Comptia Security+ Eckel Technology Consultants. Introduction  Netlearn IT training and Consulting LLC.  Specializing in :  Comptia Training  Novell.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Security Issues and Challenges in Cloud Computing
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Network security threats and mitigation Unit objectives Explain common threats and vulnerabilities Explain common mitigation techniques Categorize different.
Securing Information Systems
Chapter Three. Which of the following protocols is a file transfer protocol using SSH? A.SFTP B.TFTP C.SICMP D.CCMP.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Software Security Testing Vinay Srinivasan cell:
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Systems Security Operations Security Domain #9.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Frontline Enterprise Security
Exam 2 Review INFS 6301 Fall Exam Information  Chapters 7 – 11 & 15 and online content  Structure  50 multiple choice (1.5 points each / 75 points.
CS/IS 196 Final Exam Review Final Exam: Wednesday, December 16.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
Chapter 1: Modern Network Security Threats
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
SY0-401 COMPTIA Security+ Certification Exam Vcepracticetest.com.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
CompTIA Security+ Question Answer SY Detaille of CompTIA SY0-401 Pass4sure.. VENDOR COMPTIA EXAM NAME COMPTIA SECURITY+ EXAM CODE SY0-401 TOTAL.
CHAPTER THREE TEST REVIEW COMPTIA SECURITY+ SYO-401.
CHAPTER 7: IDENTIFYING ADVANCED ATTACKS McKinley Technology HS - Cybersecurity.
Chapter 4 Review McKinley Technology High School – Ms. Wiscount.
CompTIA Security+ Study Guide (SY0-401) Chapter 9: Malware, Vulnerabilities, and Threats.
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
Module 5: Designing Physical Security for Network Resources
CompTIA Security+ Chapter 5 Test Review
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-401)
Risk management.
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Chapter 7: Identifying Advanced Attacks
Chapter 6 Application Hardening
CompTIA Security+ SY0-401 Real Exam Question Answer
Instructor Materials Chapter 7 Network Security
1.
Secure Software Confidentiality Integrity Data Security Authentication
100% Exam Passing Guarantee & Money Back Assurance
Securing the Network Perimeter with ISA 2004
CompTIA Security+ Study Guide (SY0-401)
Business Risks of Insecure Networks
Securing Information Systems
CompTIA Security+ Study Guide (SY0-401)
Introduction to Security: Modern Network Security Threats
CompTIA Security+ Study Guide (SY0-401)
Cloud Testing Shilpi Chugh.
Microsoft Dumps PDF CompTIA SY0-501 Dumps PDF CompTIA Security+ Certification RealExamCollection.com.
CompTIA Security+ Study Guide (SY0-501)
Cybersecurity Strategy
CompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501)
سمینار آموزشی امنیت شبکه
برنامج أمن أنظمة الحاسب
CS/IS 196 Final Exam Review
Implementing Client Security on Windows 2000 and Windows XP Level 150
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

Comptia Security+ Eckel Technology Consultants

Introduction  Netlearn IT training and Consulting LLC.  Specializing in :  Comptia Training  Novell Suse Linux Training  Linux Consulting  Citrix Xenserver Consulting

Partners  Citrix  Comptia  Novell  Phd Virtual Backup Solutions  Vmware  Symantec

Contact Information  Kevin Eckel   1239 Bower Hill Rd.  Pittsburgh PA  Phone  Fax

The Exam SY0-201  Time: 90 minutes  Number of Questions: 100  Passing Score: 750 /1000  Some Beta Questions which do not count towards your score  Exam Format: Multiple choice where you chose the best answer (radio buttons) or multiple correct answers ( square )

Tested Material Breakdown  Network Security 21%  Compliance and Operational Security 18%  Threats and Vulnerabilities 21%  Application, Data and Host Security 16%  Access Control 13%  Cryptography 11%

Objectives  Network Security  Network Devices  Firewalls  Routers  Switches  Load Balancers  Proxies  Web Security Gateways  VPN Concentrators  NIDS and NIPS ( Behavior, signature and anamoly, Heuristic )  Protocol Analyzers  Spam filters  Web Application Filters  URL filtering

Network Security Cont.  Implementation  Rule based  Vlans  ACLs  Port Security  Wireless  Flood Guards  Loop Protection  Implicit Deny  Log Analysis

Network Security Cont. 2  Network Design Elements  DMZ  Subnet  Vlan  Nat  Remote Access Control  NAC  Virtulization  Cloud Computing ( PAAS, SAAS, IAAS )

Wireless  Wireless Protocols  WEP,WPA,WPA2,EAP,PEAP  Wireless Security  Mac Filtering  SSID  TKIP  CCMP  Antenna Placement  Power Level Controls

Compliance and Operational Security  Control Types  Technical  Management  Operational  False Positives  Policies  Privacy  Acceptable Use  Security  Mandatory Vacations  Job Rotation  Separation of Duties  Least Privilege

