computer security pro english course
TRANSCRIPT
Computer SecurityBy Abdo and Roberts
Professional English CommunicationNovember 2016 | DIN16SP
OAMK
Or Insecurity?
So you think you are secure?
Think again!
If you think like an attacker you can defend better...
You asking what is this colors?
Who is a hacker?
It’s not what you think it is!
Hackers are the good ones!
Crackers are the bad ones
But they keep calling bad guys “hacker” in general
because of media
And then there are colored hats!
What are their motivations?
“White hat” hacker
Operate with permission to improve security
“Grey hat” hacker
May violate ethical standards or laws, but without “bad” intentions
“Black hat” hacker
Operate with “bad” intentions, for example, personal financial gain
HacktivistsHacktivists
State sponsored hackers
Cyber warfare
Spy hackers
Security by obscurity...
How about NO?
BUT
Hackers are always one step ahead of you...
Get the mindset
Tools?
Kali linux (kali.org)
Areas?
1. Computer forensics2. Cryptography3. Reverse engineering and vulnerability analysis4. Social engineering5. Penetration testing6. Malware analysis7. Security management
Penetration testing
1. Information gathering (OSINT)2. Enumeration3. Exploit4. Report
Certifications?
1.OSCP (offensive-security.com)2.CEH3.Security+4.GIAC5.CISSPAnd ...
How to be secure?
1. password password password! 2. Updated antivirus3. Updated softwares4. Firewall5. There is no patch for human stupidity! :) lol
Brain food
1. defcon.org2. social-engineer.org3. The first book: Penetration testing By Georgia
Weidman ISBN: 978-1-59327-564-84. Vulnhub.com and other wargames and CTF5. My twitter @n3tg33k :D6. google.com
“TRY HARDER”-- offensive security
Th4nk y0u