SRT621 - Advanced Scripting

Outline info
Semester
School
Last revision date 2020-10-30 11:39:04.708
Last review date 2020-10-30 11:39:04.709


Subject Title
Advanced Scripting

Subject Description
Security professionals use scripting languages and software tools to automate tasks and to make their work scalable. Frequently, they find themselves in situations where off-the-shelf tools cannot do the job, and they are forced to create their own. In this class students will learn proper coding techniques, object-oriented programming, and basic algorithm development. They will build real world, scalable tools for use as a security professional.

Credit Status
one credit

Learning Outcomes
Upon successful completion of this subject the student will be able to:

  • Describe the Secure Software Development Lifecycle to implement software using the secure software development process
  • Develop software according to good practices applicable in all high-level languages to develop maintainable applications
  • Utilize the fundamentals of algorithmic complexity to develop efficient applications
  • Design applications using appropriate data structures to organize, represent, and manipulate data in an effective way.
  • Apply the modular approach to produce maintainable, documented and tested software
  • Design security software tools to automate repeatable tasks
  • Adapt existing security tools to meet changing needs

Essential Employability Skills

    •  Communicate clearly, concisely and correctly in the written, spoken and visual form that fulfils the purpose and meets the needs of the audience.

    •  Respond to written, spoken, or visual messages in a manner that ensures effective communication.

    •  Execute mathematical operations accurately.

    •  Apply a systematic approach to solve problems.

    •  Use a variety of thinking skills to anticipate and solve problems.

    •  Locate, select, organize, and document information using appropriate technology and information systems.

    •  Analyze, evaluate, and apply relevant information from a variety of sources.

    •  Show respect for diverse opinions, values, belief systems, and contributions of others.

    •  Interact with others in groups or teams in ways that contribute to effective working relationships and the achievement of goals.

    •  Manage the use of time and other resources to complete projects.

    •  Take responsibility for one's own actions, decisions, and consequences.

Academic Integrity
Seneca upholds a learning community that values academic integrity, honesty, fairness, trust, respect, responsibility and courage. These values enhance Seneca's commitment to deliver high-quality education and teaching excellence, while supporting a positive learning environment. Ensure that you are aware of Seneca's Academic Integrity Policy which can be found at: http://www.senecapolytechnic.ca/about/policies/academic-integrity-policy.html Review section 2 of the policy for details regarding approaches to supporting integrity. Section 2.3 and Appendix B of the policy describe various sanctions that can be applied, if there is suspected academic misconduct (e.g., contract cheating, cheating, falsification, impersonation or plagiarism).

Please visit the Academic Integrity website http://open2.senecac.on.ca/sites/academic-integrity/for-students to understand and learn more about how to prepare and submit work so that it supports academic integrity, and to avoid academic misconduct.

Discrimination/Harassment
All students and employees have the right to study and work in an environment that is free from discrimination and/or harassment. Language or activities that defeat this objective violate the College Policy on Discrimination/Harassment and shall not be tolerated. Information and assistance are available from the Student Conduct Office at student.conduct@senecapolytechnic.ca.

Accommodation for Students with Disabilities
The College will provide reasonable accommodation to students with disabilities in order to promote academic success. If you require accommodation, contact the Counselling and Accessibility Services Office at ext. 22900 to initiate the process for documenting, assessing and implementing your individual accommodation needs.

Camera Use and Recordings - Synchronous (Live) Classes
Synchronous (live) classes may be delivered in person, in a Flexible Learning space, or online through a Seneca web conferencing platform such as MS Teams or Zoom. Flexible Learning spaces are equipped with cameras, microphones, monitors and speakers that capture and stream instructor and student interactions, providing an in-person experience for students choosing to study online.

Students joining a live class online may be required to have a working camera in order to participate, or for certain activities (e.g. group work, assessments), and high-speed broadband access (e.g. Cable, DSL) is highly recommended. In the event students encounter circumstances that impact their ability to join the platform with their camera on, they should reach out to the professor to discuss. Live classes may be recorded and made available to students to support access to course content and promote student learning and success.

By attending live classes, students are consenting to the collection and use of their personal information for the purposes of administering the class and associated coursework. To learn more about Seneca's privacy practices, visit Privacy Notice.

Prerequisite(s)
n/a

Topic Outline

  • Introduction
  • General programing
    • Algorithms and complexity
    • Strategy
    • Software design
    • Best practices
  • Security programing
  • Offensive security
  • Forensic investigation
  • Network traffic analysis
  • Wireless
  • Vulnerability assessment
  • Task automation
  • Classes, multiple files, etc
  • Development practices, software maintainability
  • Data structures
  • Develop software for automation of security tasks

Mode of Instruction
A variety of instructional techniques will be used including interactive media-rich lectures, problem-based learning, and computer-based lab exercises. Students will build software tools which they can use in a complex simulated environment in an isolated security lab.

Prescribed Texts
Computer Science Distilled: Learn the Art of Solving Computational Problems
by Wladston Ferreira Filho (Author), Raimondo Pictet (Editor)
Publisher: Code Energy LLC (Jan. 17 2017)
ISBN-13: 978-0997316025
 
Introduction to Computation and Programming Using Python
by John V. Guttag
Publisher: The MIT Press (2013)
ISBN:  978-0-262-52500-8 
 

Reference Material
Gray Hat C#: A Hacker’s Guide to Creating and Automating Security Tools
By Brandon Perry
Publisher: No Starch Press (2017)
ISBN: 978-1-59327-759-8
 
Black Hat Python: Python Programming for Hackers and Pentesters
by Justin Seitz
Publisher: No Starch Press; 1 edition (Dec 21 2014)
ISBN: 978-1593275907
 
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
by TJ O'Connor
Publisher: Syngress; 1 edition (Nov. 22 2012)
ISBN: 978-1597499576

Required Supplies
n/a

Student Progression and Promotion Policy
http://www.senecapolytechnic.ca/about/policies/student-progression-and-promotion-policy.html

Grading Policyhttp://www.senecapolytechnic.ca/about/policies/grading-policy.html)

A+90%  to  100%
A80%  to  89%
B+75%  to  79%
B70%  to  74%
C+65%  to  69%
C60%  to  64%
D+55%  to  59%
D50%  to  54%
F0%    to  49% (Not a Pass)
OR
EXCExcellent
SATSatisfactory
UNSATUnsatisfactory

For further information, see a copy of the Academic Policy, available online (http://www.senecapolytechnic.ca/about/policies/academics-and-student-services.html) or at Seneca's Registrar's Offices.(https://www.senecapolytechnic.ca/registrar.html)


Modes of Evaluation
Practical Test(s )       (minimum of one) 30%
Assignments (minimum of 2)                 20%     
Labs   (minimum of 8)                            20%
Final                                                       30%


 
 

Approved by: Suzanne Abraham