SIM 302. Unprepared UninformedUnaware Untrained Unused.

Slides:



Advertisements
Similar presentations
4/10/2017 2:53 PM SIM202 We Don't Need No Stinkin' GUI: Command-Line Capture Techniques (Remote Options) Laura Chappell Founder, Wireshark University Founder,
Advertisements

WSV405. IPv6 Ready Logo Program
DEV333. Describe each main attack Demo how the attack works Fix our poor vulnerable application! Why Script Kiddies, Why? Click to Hack.
SIM201. Announcing… copyright chappellseminars.com some hosts comply; RST = closed no = response open some hosts comply; RST = closed no = response.
WSV304 Manual Deployment High cost Fully Automated Low cost.
Sample Fill demo WorkflowServiceHostFactory Tracking Persistence Custom Behaviour Creation Endpoint Control Endpoint Exception Behaviour.
Self Assessment COS202 a-Expense.
SIM Separate solution install paths can be taken, stand alone and SCOM integrated. Both require core AVIcode web apps and DB’s.
DBI331. Cube Measure Group Measure Partition Cube Dimension Dimension Attribute Relationship Hierarchy Level Cube Attribute Cube Hierarchy Measure.
Video gallery HD video or high resolution photos of attendees H.264 SVC support Personalized collaboration experiences Intuitive controls Consistent.
SIM346. General information about the software application.
Sneak Peek at Microsoft System Center Service Manager 2012 Concepts
SIM405 BladeLogic Operations Manage BMC Atrium CMDB BMC Event Manager BMC Patrol BMC Remedy AR System CA Autosys CA eHealth CA Spectrum CA Unicenter.
DEV314. Entity Data Model demo Entity Data Model.
DBI311. Existing NMS application Agent Existing NMS application Agent 0.5 KB/record 2500 records/ agent 10 agents = 25K r/s (12. 5 MB/s) 25K r/s.
DEV202 Before I get started... …is too expensive. …is too complex. …requires a server.
OSP214. SECURITY PRIVACY RELIABILITY & SERVICE CONTINUITY COMPLIANCE.
WCL309. Demo.
SIM329. Certificate Enrollment Without CEP/CES Certificate Authority Active Directory Client Workstations LDAP RPC/DCOM.
VIR319 Overview of MED-V Enterprise Application Compatibility Challenges Solutions from Microsoft for Application Compatibility Lifecycle of MED-V.
OSP317. Built on SharePoint Leverage one or more out of the box or custom features. These features can typically live on there own Like any other.
SIM301-R. Courtesy Of CRN Wi Fi Alliance.
WPH203 Content Choice Discoverability demo.
SIM314 Introduction Transport Layer Summary Network Layer.
SIM335 Demo 6 7 NetApp Confidential - Internal Use Only.
demo.
Node 1Node 2Node 3Node 4Node 5 DB 1Copy 1 DB 2Copy 1 DB 3Copy 1 DB 4Copy 1 DB 5Copy 1 DB 6Copy 1 DB 7Copy 1 DB 8Copy 1 DB 9Copy.
WPH202. announcement Dublin Singapore Redmond Sao Paulo Three million+ messages per day internally 74,589 Mobile devices syncing daily 550 sites.
Margin Content Padding Border.
DBI329. video.
DBI326. PhraseGoal “Data Mining”Inform actionable decisions “Machine Learning”Determine best performing algorithm.
WCL308. (While you’re sitting there, sign up for the GPanswers.com Tip of the Week … (Scan a tag.. Fill out the little form…) and enter to win a copy.
DPR302.
2.
VIR317 Number of physical servers shipments used for virtualization will grow to 1.7M+ in 2012 at a CAGR of 15% 19% of physical server shipments will.
WCL304.

