Module 1- 802.11
-
Overview
-
Airborne Viruses
-
Types of Wireless
-
Standards Comparison
-
Wireless Network Topologies
-
SSID (Service Set Identity)
-
Wireless Technologies – Service Set ID
-
Securing and Protecting Wireless Best Practices
-
Typical Wired/Wireless Network
-
1X: EAP Types
-
EAP Advantages/Disadvantages
-
EAP/TLS Deployment
-
New Age Protection
-
New Age Protection
-
Wireless Security Technologies
-
MAC Filtering
-
Wired Equivalent Privacy
-
Wireless Technologies – WEP
-
XOR – Basics
-
How WPA improves on WEP
-
How WPA improves on WEP
-
TKIP
-
11i – WPA2
-
WPA and WPA2 Mode Types
-
WPA-PSK Encryption
-
LEAP
-
Wireless Security Weaknesses
-
Weak IV Packets
-
WEP Weaknesses
-
The WPA MIC Vulnerability
-
LEAP Weaknesses
-
Wireless Threats
-
NetStumbler
-
Tool: Kismet
-
Analysis Tool: OmniPeek Personal
-
Omni Peek Console
-
Tool: Aircrack-ng Suite
-
Tool: Airodump-ng
-
Tool: Aireplay
-
DOS: Deauth/disassociate attack
-
Tool: Aircrack
-
Aircrack for Windows
-
Attacking WEP
-
Attacking WPA
-
coWPAtty
-
Exploiting Cisco LEAP
-
asleap
-
WiFiZoo
-
Wesside-ng
-
Review
Module 2 – Access Control
-
Role of Access Control
-
Layers of Access Control
-
Access Control Mechanism Examples
-
Access Control Characteristics
-
Preventive Control Types
-
Control Combinations
-
Models for Access
-
Discretionary Access Control Model
-
Enforcing a DAC Policy
-
Mandatory Access Control Model
-
MAC Enforcement Mechanism – Labels
-
Where Are They Used?
-
MAC Versus DAC
-
Role-Based Access Control (RBAC)
-
Acquiring Rights and Permissions
-
Rule-Based Access Control
-
Access Control Matrix
-
Access Control Administration
-
Access Control Mechanisms in Use Today
-
Strong Authentication
-
Memory Cards
-
Smart Card
-
Administrating Access Control
-
Accountability and Access Control
-
Trusted Path
-
Access Criteria
-
Fraud Controls
-
Thin Clients
-
Administrative Controls
-
Controlling Access to Sensitive Data
-
Other Ways of Controlling Access
-
Technical Access Controls
-
Physical Access Controls
-
Accountability
-
IDS
-
Network IDS Sensors
-
Types of IDSs
-
Behavior-Based IDS
-
IDS Response Mechanisms
-
Trapping an Intruder
-
Access Control Methods
-
Remote Centralized Administration
-
RADIUS Characteristics
-
RADIUS
-
TACACS+ Characteristics
-
Diameter Characteristics
-
Decentralized Access Control Administration Biometrics Technology
-
Biometrics Enrolment Process
-
Downfalls to Biometric Use
-
Biometrics Error Types
-
Crossover Error Rate (CER)
-
Biometric System Types
-
Passwords
-
Password “Shoulds”
-
Password Attacks
-
Countermeasures for Password Cracking
-
Cognitive Passwords
-
One-Time Password Authentication
-
Synchronous Token
-
Asynchronous Token Device
-
Cryptographic Keys
-
Passphrase Authentication
-
Definitions
-
More Definitions
-
Single Sign-on Technology
-
Different Technologies
-
Scripts as a Single Sign-on Technology
-
Directory Services as a Single Sign-on Technology
-
Kerberos as a Single Sign-on Technology
-
Kerberos Components Working Together
-
More Components of Kerberos
-
Kerberos Authentication Steps
-
Tickets
-
Why Go Through All of this Trouble?
-
Issues Pertaining to Kerberos
-
SESAME as a Single Sign-on Technology
-
SESAME Steps for Authentication
Module 3 – Computer Forensics and Legalities
-
Lesson Objectives
-
The Legal System
-
State Law & Criminal Incidents
-
Federal of laws
-
US Title 18: Fraud Criminal Codes
-
Case study: Criminal Incidents
-
Case Study: Criminal Incidents
-
Case study: Criminal Incidents
-
Criminal Incidents
-
International Legal Treaties and Orgs
-
Civil Incidents
-
Criminal Incidents
-
Criminal Incidents
Module 4 – Cryptography Applications
-
Digital Certificates
-
What Do You Do with a Certificate?
