SlideShare a Scribd company logo
1 of 29
Good Security is Annoying
Presented by: Nick Lane

January 23rd, 2014
Welcome!
Who belongs here?
•
•
•

IT beginners
IT professionals
Office workers

What will you learn?
•
•
•
•

Who is New Horizons Computer Learning Centers
Security basics
Importance of security
Training options
Who is New Horizons?
Facts to Consider
•
•
•

•
•
•
Strong Vendor Partnerships
Instructor
Nicholas Lane
•
•
•
•

Technical Instructor at New Horizons of Southern California
Two-time “Top 25 Technical Instructor in the World”
New Horizons trainer since 2005
IT certified since 1998

Certifications:
•
•
•
•
•
•

CEI
CEH
UKICI
MCT
MCITP
MCSE

•
•
•
•
•
•

MCSA
MCTS
MCP
MOS
SMSP
Cloud Essentials

•
•
•
•

Cloud+
Security+
Network+
A+
• Security sure seems annoying!
• Increasing security decreases our freedoms
• Increasing security decreases our ease of use
• Increasing security decreases our functionalities
So…who found themselves too
annoyed to implement good
security recently?
Because………
The default usernames and passwords weren’t
changed on many of the point-of-sales terminals
in their stores.
As a result…….
My credit card
was stolen
Oh and….

.... other credit cards too
The truth is good security is annoying for
us but it is more annoying for the enemy.
 Increasing security decreases enemy freedoms more
 Increasing security decreases enemy ease of use more
 Increasing security decreases enemy functionality more!
Security Basics: The infamous security
triangle and the dot……
Security Basics: The other triangle……
Security Basics: Who are you and how do I
know?
Security Basics: Security is like an onion
because it is best implemented in layers.
Source:
www.stopthehacker.com
Training options:
40032 Networking and Security Fundamentals
50094 Deploying and Administering Microsoft Forefront Security
5049 Managing Messaging Security using Microsoft Exchange Server 2007

Certified Ethical Hacker (CEH) v8.0
Certified Information Security Manager (CISM)

Certified Information System Security Professional (CISSP)
Cisco® Deploying Cisco® ASA Firewall Features v2.0 (FIREWALL)
Cisco® Deploying Cisco® ASA VPN Solutions v2.0 (VPN)
Cisco® Implementing Cisco® Intrusion Prevention System v7.0 (IPS)
Cisco® Implementing Cisco® IOS Network Security v2.0 (IINS)
Cisco® Securing Networks with Cisco® Routers and Switches v1.0 (SECURE)

CompTIA Advanced Security Practitioner (CASP)
CompTIA Security+ Certification
CompTIA Social Media Security Professional (SMSP)

Computer Hacking Forensics Investigator (CHFI) v8.0
Strategic Infrastructure Security
Systems Security Certified Practitioner (SSCP®)
VMware® vCloud Networking & Security for vSphere Professionals v5.1
Visit www.nhsocal.com and search for “security”
Courses, Outlines, Delivery Methods, Length, and Locations
Certified Ethical Hacker – Course Description
This class will immerse the students into an interactive environment where
they will be shown how to scan, test, hack and secure their own systems.
The lab intensive environment gives each student in-depth knowledge and
practical experience with the current essential security systems. Students
will begin by understanding how perimeter defenses work and then be lead
into scanning and attacking their own networks, no real network is harmed.
Students then learn how intruders escalate privileges and what steps can
be taken to secure a system. Students will also learn about Intrusion
Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer
Overflows and Virus Creation. When a student leaves this intensive 5 day
class they will have hands on understanding and experience in Ethical
Hacking. This course prepares you for EC-Council Certified Ethical Hacker
exam 312-50
Certified Ethical Hacker – Target Audience
This course will significantly benefit security
officers, auditors, security professionals, site
administrators, and anyone who is concerned
about the integrity of the network infrastructure.
Labs include latest OS’s, built-in instructions, and 24/7
access from anywhere
Questions?

More Related Content

What's hot

AISA Sydney Presentation - Would PT add value to the SDLC and why
AISA Sydney Presentation - Would PT add value to the SDLC and whyAISA Sydney Presentation - Would PT add value to the SDLC and why
AISA Sydney Presentation - Would PT add value to the SDLC and whyGergana (Kiryakova) Winzer
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentPECB
 
Outpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid themOutpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid themOutpost24
 
Compute Security - Host Security
Compute Security - Host SecurityCompute Security - Host Security
Compute Security - Host SecurityEng Teong Cheah
 
Virtual Networking Security - Network Security
Virtual Networking Security - Network SecurityVirtual Networking Security - Network Security
Virtual Networking Security - Network SecurityEng Teong Cheah
 
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROSécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROTelecomValley
 
ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!PECB
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001kmperkins85
 
security in development lifecycle
security in development lifecyclesecurity in development lifecycle
security in development lifecycleTelecomValley
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security TestingPECB
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
Manage Artifact Versioning, Security and Compliance
Manage Artifact Versioning, Security and ComplianceManage Artifact Versioning, Security and Compliance
Manage Artifact Versioning, Security and ComplianceEng Teong Cheah
 
Virtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter SecurityVirtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter SecurityEng Teong Cheah
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCRAW CYBER SECURITY PVT LTD
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsPECB
 
API Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About ThemAPI Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About ThemEoin Woods
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectEoin Woods
 

What's hot (20)

AISA Sydney Presentation - Would PT add value to the SDLC and why
AISA Sydney Presentation - Would PT add value to the SDLC and whyAISA Sydney Presentation - Would PT add value to the SDLC and why
AISA Sydney Presentation - Would PT add value to the SDLC and why
 
Matriux
MatriuxMatriux
Matriux
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
 
Outpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid themOutpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid them
 
Compute Security - Host Security
Compute Security - Host SecurityCompute Security - Host Security
Compute Security - Host Security
 
Virtual Networking Security - Network Security
Virtual Networking Security - Network SecurityVirtual Networking Security - Network Security
Virtual Networking Security - Network Security
 
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROSécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
 
ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001
 
security in development lifecycle
security in development lifecyclesecurity in development lifecycle
security in development lifecycle
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security Testing
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
Kevin wharram
Kevin wharramKevin wharram
Kevin wharram
 
Security it trans
Security it transSecurity it trans
Security it trans
 
Manage Artifact Versioning, Security and Compliance
Manage Artifact Versioning, Security and ComplianceManage Artifact Versioning, Security and Compliance
Manage Artifact Versioning, Security and Compliance
 
Virtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter SecurityVirtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter Security
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
 
API Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About ThemAPI Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About Them
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
 

Similar to Good Security Training Options

The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security PractitionerAdrian Sanabria
 
Most Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex TrainingMost Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex TrainingBryan Len
 
!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptxssuserf9358d
 
How cisco ccie certification can transform your career ?
How cisco ccie certification can transform your career ?How cisco ccie certification can transform your career ?
How cisco ccie certification can transform your career ?Network Bulls
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingTonex
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiCRAW CYBER SECURITY PVT LTD
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systemsTonex
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In SecurityPrasanna V
 
1640925838308_IT Courses Non-IT Courses.pdf
1640925838308_IT Courses Non-IT Courses.pdf1640925838308_IT Courses Non-IT Courses.pdf
1640925838308_IT Courses Non-IT Courses.pdfITkurd1
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...Firojali Laskar
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...Susan Hannan
 
Security Operation Centre Specialist Course Content
Security Operation Centre Specialist Course ContentSecurity Operation Centre Specialist Course Content
Security Operation Centre Specialist Course ContentInfosec train
 
Security operations center_Specialist_training_course_content
Security operations center_Specialist_training_course_contentSecurity operations center_Specialist_training_course_content
Security operations center_Specialist_training_course_contentpriyanshamadhwal2
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security CertificationVskills
 

Similar to Good Security Training Options (20)

Activity1 c1
Activity1 c1Activity1 c1
Activity1 c1
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
Most Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex TrainingMost Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex Training
 
!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx
 
How cisco ccie certification can transform your career ?
How cisco ccie certification can transform your career ?How cisco ccie certification can transform your career ?
How cisco ccie certification can transform your career ?
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In Security
 
1640925838308_IT Courses Non-IT Courses.pdf
1640925838308_IT Courses Non-IT Courses.pdf1640925838308_IT Courses Non-IT Courses.pdf
1640925838308_IT Courses Non-IT Courses.pdf
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
 
Ccsk course content v1
Ccsk course content v1Ccsk course content v1
Ccsk course content v1
 
Datasheet
DatasheetDatasheet
Datasheet
 
Security Operation Centre Specialist Course Content
Security Operation Centre Specialist Course ContentSecurity Operation Centre Specialist Course Content
Security Operation Centre Specialist Course Content
 
Security operations center_Specialist_training_course_content
Security operations center_Specialist_training_course_contentSecurity operations center_Specialist_training_course_content
Security operations center_Specialist_training_course_content
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
Ecsa LPT V8 brochure
Ecsa LPT V8 brochureEcsa LPT V8 brochure
Ecsa LPT V8 brochure
 

More from McOWLMarketing

top 5 ways sharepoint can help your business
top 5 ways sharepoint can help your businesstop 5 ways sharepoint can help your business
top 5 ways sharepoint can help your businessMcOWLMarketing
 
Lean Six Sigma White Belt Webinar
Lean Six Sigma White Belt WebinarLean Six Sigma White Belt Webinar
Lean Six Sigma White Belt WebinarMcOWLMarketing
 
