MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

CISSP Seeks CIPP Object: Mutual Compliance Marriage of Privacy and Security Professionals Under HIPAA David B. Nelson, CISSP Yolo County Woodland, California.
Reasons to Become CISSP Certified Keith A. Watson, CISSP CERIAS.
PENETRATION TESTING Presenters:Chakrit Sanbuapoh Sr. Information Security MFEC.
Security and Personnel
Computer Security and Penetration Testing
UMBC TRAINING CENTERS © 2010, Paladin Group, LLC Certified Information System Security Professional (CISSP)
Security Controls – What Works
Shad Malloy CAaNES, LLC.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
IS 380 OME 1 Fall 2010 Class 1. Administrative Roster Syllabus Review Class overview 10 domains overview.
Secure Software Development Security Operations Chapter 9 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.
Security Certification
Selling the MTA Sales Academy Brent Johnson – Oct 17, 2012.
Certified Information System Security Professional (CISSP)
The Business of Penetration Testing
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Information Security Update CTC 18 March 2015 Julianne Tolson.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
CISSP Best Practices Guide to the Basics of Certified Information Systems Security Professional 1 The Certified Information System Security Professional.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
Security+ Brian E. Brzezicki. About Me Instructor Brian E. Brzezicki Bachelor of Science, Computer.
IS Network and Telecommunications Risks Chapter Six.
The Fifteenth National HIPAA Summit Overview of Approaches to Security Officer Training John Parmigiani December 12, 2007.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Certified Information System Security Professional (CISSP)
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Frontline Enterprise Security
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
SecSDLC Chapter 2.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Alliance Key Manager for Windows Azure Puts Encryption Key Management and Data Breach Security at Your Fingertips COMPANY PROFILE: TOWNSEND SECURITY Townsend.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Secure Software Development Security Operations Chapter 9 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.
Cyber Services Plc BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
Certified Ethical Hacker v8 Question Answer Eccouncil v8.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
S ECURE E-S YSTEMS AS A COMPETITIVE ADVANTAGE IN A GLOBAL MARKETS By Cade Zvavanjanja Cybersecurity Strategist By Cade Zvavanjanja Cybersecurity Strategist.
Defining your requirements for a successful security (and compliance
IS4680 Security Auditing for Compliance
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Associate Degree in Cyber security
CISSP TRAINING IN.
Joaquin Fuentes MBA, CEH, CPT, CISSP, CISA, NACA
5G Security Training
Intro to Ethical Hacking
How To Land Your Dream Job in Cyber Security
Intro to Ethical Hacking
National Cyber Security
Security Essentials for Small Businesses
Contact Center Security Strategies
Cyber Security professions Overview
AppExchange Security Certification
CS 490/CIS 790 Information System Security
Information Services Security Management
Microsoft Microsoft Word 2016 Core: Document Creation, Collaboration and Communication (MOS )
PT0-001 Exam Questions 2019
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

MVHS Career Night 2015 Information Security

Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips

What a person wants in life Money Fame Nirvana We will talk about first 2

How to be wealthy ? Have Rich Parents Marry a Rich Spouse Win the Lottery Become a Successful Black Hat Hacker (Live life underground) Work as a White Hat (this presentation) YOU WILL MAKE YOUR OWN CAREER! Others may help, but it’s ALL ON YOU!

Do I have your attention now.

Why Information Security? Increasing regulatory compliance Requires organizations to adopt security standards and frameworks for long-term approach to mitigating risk Evolving and emerging threats and attacks Continual learning of new skills and techniques Convergence of physical and information security Accountability between information security professionals and management falls on several key executives to manage growing risk exposures

What Is Information? Information is collection of useful DATA. Information could be – Your personal details – Your corporate details. – Future plan’s

What is Information Security? 1) Access Controls 2) Telecommunications and Network Security 3) Information Security and Risk Management 4) Application Security 5) Cryptography 6) Security Architecture and Design 7) Operations Security 8) Business Continuity and Disaster Recovery Planning 9) Legal, Regulations, Compliance and Investigations 10) Physical (Environmental) Security

What Next

Explore : – Industry Standard Knowledge – nothing beats core concept understanding Certification – helps in proving your exposure as fresher.