-
Components of PKI – Repository and CRLs
-
PGP
-
Digital Signatures – PGP
-
IPSEC
-
IPSec – Network Layer Protection
-
IPSec Key Management
-
IPSec Handshaking Process
-
IPSec Is a Suite of Protocols
-
IPSec Modes of Operation
-
IPSec
-
PKI
-
Public Key Infrastructure
-
Why Do We Need a PKI?
-
PKI and Its Components
-
Let’s Walk Through an Example
-
Public Key Infrastructure
-
Asymmetric Encryption
-
Public Key Cryptography Advantages
-
Symmetric versus Asymmetric
-
SSL/TLS
-
PPP
-
VPN
-
Site-to-Site VPN
-
myspace.com
-
facebook.com
-
Others From Around the World
-
Identity Theft and MySpace
Module 5 – Cryptography Algorithms and Concepts
-
Symmetric Cipher – AES
-
Crack Times
-
Crypto and Password Recovery Concepts
-
Crypto Attacks
-
Caesar Cipher Example
-
Polyalphabetic Substitution
-
Ways of Breaking Cryptosystems Brute Force
-
Attacks on Cryptosystems
-
Encryption
-
Cryptographic Definitions
-
SSH
-
Attack Vectors
-
More Attacks (Cryptanalysis)
-
Type of Symmetric Cipher – Stream Cipher
-
Characteristics of Strong Algorithms
-
Block Cipher Modes – CBC
-
Implementation
-
Block Cipher Modes – CFB and OFB
-
DES
-
Symmetric Ciphers We Will Dive Into
-
Symmetric Algorithm Examples
-
Symmetric Algorithms – DES
-
Evolution of DES
-
Different Modes of Block Ciphers – ECB
-
Other Symmetric Algorithms
-
Symmetric Encryption
-
Symmetric Encryption
-
Symmetric Downfalls
-
Symmetric Algorithms
-
SSL/TLS
-
ECC
-
ECC
-
Quantum Cryptography
-
Asymmetric Algorithm Examples
-
Asymmetric Algorithms We Will Dive Into
-
Asymmetric Algorithm – RSA
-
S. Government Standard
-
Asymmetric Encryption
Module 6 – Key Management
-
Using the Algorithm Types Together
-
Hybrid Encryption
-
Strength of a Cryptosystem
-
Symmetric Key Management Issue
-
Now What?
-
Key Management
-
IPSec Key Management
-
Key Issues Within IPSec
-
OPSEC
-
OPSEC
-
Types of Ciphers Used Today
-
Type of Symmetric Cipher – Block Cipher
-
S-Boxes Used in Block Ciphers
-
Type of Symmetric Cipher – Stream Cipher
-
Encryption Process
-
Symmetric Characteristics
-
Strength of a Stream Cipher
-
Let’s Dive in Deeper
-
Block Cipher Modes – CFB and OFB
-
Implementation
-
Attack Vectors
-
More Attacks (Cryptanalysis)
-
ROT – 13
-
ROT – 13
-
MD5 Collision Creates Rogue Certificate Authority
-
SSL/TLS
-
SSL Connection Setup
-
SSL Hybrid Encryption
-
SSH
-
XOR
Module 7- Cryptosystems
-
Introduction
-
Encryption
-
Cryptographic Definitions
-
Encryption Algorithm
-
Implementation
-
Hashing
-
Common Hash Algorithms
-
Birthday Attack
-
Example of a Birthday Attack
-
Generic Hash Demo
-
Instructor Demonstration
-
Security Issues in Hashing
-
Hash Collisions
-
MD5 Collision Creates Rogue Certificate Authority
-
Digital Signatures
-
Asymmetric Encryption
-
Public Key Cryptography Advantages
-
Asymmetric Algorithm Disadvantages
-
Asymmetric Algorithm Examples
-
Symmetric Encryption
-
Symmetric Encryption
-
Symmetric Downfalls
-
Symmetric Algorithms
-
Crack Times
Module 8 – Digital Acquisition
-
Digital Acquisition Copy – Original
-
Digital Acquisition – Duplication
-
Digital Acquisition Procedures
-
DC3 Operations
-
DCFL Terabytes, Time, & Totals
-
Digital Forensic Analysis Tools
-
Forensic Toolkit (FTK)™
-
EnCase™
-
I-Look Investigator™
-
ProDiscover DFT™
Module 9 – DNS
-
Domain Name Registration
-
Network Service – DNS
-
Countermeasure: DNS Zone Transfers
-
Cache Poisoning
-
What is DNS spoofing?