2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deck2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deckMcOWLMarketing
 
2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deckMcOWLMarketing
 
2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deckMcOWLMarketing
 
Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control McOWLMarketing
 
SharePoint Governance Slide Deck 1.16.2014
SharePoint Governance Slide Deck 1.16.2014SharePoint Governance Slide Deck 1.16.2014
SharePoint Governance Slide Deck 1.16.2014McOWLMarketing
 

More from McOWLMarketing (8)

top 5 ways sharepoint can help your business
top 5 ways sharepoint can help your businesstop 5 ways sharepoint can help your business
top 5 ways sharepoint can help your business
 
Citrix Sales Training
Citrix Sales TrainingCitrix Sales Training
Citrix Sales Training
 
Lean Six Sigma White Belt Webinar
Lean Six Sigma White Belt WebinarLean Six Sigma White Belt Webinar
Lean Six Sigma White Belt Webinar
 
2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deck2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deck
 
2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck
 
2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck
 
Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control
 
SharePoint Governance Slide Deck 1.16.2014
SharePoint Governance Slide Deck 1.16.2014SharePoint Governance Slide Deck 1.16.2014
SharePoint Governance Slide Deck 1.16.2014
 

Recently uploaded

办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一F La
 
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdfobuhobo
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of JobRemote DBA Services
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012rehmti665
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证nhjeo1gg
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一A SSS
 
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptfrfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptSURYAKANTSAHDEO
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...Suhani Kapoor
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
How to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdfHow to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdfmayank158542
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfpadillaangelina0023
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 

Recently uploaded (20)

办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
 
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Job
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
 
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
 
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptfrfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
How to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdfHow to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdf
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdf
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
 

Good Security Training Options

  • 1. Good Security is Annoying Presented by: Nick Lane January 23rd, 2014
  • 2. Welcome! Who belongs here? • • • IT beginners IT professionals Office workers What will you learn? • • • • Who is New Horizons Computer Learning Centers Security basics Importance of security Training options
  • 3. Who is New Horizons?
  • 6. Instructor Nicholas Lane • • • • Technical Instructor at New Horizons of Southern California Two-time “Top 25 Technical Instructor in the World” New Horizons trainer since 2005 IT certified since 1998 Certifications: • • • • • • CEI CEH UKICI MCT MCITP MCSE • • • • • • MCSA MCTS MCP MOS SMSP Cloud Essentials • • • • Cloud+ Security+ Network+ A+
  • 7. • Security sure seems annoying!
  • 8. • Increasing security decreases our freedoms • Increasing security decreases our ease of use • Increasing security decreases our functionalities
  • 9. So…who found themselves too annoyed to implement good security recently?
  • 10.
  • 12. The default usernames and passwords weren’t changed on many of the point-of-sales terminals in their stores.
  • 15. Oh and…. .... other credit cards too
  • 16. The truth is good security is annoying for us but it is more annoying for the enemy.  Increasing security decreases enemy freedoms more  Increasing security decreases enemy ease of use more  Increasing security decreases enemy functionality more!
  • 17. Security Basics: The infamous security triangle and the dot……
  • 18. Security Basics: The other triangle……
  • 19. Security Basics: Who are you and how do I know?
  • 20. Security Basics: Security is like an onion because it is best implemented in layers.
  • 22. Training options: 40032 Networking and Security Fundamentals 50094 Deploying and Administering Microsoft Forefront Security 5049 Managing Messaging Security using Microsoft Exchange Server 2007 Certified Ethical Hacker (CEH) v8.0 Certified Information Security Manager (CISM) Certified Information System Security Professional (CISSP) Cisco® Deploying Cisco® ASA Firewall Features v2.0 (FIREWALL) Cisco® Deploying Cisco® ASA VPN Solutions v2.0 (VPN) Cisco® Implementing Cisco® Intrusion Prevention System v7.0 (IPS) Cisco® Implementing Cisco® IOS Network Security v2.0 (IINS) Cisco® Securing Networks with Cisco® Routers and Switches v1.0 (SECURE) CompTIA Advanced Security Practitioner (CASP) CompTIA Security+ Certification CompTIA Social Media Security Professional (SMSP) Computer Hacking Forensics Investigator (CHFI) v8.0 Strategic Infrastructure Security Systems Security Certified Practitioner (SSCP®) VMware® vCloud Networking & Security for vSphere Professionals v5.1
  • 23. Visit www.nhsocal.com and search for “security”
  • 24. Courses, Outlines, Delivery Methods, Length, and Locations
  • 25. Certified Ethical Hacker – Course Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
  • 26. Certified Ethical Hacker – Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
  • 27. Labs include latest OS’s, built-in instructions, and 24/7 access from anywhere
  • 28.