Öppna kurser

Cyber Security: Accessibility and Quality

Help your organization produce a comprehensive security posture by developing generally accepted practices. In this training course, you learn how perform security breaches with techniques from the FISMA Risk Management Framework, utilize protocol analyzers to track live attacks, analyze the effectiveness of security controls, and recommend improvements to block attacks.

Du kommer lära dig att:

  • Protect assets by selecting and managing effective security controls
  • Evaluate the thoroughness and quality of security controls
  • Do more than just "security theater"
  • Provide and monitor a comprehensive, strong defence
  • Integrate accessibility into services and environments

Recommended förkunskaper:

Previous experience in networking and TCP/IP protocol stack Technical background in networking and security terms

Kursbeskrivning:

Introduction

  • Applying defence in depth: tools, techniques and people
  • Comprehending FISMA and OMB oversight
  • Assimilating Risk Management Framework Security Life Cycle

Risk Management Framework

              Multi-tiered risk management

  • Organisation: Strategic risk management
  • Mission/Business: Tactical approach to risk
  • Information Systems

              Defining roles and responsibilities

  • Distinguishing hierarchy and key roles of risk management
  • Defining responsibilities assigned to specific roles
  • Separating roles and areas of responsibility

               Phases of risk management

  • Categorising information systems
  • Selecting security controls
  • Implementing security controls
  • Assessing security controls
  • Authorising information systems
  • Monitoring security controls

Information Assurance

              Introducing information assurance

  • Assuring security throughout the data life cycle
  • Integrating information assurance into software development
  • Building in "secure by design"
  • Implementing information assurance best practices
  • Ensuring component security

              Penetration testing and vulnerability assessments

  • Validating security functions and configuration
  • Finding weaknesses within systems before the attacker does

              Keeping current with information assurance

  • Full disclosure vs. responsible disclosure
  • Exploring vulnerability databases

Information Systems and Network Security

              Modularisation (the OSI 7 Layer Model)

  • Networking principles powering the Internet
  • Modelling a packet

               Confidentiality, integrity and availability across the network

  • Encrypting for confidentiality
  • Sniffing the network and protocol analysis
  • Modifying data via man-in-the-middle attacks

              Networking services and security

  • Poisoning the DNS cache
  • Incorporating core services including DHCP, ICMP, and ARP
  • Hardening the TCP/IP stack

Authentication and Access Control

Authenticating users

  • Managing factors of authentication (something you know, have or are)
  • Attacking passwords
  • Comprehending PKI and public key authentication systems
  • Evaluating the suitability of biometrics
  • Integrating multi-factor authentication

Authenticating hosts

  • Incorporating ARP, DHCP, DNS and protocol insecurities
  • Performing and detecting MAC and IP address spoofing
  • Achieving strong host authentication
  • Analysing Kerberos and IPSec

Cryptography

Encrypting and exercising integrity functions

  • Capitalising on asymmetric or Public Key cryptography
  • Applying symmetric cryptography
  • Exercising message digest functions for integrity

Certificates and Certification Authorities

  • Clarifying PKI and certificate fields
  • Publishing certificate revocation and certificate security

Digital signatures

  • Digitally signing for strong authentication
  • Proving authentication, integrity and non-repudiation

Accessibility

  • Promoting open data policies
  • Removing barriers to enhance accessibility for people
  • Enabling IT accessibility