-
Tools: DNS Spoofing
-
Active Sniffing Methods
-
ARP Cache Poisoning
-
ARP Normal Operation
-
ARP Cache Poisoning
-
ARP Cache Poisoning (Linux)
-
Countermeasures
-
Cybersquatting
-
Domain Hijacking
-
Host Names
-
Hierarchy
-
Host Table
-
Nslookup
-
DNS Databases
-
Using Nslookup
-
Dig for Unix / Linux
-
Protecting Domain Names
-
(Mis)Uses of Host Tables
-
Module 10 – Disaster Recovery and Business Continuity Planning
-
Business Continuity Objectives
-
Pieces of the BCP
-
Where Do We Start?
-
Why Is BCP a Hard Sell to Management?
-
Agenda
-
Plan Development Delegated to a Committee
-
BCP Risk Analysis
-
How to Identify the Most Critical Company Functions
-
Interdependencies
-
Identifying Functions’ Resources
-
How Long Can the Company Be Without These Resources?
-
Preventative Measures
-
What Items Need to Be Considered?
-
Proper Planning
-
Executive Succession Planning
-
Identify Vulnerabilities and Threats
-
Categories
-
Loss Criteria
-
Agenda
-
Disk Shadowing
-
Backing Up Over Telecommunication
-
Serial Lines
-
HSM
-
SAN
-
Co-Location
-
Agenda
-
Facility Backups – Hot Site
-
Facility Backups – Warm Site
-
Facility Backups – Cold Site
-
Compatibility Issues with Offsite Facility
-
Which Do We Use?
-
Choosing Offsite Services
-
Subscription Costs
-
Choosing Site Location
-
Other Offsite Approaches
-
Agenda
-
Results from the BIA
-
Now What?
-
Priorities
-
Plan Objectives
-
Defining Roles
-
Environment
-
Operational Planning
-
Preventive Measures
-
Emergency Response
-
Recovery
-
Return to Normal Operations
-
Reviewing Insurance
-
When Is the Danger Over?
-
Now What?
-
Testing and Drills
-
Types of Tests to Choose From
-
What Is Success?
-
BCP Plans Commonly and Quickly
-
Become Out of Date
-
Phases of Plan
-
Who Is Ready?
-
Review
Module 11 – Endpoint Security
-
3rd Party Applications
-
Anti-Virus Limitations
-
Browser Defense
-
SSL/TLS
-
SSL Connection Setup
-
SSL Hybrid Encryption
-
SSH
-
IPSec – Network Layer Protection
-
IPSec
-
IPSec
-
Public Key Infrastructure
-
Quantum Cryptography
-
Endpoint Whitelist
-
Firewalls, IDS and IPS
-
Firewall – First line of defense
-
IDS – Second line of defense
-
IPS – Last line of defense?
-
Firewalls
-
Firewall Types: (1) Packet Filtering
-
Firewall Types: (2) Proxy Firewalls
-
Firewall Types – Circuit-Level Proxy Firewall
-
Type of Circuit-Level Proxy – SOCKS
-
Firewall Types – Application-Layer Proxy
-
Firewall Types: (3) Stateful
-
Firewall Types: (4) Dynamic Packet-Filtering
-
Firewall Types: (5) Kernel Proxies
-
Firewall Placement
-
Firewall Architecture Types – Screened Host
-
Risks of Portable Devices
Module 12 – Honeypots, Honeynets, Honeytokens, Tarpits, oh my
-
Benefits and Drawbacks
-
Honeypots Defined
-
Legal Issues
-
Trying to Trap the Bad Guy
-
Companies Can Be Found Liable
-
Technologies
-
Incident Handling and the Legal System 481
-
Chain of Custody and Digital Evidence Collection Objectives
-
Evidence Collection & Incident Assessment
-
Identifying an Incident
-
Steps to handling an Incident
-
Digital Incident Assessment
-
Incident Response Checklist
-
Responding to An Incident
-
Suggested Guidelines for Securing Digital Evidence
-
Secure Digital Evidence
-
Common Incident Handling Mistakes
-
Securing Digital Evidence Procedure
-
Chain of Custody
-
Potential Digital Evidence
-
Search and Seizure
-
Incident/Equipment Location
-
Available Response Resources
-
Securing Digital Evidence
-
Digital Evidence Presentation
-
The Best Evidence Rule
-
Duplication and Recordings, Evidence Law
Module 13 – IP Terms and Concepts
-
OSI – Application Layer
-
Devices Work at Different Layers
-
Network Devices – Gateway
-
Data Encapsulation
-
Protocols – ICMP
-
Dial-Up Protocol – SLIP
-
Dial-Up Protocol – PPP
-
WAN Technologies Are Circuit
-
or Packet Switched
-
Packets
-
Frame
-
Protocols – ICMP
-
Port and Protocol Relationship
-
Example Packet Sniffers
-
Tool: Wireshark
-
Tool: OmniPeek
-
Sniffer Detection using Cain & Abel
-
Network Protocol
-
Network Protocol
-
Protocols
-
UDP versus TCP
-
Port and Protocol Relationship
-
An Older Model
-
TCP/IP Suite
-
Traceroute Operation
-
Traceroute (cont.)