DPR306. Process and tools Individuals and interactions over Following a plan Responding to change over Source: Comprehensive.
DPR305. Controller Model View Client Business Objects Server Business Objects Data.
MID305. AppFabric / Host WF Runtime Extensions Tracking Persistence … … Tooling VS Designer VS Debugger Rehosted Designer Workflow Activity Library.
OSP310. What is a SharePoint® Farm? A collection of one or more SharePoint Servers and SQL Servers® providing a set of basic SharePoint.
OSP402 Required Slide Track PMs will supply the content for this slide, which will be inserted during the final scrub.
DEV211. The simplest way to create business applications for the desktop and the cloud.
SIM315. FIM Service Resource Management Service (WCF Endpoint) Request Dispatcher.
SIM333 Microsoft Confidential Simplified Management Manage FPE 2010 and FPSP 2010 Server Discovery and Grouping FPSMC agent deployment Deploy.
DEV 315 –Name –Problem –Context –Forces –Solution –Invariant –Examples –Known Uses –Related patterns : Characteristics :
DBI325. Monitoring Analytics Support will extend to Analysis Services in the Denali release.
SIM404. Question Source: Demotivation To prevent this.!
DPR301 demo Executable Requirements.
Data transport Cloud Backend Data transport Cloud Backend Cloud Provider Backend Virtualization Sidechannels You Clients Logons Who’s responsibility.
VIR326. Dell Compellent always puts the right data in the right place at the right time at the right cost. That’s Fluid Data.
DEV351.
DEV332. Required Slide Speakers, please list the Breakout Sessions, Interactive Discussions, Labs, Demo Stations and Certification Exam that.
DEV327. tag – you’re it! Application Tier (AT) Data Tier (DT) Configuration Database Relational Warehouse OLAP Cube Database Collection Databases.
DEV321. demo Rule: Any slide about UX must be charcoal gray or black.
#TEDEV342 A A B B I currently deploy via FTP directly to my host. My deployment is manual because I need to set permissions on the target server.
DEV203. Coded workflows Declarative workflows Web part hook-up Professional developerBusiness Analyst/Process Designer List definitions Event receivers.
Learn more: Download SCM: Join the TechNet Wiki community:
Redeploying from on-premises to the cloud SharePoint burst out to Azure Hybrid event based applications Building a private cloud.
OSP-302. DescriptionUri All lists on a site.../_vti_bin/ListData.svc All Items in a named list.../_vti_bin/ListData.svc/MyList 2nd Item in the list.../_vti_bin/ListData.svc/MyList(2)
DEV348. demo Valid HTML5 Syntax demo.
WSV303. I live here... DC DNS DHCP WDS Clients DC DNS WDS/DHCP DC/DNS.
DEV354. Describe your data Create screens for common tasks Author business logic Customize screen layouts Define custom queries Create custom Silverlight.
MID Deploy Workflow Service definition (.xamlx) T Contracts inferred from Receive / Reply activities Endpoints opened A Persistence.
WCL301. demo Basic Custom XML-file.
DEV336. demo HTTP Packet Trace GET / HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible;
About Me AUTHENTICATION Identity Provider.

DEV355 Jack Swigert demo my wife demo.
DEV353. Required Slide Speakers, please list the Breakout Sessions, Interactive Discussions, Labs, Demo Stations and Certification.
Presentation transcript:

SIM 302

Unprepared UninformedUnaware Untrained Unused

Source: Dreamtime

DroidDream malware iPhone/Privacy

Gatherer/hunter Learn Communicate Socio interactivity Socio isolation Loss of information control

Virtual business services of all sorts, accounting, payroll, and even sales would come to a halt, as would many companies

$1.5 to $2 billion $80 to $120 million What does a stealth bomber cost? What does a stealth fighter cost? $1 to $2 million What does an cruise missile cost? $300 to $50,000 What does a cyber weapon cost?

Nuclear Weapons Facility Cyber Weapons Facility Where’s the Cyber Weapons Facility?

Step 1 Reconnaissance Step 1 Reconnaissance Step 2 Initial intrusion into the network Step 2 Initial intrusion into the network Step 3 Establish a backdoor into the network Step 3 Establish a backdoor into the network Step 4 Obtain user credentials Step 4 Obtain user credentials Step 5 Install various utilities Step 5 Install various utilities Step 6 Privilege escalation /lateral movement /data exfiltration Step 6 Privilege escalation /lateral movement /data exfiltration Step 7 Maintain persistence Step 7 Maintain persistence

Thanks to Dreamtime

Thanks to BBC.co.uk

demo

Security Management Threat and Vulnerability Management, Monitoring and Response Edge Routers, Firewalls, Intrusion Detection, Vulnerability Scanning Network Perimeter Dual-factor Authorization, Intrusion Detection, Vulnerability Scanning Internal Network Access Control and Monitoring, Anti-Malware, Patch and Configuration Management Host Secure Engineering (SDL), Access Control and Monitoring, Anti-Malware Application Access Control and Monitoring, File/Data Integrity Data User Account Management, Training and Awareness, Screening Facility Physical Controls, Video Surveillance, Access Control Strategy: Employ a risk-based, multi-dimensional approach to safeguarding services and data

Required Slide Speakers, please list the Breakout Sessions, Interactive Discussions, Labs, Demo Stations and Certification Exam that relate to your session. Also indicate when they can find you staffing in the TLC.

Sessions On-Demand & CommunityMicrosoft Certification & Training Resources Resources for IT ProfessionalsResources for Developers Connect. Share. Discuss.

Scan the Tag to evaluate this session now on myTechEd Mobile