Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.

Similar presentations


Presentation on theme: "Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning."— Presentation transcript:

1 Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

2 © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 2 Chapter 11 Objectives Understand how to secure a system Probe a system for vulnerabilities Use Vulnerability vulnerability scanning tools Evaluate potential security consultants Understand how to secure a system Probe a system for vulnerabilities Use Vulnerability vulnerability scanning tools Evaluate potential security consultants

3 © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 3 Introduction Secure the system.

4 © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 4 Basics of Security Ports Protect Policies Probe Physical

5 © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 5 MBSA Microsoft Baseline Security Analyzer

6 © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 6 Nessus Popular Vulnerability Scanner

7 © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 7 Getting Professional Help Certification Education Experience Background Checks

8 Certifications CEH CISSP Security+ Vendor-specific (Microsoft, Cisco, and so on) GAIC © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 8

9 Education Computer Science Engineering Computer Information Systems Security Degrees © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 9

10 Background and Experience Prior Security Experience Criminal Background Check Credit Check References Check © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 10

11 © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 11 Summary Information  The more information you have about the vulnerabilities and weaknesses of your system, the better prepared you are to defend it.  The more information the hacker has about your system’s vulnerabilities and weaknesses, the sooner it will be violated.  The tools in this chapter are for the network and security administrator and are to be used for legal, not illegal, purposes.


Download ppt "Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning."

Similar presentations


Ads by Google