 63 | + |
| 64 | +2. How does TLS apply |
| 65 | + |
| 66 | + - Confidentiality |
| 67 | + - Integrity |
| 68 | + - Authentication |
| 69 | + - Anti-replay |
| 70 | + |
| 71 | +<div class="warning"> |
| 72 | + |
| 73 | +Submit your input by following the link below. |
| 74 | + |
| 75 | +The discussion posts are done in Discord Forums. |
| 76 | + |
| 77 | +</div> |
| 78 | + |
| 79 | +- [Link to Discussion Forum](https://discord.com/channels/611027490848374811/1377484046757662801) |
| 80 | + |
| 81 | +## Definitions |
| 82 | + |
| 83 | +--- |
| 84 | + |
| 85 | +- TLS |
| 86 | +- Symmetric Keys |
| 87 | +- Asymmetric Keys |
| 88 | +- Non-Repudiation |
| 89 | +- Anti-Replay |
| 90 | +- Plaintext |
| 91 | +- Cyphertext |
| 92 | +- Fingerprints |
| 93 | +- Passphrase (in key generation) |
| 94 | + |
| 95 | +## Digging Deeper |
| 96 | + |
| 97 | +--- |
| 98 | + |
| 99 | +1. Finish reading about TLS in the publication and think about where you might apply it. |
| 100 | + |
| 101 | +## Reflection Questions |
| 102 | + |
| 103 | +--- |
| 104 | + |
| 105 | +1. What were newer topics to you, or alternatively what was a new application of |
| 106 | +something you already had heard about? |
| 107 | + |
| 108 | +2. What questions do you still have about this week? |
| 109 | + |
| 110 | +3. How are you going to use what you've learned in your current role? |
0 commit comments