A short introduction to the various fields of Information Security, along with a brief description of each minor filed, the responsibilities for people working in that field, the skills needed for entering the field and what kind of knowledge should be acquired. This presentation serves as an introduction only, and shouldn't by any mean be taken as a definitive guide to those minor fields or the major filed of information security.
18. What to Learn?
• Practices and methods of IT strategy, enterprise architecture and security architecture
• Security concepts related to DNS, routing, authentication, VPN, proxy services and DDOS mitigation
technologies
• ISO 27001/27002, ITIL and COBIT frameworks
• PCI, HIPAA, NIST, GLBA and SOX compliance assessments
• Windows, UNIX and Linux operating systems
• C, C++, C#, Java and/or PHP programming languages
• Firewall and intrusion detection/prevention protocols
• Secure coding practices, ethical hacking and threat modeling
• TCP/IP, computer networking, routing and switching
• Network security architecture development and definition
• Knowledge of third party auditing and cloud risk assessment methodologies.
23. “A penetration test, or pen test, is an attempt to
evaluate the security of an IT infrastructure by
safely trying to exploit vulnerabilities. These
vulnerabilities may exist in operating systems,
service and application flaws, improper
configurations, or risky end-user behavior.”
24. External Penetration Testing
Internal Penetration Testing
Application Penetration Testing
Mobile App Penetration Testing
Wireless Penetration Testing
Social Engineering Testing
32. What to Learn?
• Network skills, including TCP/IP-based network communications (much of modern forensics involves reading network traces)
• Windows, UNIX and Linux operating systems
• C, C++, C#, Java and similar programming languages
• Computer hardware and software systems
• Operating system installation, patching and configuration
• Backup and archiving technologies
• Cryptography principles
• eDiscovery tools (NUIX, Relativity, Clearwell, etc.)
• Forensic software applications (e.g. EnCase, FTK, Helix, Cellebrite, XRY, etc.)
• Data processing skills in electronic disclosure environments
• Evidence handling procedures and ACPO guidelines
• Cloud computing
35. What to Learn?
• An in-depth understanding of programming languages. These can
include C/C++, C#, Java/JSP, .NET, Perl, PHP, Ruby, Python, etc.
• CERT/CC, MITRE, Sun and NIST secure coding guidelines and
standards
• Software and web application development practices
• Penetration testing and vulnerability assessments
39. What to Learn?
• Knowledge of common L4-L7 protocols such as SSL, HTTP, DNS, SMTP and IPSec
• Strong understanding of firewall technologies
• Juniper/Cisco/Checkpoint
• Packet Shaper, Load Balancer and Proxy Server knowledge
• Intermediate to expert IDS/IPS knowledge
• TCP/IP, computer networking, routing and switching
• Network protocols and packet analysis tools
• Windows, UNIX and Linux operating systems
• Firewall and intrusion detection/prevention protocols
43. What to Learn?
• Operating System Concepts
• High Level & Low Level Programming (familiarity is fine, working knowledge not
required at first)
• Fundamentals of networking
• How to use the internet to perform research.
• Malware Analysis Tools.
• Learn about Malware itself.
47. What to Learn?
• Working knowledge of regulatory and industry data security standards (e.g.
FFIEC, HIPAA, PCI, NERC, SOX, NIST, EU/Safe Harbor and GLBA)
• ISO 27001/27002, ITIL and COBIT frameworks
• Windows, UNIX and Linux operating systems
• MSSQL and ORACLE databases
• C, C++, C#, Java and/or PHP programming languages
• ACL, IDEA and/or similar software programs for data analysis
• Fidelis, ArcSight, Niksun, Websense, ProofPoint, BlueCoat and/or similar auditing
and network defense tools
• Firewall and intrusion detection/prevention protocols