UNIT 9 SEMINAR – THE LAST ONE  ! Unit 9 Chapter 9 in CompTIA Security + 1 Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds,

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Unit 7 Chapter 9, plus Lab 11 Course Name – IT Network Design
Concepts of Database Management Seventh Edition
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to Developed By: & Advisor : Dr. S. Masoud Sadjadi School of Computing and.
Network security policy: best practices
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
UNIT 4 SEMINAR Unit 4 Chapter 4 in CompTIA Security + Course Name – IT Introduction to Network Security Instructor – Jan McDanolds, MS Contact Information:
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
IT:Network:Microsoft Server 2 Chapter 27 WINDOWS SERVER UPDATE SERVICES.
Module 4: Add Client Computers and Devices to the Network.
Concepts of Database Management Sixth Edition
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Tim Vander Kooi Systems
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Concepts of Database Management Eighth Edition
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Module 14: Configuring Server Security Compliance
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Introduction to Computer Administration Course Supervisor: Muhammad Saeed.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
P2Rx Web Group Fall 2003 Update. Coding Management Items covered today Topic hubs being shared Modularized Topic Hub Code CVS server (managing code) –Topic.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Microsoft Management Seminar Series SMS 2003 Change Management.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Operating Systems Concepts 1/e Ruth Watson Chapter 8 Chapter 8 Network Administrator Ruth Watson.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
Implementing Microsoft Exchange Online with Microsoft Office 365
CS/IS 196 Final Exam Review Final Exam: Wednesday, December 16.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
UNIT 8 SEMINAR Unit 8 Chapter 10, plus Lab 12 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Network Management Unit 4 Course Name – IT Network Management Instructor – Jan McDanolds, MS,
LANDesk Software Confidential Data Analytics LANDESK Day 5. March 2014 Jan Pisarik Technical Presales Manager.
Security Awareness Our security depends on you. What IT Security Protects ECU Campus network and everything attached to it Information –personal data.
Cybersecurity - What’s Next? June 2017
CompTIA Server+ Certification (Exam SK0-004)
IS4550 Security Policies and Implementation
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
County HIPAA Review All Rights Reserved 2002.
CompTIA Security+ Study Guide (SY0-401)
Pima Medical Institute Online Education
IS4680 Security Auditing for Compliance
Pima Medical Institute Online Education
Security week 1 Introductions Class website Syllabus review
PLANNING A SECURE BASELINE INSTALLATION
IT Management, Simplified
Presentation transcript:

UNIT 9 SEMINAR – THE LAST ONE  ! Unit 9 Chapter 9 in CompTIA Security + 1 Course Name – IT Introduction to Network Security Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM – JMcDanolds – Office Hours: Tuesday, 7:00 PM ET or Thursday, 7:00 PM ET

UNIT 8 REVIEW Security Policies and Procedures In Chapter 8 we covered: Understanding Business Continuity Business Continuity Planning, Disaster Recovery Planning, Continuity of Operations (COOP) Plan Cyber Incident Response Plan Occupant Emergency Plan (OEP) The five nines… Backups Reinforcing Vendor Support Generating Policies and Procedures Enforcing Privilege Management 2

UNIT 9 Security Administration Unit 9: Understanding Security Management Drafting Best Practices and Documentation Simplifying Security Administration Common Logical Access Control Methods/Topics Understanding Security Awareness and Education Staying on Top of Security OS Updates - WSUS (Windows Server Update Service) Security TechCenter, other websites Regulating Privacy and Security Laws and Regulations, Federal and International 3

CHAPTER 9 Understanding Security Management The management of security is EVERYTHING! Best Practices and Documentation Using Policies and Procedures Allocating Resources Defining Responsibility Minimizing Mistakes Enforcing the Policies and Procedures We need tools!!! 4

CHAPTER 9 Examples of FREE Administration Tools… Windows Baseline Security Analyzer (MBSA) – Free download for Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 Foglight from Quest – FREE Network Management System – VIEW Videos - Traffic Mgt, Configuration %7BMatchType%7D-%7BAdId%7D Solarwinds – IT monitoring and management software for SysAdmins Free Tools and Free Trials – Spiceworks - FREE Network Management tool 5

CHAPTER 9 Example: Spiceworks Features Inventory Your Network - Network Inventory - IT Asset Management - IT Audit Software - Warranty Tracking - Virtualization Management Monitor Your Network - Network Monitoring - Power Management Software - SNMP Network Management - SQL Server Monitoring Run an IT Help Desk - Help Desk Software - Active Directory Management - IT Purchasing Management - Help Desk iPhone App Manage Configuration Changes - TFTP Server - Change Management Map Your Network - Network Mapping Troubleshoot Network Problems - Remote control of PCs & servers with RDP or VNC, ping from one console, compare configurations 6

CHAPTER 9 Examples of Administration Tools These tools are not free… HP – Network Management/Security Software E-Series IBM – Tivoli NetView distributed network management software Others: Solarwinds Cisco Avaya Network Management Solutions SysAid LanDesk Mach5, Etc. Etc. 7

CHAPTER 9 Simplifying Security Administration Common Logical Access Control Methods/Topics Access Control Lists (ACLs) Account Expiration Domain Password Policy Group Policies Logical Tokens Password Policy Time-of-day restrictions Usernames and passwords 8

CHAPTER 9 Understanding Security Awareness and Education Using Communications and Awareness Providing Education – explaining policies, procedures, and current threats to users and management 1 - Organization as a whole 2 - Management 3 - Technical staff 9

CHAPTER 9 Staying on Top of Security Operating Systems Updates Applications Updates Network Device Updates Policies and Procedures Personal Development Web Sites – next slide… Trade Publications 10

CHAPTER 9 Security websites Ones we have discussed: CERT, SANS, McAfee Symantec Computer Security Institute Others: SC Magazine

CHAPTER 9 Regulating Privacy and Security HIPAA – Health Insurance Portability and Accountability Act Gramm-Leach Bliley Act of 1999 Computer Fraud and Abuse Act FERPA – Family Educational Rights & Privacy Act Computer Security Act of 1987 Cyberspace Electronic Security Act (CESA) Cyber Security Enhancement Act Patriot Act International Efforts 12

UNIT 9 UNIT 9 Reading 13 Web Resources

UNIT 9 ASSIGNMENT UNIT 9 Assignment Three separate questions – review the Rubric 14

CHAPTER 9 Unit 9 Assignment Unit Nine Project 1. Table 9.1 on page 445 lists common logical access control methods/topics. Perform Internet research and examine past chapters of the text to describe critical aspects for 4 of the 8 topics listed. You must have at least 2 references besides our text book. 2. Describe what you feel is the most difficult aspect of education as it refers to end users in an organization. 3. Summarize one of the 8 Acts listed (between pages 454 thru 457) in terms of specific topics covered, need to know items and specifics as to how the ACT helps or hurts IT security efforts. 15

FINAL EXAM Unit 10 Assignment There is no Final Project There IS a Final Exam: 50 multiple choice questions, one hour One of the questions… Where might be the most up-to-date place to find out about security issues? Think about the quickest way to notify clients of a security breach. 16

FINAL SLIDE I hope you have enjoyed this class! All the best to each of you! Stay secure!! 17 Questions ???? Comments !!! Do you feel you have a good basis for security after taking this course? Are you planning on taking the CompTIA Security+ certification? What amazed you most about this information?