Risk Calculation  Likelihood  ALE  Impact  Quantitative VS Qualitative  Risk Management Procedures  Avoidance  Transference  Acceptance  Mitigation  Deterence

Basic Forensics  Order of volatility  Capture System Image  Network Traffic and Logs  Capture Video  Record Time Offset  Take Hashes  Screenshots  Witness  Track People Hours and expense

Forensics Cont.  Damage and Loss Control  Chain of Custody  Incident Response  Security Training  PII

Risk Mitigation  Security Controls  Change Management  Incident Management  User Rights  Audits  Policies and Procedures  Incident Response Procedures

Network Security Cont. 3  Implementing Common Protocols  IPSEC  SNMP  SSH,SCP  DNS  TLS  HTTP,HTTPS,SSL  TCP/IP,IPv4,IPv6  TFTP,FTP,SFTP,FTPS  NETBIOS

Hardware Security  Bios  USB Devices  Cell Phones  Removeable Storage  NAS

OS hardening  Hotfixes  Service Packs  Patches  Patch Management  Group Policies  Security Templates  Configuration Baselines

Establishing Security

Security Awareness Training  Security Policy training  PII  Data Classification  Compliance  User Habits  Password  Data Handling  Clean desk policies  Tailgating  Threat Awareness  Phlishing  Zero Day Attacks  Social Networking

Business Continuity  Business Impact Analysis (BIA)  Single point of failure  Continuity of operations  Disaster Recovery  IT contingency planning  Succession Planning

Environmental Controls  HVAC  Fire Suppression  EMI  Hot and Cold Aisles  Environmental monitoring  Temperature and humidity controls  Video Monitoring

Execute disaster Recovery Plans  Backup/Backout contingency plans  Backup, execution and frequency  Redundancy and fault tolerance  Hardware  Raid  Cluster  Load balancing  HA  Cold site, hot site, warm site  Mean time to restore, mean time between failures, recovery time objectives and recovery point objectives.

Pillars of Security  Confidentiality  Integrity  Availability

Threats and Vulnerabilities  Types of malware  Adware  Virus  Worm  Spyware  Trojan  Rootkits  Backdoors  Logic Bomb  Botnets

Types of attacks  Man in the middle  Ddos  Dos  Replay  Smurf  Spoofing  Spam  Phlishing

Attacks Cont.  Spim  Vishing  Spear Phishing  Xmas Attack  Pharming  Privilege Escalation  Malicious Insider Threat  Dns Poisoning and Arp Poisoning  Transitive Access  Client Side Attacks

Social Engineering Attacks  Shoulder surfing  Dumpster Diving  Tailgating  Impersonation  Hoaxes  Whaling  Vishing

Wireless Attacks  Rogue Access Points  Interference  Evil Twin  War Driving  Bluejacking  Bluesnarfing  War Chalking  IV attack  Packet Sniffing

Application Attacks  Cross Site scripting  SQL injection  LDAP  XML injection  Directory transversal/command injection  Buffer Overflow  Zero Day  Cookies  Malicous Add-ons  Session Hijacking  Header Manipulation

Mitigation Techniques Failsafe/secure Logs – Event Logs – Audit Logs – Security – Access Logs

Physical Security Hardware Locks Mantraps Video Surveillance Fencing Proximity Readers Access List

Hardening Disable Unnecessary Services Protect Management Services Password Protection Disable Unnecessary Accounts

Port Security Mac filtering 802.1x Disable unused ports

Security Posture Initial Baseline Configuration Continuous Security Monitoring Remediation

Reporting Alarms Alerts Trends

Correction vs Prevention IDS vs IPS Camera vs guard Vulnerability scans Tools – Protocol Analyzer – Sniffer – Vulnerability Scanner – Honey Pots – Honey Nets – Port Scanner

Risk Calculation Threat vs Likelihood

Assessment Technique Baseline Reporting Code Review Determine Attack Surface Architecture Design Review Penetration Testing Vulnerability Testing Black vs White vs Grey Box testing

Application Data and Host Security Fuzzing Secure coding concepts Error and exception handling Input validation Cross site scripting Prevention Cross site request forgery Application configuration baseline Application hardening Application Patch Mgmt

Host Security OS security and settings Ant: – Virus – Spam – Spyware – Pop-ups Host based firewalls Patch mgmt

Hardware Security Cable locks Safe Locking cabinets Host security baselining

Mobile Devices – Screen lock – Strong Password – Device Encryption – Remote Wipe – Voice Encryption – GPS tracking

Virtualization Guest Operating Systems Isolated from each other and hypervisor Each guest needs to be patched individually

Data Security Data Loss Prevention – Full Disk Encryption – Database – Removable media – Mobile files

Hardware based Encryption TPM HSM USB Hard Drive Cloud Computing

Access Control and Identity management Radius TACACS+ Kerberos LDAP XTACACS

Authentication Authorization Auditing Identification Authentication Multifactor Authentication