Presentation is loading. Please wait.

Presentation is loading. Please wait.

Comptia Security+ Eckel Technology Consultants. Introduction  Netlearn IT training and Consulting LLC.  Specializing in :  Comptia Training  Novell.

Similar presentations


Presentation on theme: "Comptia Security+ Eckel Technology Consultants. Introduction  Netlearn IT training and Consulting LLC.  Specializing in :  Comptia Training  Novell."— Presentation transcript:

1 Comptia Security+ Eckel Technology Consultants

2 Introduction  Netlearn IT training and Consulting LLC.  Specializing in :  Comptia Training  Novell Suse Linux Training  Linux Consulting  Citrix Xenserver Consulting

3 Partners  Citrix  Comptia  Novell  Phd Virtual Backup Solutions  Vmware  Symantec

4 Contact Information  Kevin Eckel  sales@netlearnit.com  1239 Bower Hill Rd.  Pittsburgh PA 15243  Phone 412-401-6852  Fax 412-894-9012

5 The Exam SY0-201  Time: 90 minutes  Number of Questions: 100  Passing Score: 750 /1000  Some Beta Questions which do not count towards your score  Exam Format: Multiple choice where you chose the best answer (radio buttons) or multiple correct answers ( square )

6

7 Tested Material Breakdown  Network Security 21%  Compliance and Operational Security 18%  Threats and Vulnerabilities 21%  Application, Data and Host Security 16%  Access Control 13%  Cryptography 11%

8 Objectives  Network Security  Network Devices  Firewalls  Routers  Switches  Load Balancers  Proxies  Web Security Gateways  VPN Concentrators  NIDS and NIPS ( Behavior, signature and anamoly, Heuristic )  Protocol Analyzers  Spam filters  Web Application Filters  URL filtering

9 Network Security Cont.  Implementation  Rule based  Vlans  ACLs  Port Security  Wireless  Flood Guards  Loop Protection  Implicit Deny  Log Analysis

10 Network Security Cont. 2  Network Design Elements  DMZ  Subnet  Vlan  Nat  Remote Access Control  NAC  Virtulization  Cloud Computing ( PAAS, SAAS, IAAS )

11 Wireless  Wireless Protocols  WEP,WPA,WPA2,EAP,PEAP  Wireless Security  Mac Filtering  SSID  TKIP  CCMP  Antenna Placement  Power Level Controls

12 Compliance and Operational Security  Control Types  Technical  Management  Operational  False Positives  Policies  Privacy  Acceptable Use  Security  Mandatory Vacations  Job Rotation  Separation of Duties  Least Privilege

13 Risk Calculation  Likelihood  ALE  Impact  Quantitative VS Qualitative  Risk Management Procedures  Avoidance  Transference  Acceptance  Mitigation  Deterence

14 Basic Forensics  Order of volatility  Capture System Image  Network Traffic and Logs  Capture Video  Record Time Offset  Take Hashes  Screenshots  Witness  Track People Hours and expense

15 Forensics Cont.  Damage and Loss Control  Chain of Custody  Incident Response  Security Training  PII

16 Risk Mitigation  Security Controls  Change Management  Incident Management  User Rights  Audits  Policies and Procedures  Incident Response Procedures

17 Network Security Cont. 3  Implementing Common Protocols  IPSEC  SNMP  SSH,SCP  DNS  TLS  HTTP,HTTPS,SSL  TCP/IP,IPv4,IPv6  TFTP,FTP,SFTP,FTPS  NETBIOS

18 Hardware Security  Bios  USB Devices  Cell Phones  Removeable Storage  NAS

19 OS hardening  Hotfixes  Service Packs  Patches  Patch Management  Group Policies  Security Templates  Configuration Baselines

20 Establishing Security

21 Security Awareness Training  Security Policy training  PII  Data Classification  Compliance  User Habits  Password  Data Handling  Clean desk policies  Tailgating  Threat Awareness  Phlishing  Zero Day Attacks  Social Networking