Explore : Types of Info-Sec jobs Ethical Hacker – Vulnerability Assessment – Penetration Tester Forensic Investigator Security Governance – Auditor Security Administrator Secure Developer

Explore : Type of certification Security Analyst – CEH, ECSA, OSCP Development – SCJP, MCSE Server Security – RHCSS Auditor – ISO lead auditor

Clarify : Information Security

keep the bad guys out let the trusted guys in give trusted guys access to what they are authorized to access

Clarify : Security Triad

Security Triad

Clarify : Secure Developer A Developer who is aware about security issues. Developers now are classified In 3 major category – Thick Client Developer – Thin Client Developer. – Kernel or driver developer. If you can exploit it you need to patch it.

Clarify : Security Administrator Server Administrator with background into Security. Skills Required – Server Hardening. – Firewall configuration.

Clarify : Vulnerability Assessment It is the process of finding possible exploitable situation in a given target. Target could be Desktop/ Laptop, Network, Web Application, literally any device with a processor and motive to achieve Skill Set – understanding of target architecture. – Eye for details and thinking of an exploiter. – (Optional) Programming for nessus plugin.

Clarify : Penetration Testing Next Step to vulnerability assessment. Here the target is actually evaluated against a live attack. Skills Required: – Programming : C / C++, Python, Perl, Ruby – Understanding of an exploitation framework. Metasploit Core impact

Clarify : Forensic Expert The post – mortem specialist for IT Responsible for after incident evaluation of a target. Skills – All that’s needed for VA/PT. – Understanding of forensic concepts not limited to data recovery, log evaluation etc.

Clarify : Auditor Reviews the systems and networks and related security policies with regards to Industrial standards. Skills Required – Understanding of compliance policies HIPPA, ISO 27001, PCI DSS, SOX and many more. – Understanding of ethical hacking concepts and application.

Commit : How to gain Knowledge Spend first few years mastering fundamentals Get involved in as many systems, apps, platforms, languages, etc. as you can Key technologies and areas Relevant security experience Compliance/regulatory/risk management Encryption Firewalls Policy IDS/IPS Programming and scripting

Commit : Technical Skills Required LEARN the Operating System LEARN the Coding Language LEARN Assembler & Shell Coding Learn Metasploit Learn Nessus Learn Writing exploit for Metasploit Learn writing scanning plug-in for Nessus.

Commit : Soft Skills Required Learn Presentation skills. Learn business language. Management likes to hear that.

Commit : how to gain certificate Attend Training Learn, understand and apply the concepts in a controlled environment. Take exam when you have confidence.

Commit : how to practice Set up a lab at home. – Physical Lab (best) – Virtual Lab (second Best) Keep yourself updated subscribe to Vulnerability DB. – Practice regularly on a secured home lab.

Commit : First job Lower rungs of the tech ladder Unpaid Overtime is Expected When offered company training – take it Expect to make Mistakes – Learn from them

THINGS TO REMEMBER

Things to Remember Learn to Question Everything. Keep yourself up-to-date. Be expert in one field however, security specialist are more on advantage if they develop generalist skills. Security is extension of business needs and should support it. Form group of like minded people.

HACKER GOT HACKED Keep your system and network secure first. Avoid publicizing about being “HACKER” till you have practiced enough and feel confident. Self proclaimers are not seen with good eyes in security communities. Your work should speak and not your mouth.

Work and personal Life

CERTIFICATIONS

Why Certification is good Nothing beats the first hand Job Exposure. However When you hit roadblock, certifications helps

More on Certification Passing a Certification exam says that: – You have the minimum knowledge to be considered for certification (at the time of the test) OR – You are very good at taking tests.

Industry Certifications EC-Council – CEH, ECSA, CHFI,ECSP and More ISC 2 – CISSP Offensive Security – OSCP ISACA – CISA and CISM

Any Questions