-
Other Traceroute Tools
-
IP
-
IP
-
Method: Ping
Module 14 – Logging
Module 15 – Malicious Software
-
Malware
-
Types of Malware
-
Distributing Malware
-
Malware Capabilities
-
Auto Starting Malware
-
Countermeasure: Monitoring Auto-start Methods
-
Malicious Browser Content
-
Malware Defense Techniques
-
Spy Sweeper Enterprise
-
CM Tool: Port Monitoring Software
-
CM Tools: File Protection Software
-
CM Tool: Windows File Protection
-
CM Tool: Windows Software
-
Restriction Policies
-
Company Surveillance Software
-
CM Tool: Hardware-based Malware
-
Detectors
-
Countermeasure: User Education
-
Propagation Techniques
-
Trojan Horse Characteristics
-
Trojan Horses
-
Executable Wrappers
-
Benign EXE’s Historically Wrapped with Trojans
-
The Infectious CD-Rom Technique
-
Trojan: Backdoor.Zombam.B
-
Trojan: JPEG GDI+
-
All in One Remote Exploit
-
Advanced Trojans: Avoiding Detection
-
BPMTK
-
Virus Types
-
Types of Malware Cont…
-
Types of Viruses
-
Worm Characteristics
Module 16 – Managing Security Policy
-
Approach to Security Management
-
Policy Types
-
Policies with Different Goals
-
Industry Best Practice Standards
-
Components that Support the Security Policy
-
Senior Management’s Role in Security
-
Security Roles
-
Information Classification
-
Information Classification Criteria
-
Declassifying Information
-
Types of Classification Levels
-
Information Classification
-
Issue Specific Policy
-
Policy Assessment
-
Policy Benefits
-
Policy Development Tools
-
Security Posture and Culture
Module 17 – Methods of Attack
-
Enumeration Overview
-
DNS Enumeration
-
Backtrack DNS Enumeration
-
SNMP Enumeration Tools
-
SNMP Enumeration Countermeasures
-
Active Directory Enumeration
-
AD Enumeration countermeasures
-
Hacking Tool: RootKit
-
Windows RootKit Countermeasures
-
Advanced Trojans: Avoiding Detection
-
Benign EXE’s Historically Wrapped with Trojans
-
Google and Query Operators
-
Google (cont.)
-
SPUD: Google API Utility Tool
-
Goolag
-
Denial of Service
-
Denial of Service
-
Threat Methodologies (STRIDE)
-
DDoS Issues
-
DDoS
-
Buffer Overflow Definition
-
Overflow Illustration
-
Buffer OverFlows
-
Phishing
-
Spear Phishing
-
E-Mail Links
-
Logic Bomb
-
Duronio Case
-
Attacks
-
Man-in-the Middle
-
Replay Attack
-
SPAM and e-mail Flooding
Module 18 – Mitnick-Shimomura
-
IP Address Spoofing
-
TCP
-
DoS
Module 19 – Physical Security
-
Physical Security
-
Physical Security Checklist
-
Physical Security Checklist
-
Items of Interest
-
Physical Controls
-
Physical Access
-
Tool Kit: Picks
-
Tool Kit: Snap Gun
-
Tool Kit: Electric Pick
-
Bump Keying
-
Lock Picking Countermeasures
-
Controlling Access
-
Agenda
-
Facility Attributes
-
Electrical Power
-
Problems with Steady Power Current
-
Power Interference
-
Power Preventive Measures
-
Fire Prevention
-
Automatic Detector Mechanisms
-
Fire Detection
-
Fire Types
-
Suppression Methods
-
Fire Suppression
-
Fire Extinguishers
Module 20 – Risk Management & Security Frameworks
-
Overview
-
IT Governance Best Practices
-
IT Risk Management
-
Types of Risks
-
Risk Management
-
Information Security Risk Evaluation
-
Information Security Risk Evaluation
-
Improving Security Posture
-
Risk Evaluation Activities
-
Risk Assessment
-
Information Gathering
-
Information Gathering
-
Data Classification
-
Threats and Vulnerabilities
-
Analytical Methods
-
Evaluate Controls
-
Evaluate Controls
-
Risk Ratings
-
Important Risk Assessment Practices
-
Review
-
Security Incentives & Motivations
-
Security Incentives & Attack Motivations
-
Risk Management II
-
What is Your Weakest Link?