22 Business Continuity  Business Impact Analysis (BIA)  Single point of failure  Continuity of operations  Disaster Recovery  IT contingency planning  Succession Planning

23 Environmental Controls  HVAC  Fire Suppression  EMI  Hot and Cold Aisles  Environmental monitoring  Temperature and humidity controls  Video Monitoring

24 Execute disaster Recovery Plans  Backup/Backout contingency plans  Backup, execution and frequency  Redundancy and fault tolerance  Hardware  Raid  Cluster  Load balancing  HA  Cold site, hot site, warm site  Mean time to restore, mean time between failures, recovery time objectives and recovery point objectives.

25 Pillars of Security  Confidentiality  Integrity  Availability

26 Threats and Vulnerabilities  Types of malware  Adware  Virus  Worm  Spyware  Trojan  Rootkits  Backdoors  Logic Bomb  Botnets

27 Types of attacks  Man in the middle  Ddos  Dos  Replay  Smurf  Spoofing  Spam  Phlishing

28 Attacks Cont.  Spim  Vishing  Spear Phishing  Xmas Attack  Pharming  Privilege Escalation  Malicious Insider Threat  Dns Poisoning and Arp Poisoning  Transitive Access  Client Side Attacks

29 Social Engineering Attacks  Shoulder surfing  Dumpster Diving  Tailgating  Impersonation  Hoaxes  Whaling  Vishing

30 Wireless Attacks  Rogue Access Points  Interference  Evil Twin  War Driving  Bluejacking  Bluesnarfing  War Chalking  IV attack  Packet Sniffing

31 Application Attacks  Cross Site scripting  SQL injection  LDAP  XML injection  Directory transversal/command injection  Buffer Overflow  Zero Day  Cookies  Malicous Add-ons  Session Hijacking  Header Manipulation

32 Mitigation Techniques Failsafe/secure Logs – Event Logs – Audit Logs – Security – Access Logs

33 Physical Security Hardware Locks Mantraps Video Surveillance Fencing Proximity Readers Access List

34 Hardening Disable Unnecessary Services Protect Management Services Password Protection Disable Unnecessary Accounts

35 Port Security Mac filtering 802.1x Disable unused ports

36 Security Posture Initial Baseline Configuration Continuous Security Monitoring Remediation

37 Reporting Alarms Alerts Trends

38 Correction vs Prevention IDS vs IPS Camera vs guard Vulnerability scans Tools – Protocol Analyzer – Sniffer – Vulnerability Scanner – Honey Pots – Honey Nets – Port Scanner

39 Risk Calculation Threat vs Likelihood

40 Assessment Technique Baseline Reporting Code Review Determine Attack Surface Architecture Design Review Penetration Testing Vulnerability Testing Black vs White vs Grey Box testing

41 Application Data and Host Security Fuzzing Secure coding concepts Error and exception handling Input validation Cross site scripting Prevention Cross site request forgery Application configuration baseline Application hardening Application Patch Mgmt

42 Host Security OS security and settings Ant: – Virus – Spam – Spyware – Pop-ups Host based firewalls Patch mgmt

43 Hardware Security Cable locks Safe Locking cabinets Host security baselining

44 Mobile Devices – Screen lock – Strong Password – Device Encryption – Remote Wipe – Voice Encryption – GPS tracking

45 Virtualization Guest Operating Systems Isolated from each other and hypervisor Each guest needs to be patched individually

46 Data Security Data Loss Prevention – Full Disk Encryption – Database – Removable media – Mobile files

47 Hardware based Encryption TPM HSM USB Hard Drive Cloud Computing

48 Access Control and Identity management Radius TACACS+ Kerberos LDAP XTACACS

49 Authentication Authorization Auditing Identification Authentication Multifactor Authentication


Download ppt "Comptia Security+ Eckel Technology Consultants. Introduction  Netlearn IT training and Consulting LLC.  Specializing in :  Comptia Training  Novell."

Similar presentations


Ads by Google