good info security is annoying!
DESCRIPTION
The truth is good Info security is annoying for us but it is even more annoying for the enemy!TRANSCRIPT
Good Security is Annoying
Presented by: Nick Lane
January 23rd, 2014
Who belongs here?• IT beginners• IT professionals• Office workers
What will you learn? • Who is New Horizons Computer Learning Centers• Security basics• Importance of security• Training options
Welcome!
Who is New Horizons?
New Horizons is a proven, worldwide training provider with flexible learning solutions covering a broad spectrum of topics taught by industry-leading instructors.
Facts to ConsiderLargest International Network • 2,100 Classrooms
• 2,400 Instructors in 56 Countries
• 3 Million Student Days of Training per Year
Flexible, Integrated Learning Methods • ILT – Instructor Led Training
• OLL – Online Live Virtual Delivery
• Private Group Training customized for your
organization
Strong Vendor Partnerships
InstructorNicholas Lane• Technical Instructor at New Horizons of Southern California• Two-time “Top 25 Technical Instructor in the World”• New Horizons trainer since 2005• IT certified since 1998
Certifications:• CEI• CEH• UKICI• MCT• MCITP• MCSE
• MCSA• MCTS• MCP• MOS• SMSP• Cloud Essentials
• Cloud+• Security+• Network+• A+
• Security sure seems annoying!
• Increasing security decreases our
freedoms
• Increasing security decreases our ease
of use
• Increasing security decreases our
functionalities
So…who found themselves too annoyed to implement good security recently?
Because………
The default usernames and passwords weren’t changed on many of the point-of-sales terminals in their stores.
As a result…….
My credit card was stolen
Oh and….
.... other credit cards too
Increasing security decreases enemy freedoms more
Increasing security decreases enemy ease of use more
Increasing security decreases enemy functionality more!
The truth is good security is annoying for us but it is more annoying for the enemy.
Security Basics: The infamous security triangle and the dot……
Security Basics: The other triangle……
Security Basics: Who are you and how do I know?
Security Basics: Security is like an onion because it is best implemented in layers.
Source:
www.stopthehacker.com
Training options:40032 Networking and Security Fundamentals
50094 Deploying and Administering Microsoft Forefront Security
5049 Managing Messaging Security using Microsoft Exchange Server 2007
Certified Ethical Hacker (CEH) v8.0
Certified Information Security Manager (CISM)
Certified Information System Security Professional (CISSP)
Cisco® Deploying Cisco® ASA Firewall Features v2.0 (FIREWALL)
Cisco® Deploying Cisco® ASA VPN Solutions v2.0 (VPN)
Cisco® Implementing Cisco® Intrusion Prevention System v7.0 (IPS)
Cisco® Implementing Cisco® IOS Network Security v2.0 (IINS)
Cisco® Securing Networks with Cisco® Routers and Switches v1.0 (SECURE)
CompTIA Advanced Security Practitioner (CASP)
CompTIA Security+ Certification
CompTIA Social Media Security Professional (SMSP)
Computer Hacking Forensics Investigator (CHFI) v8.0
Strategic Infrastructure Security
Systems Security Certified Practitioner (SSCP®)
VMware® vCloud Networking & Security for vSphere Professionals v5.1
Visit www.nhsocal.com and search for “security”
Courses, Outlines, Delivery Methods, Length, and Locations
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
Certified Ethical Hacker – Course Description
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Certified Ethical Hacker – Target Audience
Labs include latest OS’s, built-in instructions, and 24/7 access from anywhere
Questions?