Joaquin Fuentes MBA, CEH, CPT, CISSP, CISA, NACA

Slides:



Advertisements
Similar presentations
Assessments, Audits, and Penetration Tests, Oh My Ira Winkler, CISSP
Advertisements

PENETRATION TESTING Presenters:Chakrit Sanbuapoh Sr. Information Security MFEC.
Chapter 1 Ethical Hacking Overview. Who Am I?  Kevin Riley  Systems / Network Analyst Orange Coast College   Phone
Penetration Testing Anand Sudula, CISA,CISSP SSA Global Technologies, India Anand Sudula, CISA,CISSP SSA Global Technologies, India.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
APAC Defense Forum Learning and IT Capacity Building for Defense Sector.
Hands-On Ethical Hacking and Network Defense
Shad Malloy CAaNES, LLC.
Distance Education Team 2 Security Architectures and Analysis.
Hacking outside the box Mike Aiello. Objectives Describe jobs in “Infosec" Discuss why communication is critically important to Infosec professionals.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
The Business of Penetration Testing
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter.
Introduction to Application Penetration Testing
Susanna Jordan Period 4.  What do they do?  How much do they make (range)?  What kind of education or training do they need?  What kind of company.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Penetration Test
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
Security+ Brian E. Brzezicki. About Me Instructor Brian E. Brzezicki Bachelor of Science, Computer.
I-Hack’08 International Hacking Competition “Details”
CANVAS REPORT/rvispute 16/4/2016 CANVAS Report for CTF Event at USAFA on 4/25/2007 Subject :Penetration Tools for Front Range Pen Test Exercise By Rajshri.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Ethical Hacking: Defeating Logon Passwords. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
Do you speak GEEK? What's happening in I/T?. Thousands of IT positions are going unfulfilled.
King William High School. Cyber Security Curriculum 4 year high school curriculum Up to 5 technology certifications upon successful completion of each.
Huntsville City School Board
Penetration Testing in Financial Institutions
OWASP ASVS for NFTaaS in Financial Services
BruinTech Vendor Meet & Greet December 3, 2015
Seminar On Ethical Hacking Submitted To: Submitted By:
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Careers in Cyber Security
Cyber Defence Intelligence
Web Design II PHP & MySQL or ASP.NET
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
Role of the Systems Analyst
^ About the.
Cyber Warrior Princess ™
Information and documentation media systems.
CANVAS Report for CTF Event at USAFA on 4/25/2007
Christopher romano & Courtney Sullivan 18 September 2017 Ia445
PT0-001 Dumps PDF CompTIA PenTest+ Exam Exam Code Exam Name.
IT Technician Pathway - Cybersecurity
Dwight O’Neal Period 1 and 6
Information Security ……PLOTTING YOUR PATH
How to build a defense-in-depth
Virginia Union University
How To Land Your Dream Job in Cyber Security
Hands-On Ethical Hacking and Network Defense
The Challenges of moving Document Creation to the Cloud
National Cyber Security
Computer Security Fundamentals
Cyber Security professions Overview
Back-End Data Security
Hyper-V server deployment - Using the right tools
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Professional Services END TO END NETWORK SECURITY SOLUTION
Ethical Hacker Pro IT Fundamentals Pro
Final Review, Certifications, The Info Sec Interview
Engineering Secure Software
Presentation transcript:

Joaquin Fuentes MBA, CEH, CPT, CISSP, CISA, NACA Practical Security Joaquin Fuentes MBA, CEH, CPT, CISSP, CISA, NACA

About Joaquin Manager, Penetration Testing @Early Warning ASU Alumnus, 2001 OWASP Phoenix Chapter Leader CTF winning team member, CactusCon & DefCon @hackerbyhobby joaquin.fuentes@owasp.org

Dialogue Agenda Hacking the “Catch 22” Being a Hacker Foundational Skills Demonstrable Knowledge Resources “Try Harder”

Catch 22 Catch-22: A paradoxical situation from which an individual cannot escape because of contradictory rules. An example would be: "How am I supposed to gain experience [to be hired for a job] if I'm constantly turned down for not having any?"

*Spoiler Alert* “Try Harder” - Offensive Security

Being a Hacker hack·er ˈhakər/ noun noun: hacker; plural noun: hackers 1 a person who uses computers to gain unauthorized access to data. 2 synonyms: 3 cybercriminal, pirate, computer criminal, keylogger, keystroke logger; informalcyberpunk, hacktivist "viruses that are the brainchildren of these malicious hackers"

Being a Hacker What your friends think you do:

Being a Hacker What the world thinks you do:

Being a Hacker What you actually do:

Being a Hacker Example InfoSec Job Titles: Penetration Tester Consultant IT Auditor Security Architect Security Engineer CISO Security Analyst Developer Network Security Specialist Security Operations Analyst, SOC Analyst Professor Infrastructure Security Specialist

Being a Hacker My Story …the short version “War” Stories Lessons Learned Focused, Self-training “Try Harder”

Know Defensive Security Foundational Skills Be ethical Networking Fundamentals OSI Model Development & Scripting Linux & Windows Web Servers Web Applications Web Services Database Deployments Transact SQL Know Defensive Security Recommendations

Demonstrable Knowledge Have you performed the activity hands-on, more than a few times? Can you walk me through some examples? What tools can you describe using? What are some best-practice defenses? Describe recent major vulnerabilities

Demonstrable Knowledge Networking Fundamentals NMap, ncat OSI Model Know attacks & defense examples at each layer Development & Scripting C, C++, Java, Python, .Net Linux & Windows Kali Linux Web Servers Apache, IIS, Nginx Web Applications How to attack with a Proxy Web Services SOAP, REST Database Deployments Transact SQL Know Defensive Security Recommendations e.g. OWASP Recommendations

Resources InfoSec News CactusCon OWASP Security Shephard ZAP PentesterAcademy.com Offensive-Security Blog overthewire.org/wargames Bandit, Natas Krebs On Security ISSA, ISACA, SDSUG

Certification Providers Some of the better ones… Offensive Security eLearnSecurity Pentester Academy PentesterLab

“Try Harder” Plan to fail, don’t fail to plan Get your degree Stay focused Get certifications Participate in the Community