-
What Is the Value of an Asset?
-
Examples of Some Vulnerabilities that Are
-
Not Always Obvious
-
Categorizing Risks
-
Some Examples of Types of Losses
-
Different Approaches to Analyzing Risks
-
Who Uses What Analysis Type?
-
Qualitative Analysis Steps
-
Quantitative Analysis
-
Can a Purely Quantitative Analysis Be Accomplished?
-
Comparing Cost and Benefit
-
Cost of a Countermeasure
-
Security Frameworks & Compliance
-
ISO 27002
-
ISO 27002: Control Components
-
Review
Module 21 – Security and Organizational Structure
-
Capacity Analysis
-
Employee Discipline and Termination
-
Employee Performance
-
Employee Retention
-
Filling Positions
-
Conflicts of Interest
Module 22 – Security Awareness
-
Security Awareness Program
-
4 steps
-
3 Common Training Models
-
Security Awareness Goals
-
Role of metrics
-
Steps to develop a metrics program
Module 23 – Steganography
-
Crypto and Password Recovery Background
-
Steganalysis
-
Steganography Methods
-
Injection
-
Substitution
-
File Generation
Module 24 – The Intelligent Network – Unified Threat Management (UTM)
-
UTM product criteria
-
Firewalls, IDS and IPS
-
Firewall – First line of defense
-
IDS – Second line of defense
-
IPS – Last line of defense?
-
Firewalls
-
Firewall Types: (1) Packet Filtering
-
Firewall Types: (2) Proxy Firewalls
-
Firewall Types – Circuit-Level Proxy Firewall
-
DDoS Issues
-
HIPS
-
HIPS
-
Unified Threat Management
-
Unified Threat Management
-
Virtualization – Type 1
-
Type 1 Examples
-
Virtualization – Type 2
-
Type 2 Examples
Module 25 – Network Infrastructure
-
Wikto Web Assessment Tool
-
Agenda
-
Network Topologies – Physical Layer
-
Network Topologies – Mesh
-
Summary of Topologies
-
Wireless Technologies – War Driving
-
TCP Model
-
TCP/IP Suite
-
OSI Model
-
OSI – Application Layer
-
OSI – Presentation Layer
-
OSI – Session Layer
-
OSI – Transport Layer
-
OSI – Network Layer
-
OSI – Data Link
-
OSI – Physical Layer
-
Wide Area Network Technologies
-
Voice Over IP
-
VLAN
-
Network Segmentation
Module 26 – Vulnerability Assessment – Outside View
-
Basic Hacker Process
-
Potential Threats, Vulnerabilities, & Risks
-
What is a Penetration Test
-
Types of Penetration Testing
-
Vulnerability Assessment vs Pentest
-
“Hacking-life-cycle” – a Methodology
-
Methodology for Penetration
-
Testing / Ethical Hacking
-
Hacker vs. Penetration Tester
-
Not Just Tools
-
Exploitation Tools vs. Vulnerability Scanners
-
Vulnerability Scanners
-
Nessus
-
Nessus Report
-
SAINT
-
SAINT – Sample Report
-
Tool: Retina
-
Qualys Guard
-
Tool: LANguard
-
Number of Exploitable Vulnerabilities from NVD Detected
-
Scan Process Best Practices
-
Inside, outside and user view
-
Manager’s Role in Remediation
-
Risks of non-Remediation
-
Pentesting in Vulnerability Management
-
Scanning Techniques
-
Threat Concerns
-
Threat Vectors
-
War Dialing
Module 27 – Vulnerability Management – inside view
-
Inside view, tools, approach
-
org
-
SP 800-40 Version 2.0
Module 28- Vulnerability Management- User View
-
Peer to Peer Networks
-
P2P Cautions
-
Instant Messaging
-
IM issues
-
Social engineering
Module 29 – Web Communications
-
CGI
-
Wikto Web Assessment Tool
-
OWASP Top 10 for 2010
-
Reflected Cross Site Scripting Illustrated
-
IIS Directory Traversal
-
Injection Flaws
-
SQL Injection
-
Cookies
-
HTTP
-
HTTPS
-
FTP
Module 30 – Wireless Advantages and Bluetooth
-
Bluetooth Attacks
-
Cabir Infection
-
Bluetooth Defenses
-
Bluetooth & Wireless Comparison