Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Computer Security - CCNA Security - Lecture 1

577 views

Published on

We will discuss the following: CCNAS Overview, Threats Landscape, Hackers Tools, Tools. Kali Linux Parrot Linux Cisco Packet Tracer Wireshark Denial of Service
Distributed DoS
Man In The Middle
Phishing
Vishing
Smishing
Pharming
Sniffer
Password Attack

Published in: Education
  • Be the first to comment

Computer Security - CCNA Security - Lecture 1

  1. 1. CCNA Security CCNA Security Overview
  2. 2. CCNA Security
  3. 3. CCNA Security
  4. 4. CCNA Security
  5. 5. CCNA Security
  6. 6. CCNA Security Chapter 1: Modern Network Security Threats Chapter 2: Securing Network Devices Chapter 3: Authentication, Authorization, and Accounting Chapter 4: Implementing Firewall Technologies Chapter 5: Implementing Intrusion Prevention Chapter 6: Securing the Local-Area Network Chapter 7: Cryptographic Systems Chapter 8: Implementing Virtual Private Networks Chapter 9: Implementing the Cisco Adaptive Security Appliance Chapter 10: Advanced Cisco Adaptive Security Appliance Chapter 11: Managing a Secure Network
  7. 7. CCNA Security CCNAS Overview
  8. 8. CCNA Security
  9. 9. CCNA Security
  10. 10. CCNA Security
  11. 11. CCNA Security
  12. 12. CCNA Security
  13. 13. CCNA Security
  14. 14. CCNA Security
  15. 15. CCNA Security
  16. 16. CCNA Security
  17. 17. CCNA Security
  18. 18. CCNA Security
  19. 19. CCNA Security
  20. 20. CCNA Security
  21. 21. CCNA Security
  22. 22. CCNA Security Threats Landscape
  23. 23. CCNA Security Denial of Service Distributed DoS Man In The Middle Phishing Vishing Smishing Pharming Sniffer Password Attack
  24. 24. CCNA Security Denial of Service (DOS) try to make computer or network resource unavailable for valid user. Using: 1) TCP SYN Flood 2) Ping of Death
  25. 25. CCNA Security
  26. 26. CCNA Security A distributed denial-of-service (DDoS) is a DoS attack where the attacker uses more than one unique IP address (Zombie), often thousands of them.
  27. 27. CCNA Security
  28. 28. CCNA Security Man in the middle attack (MITM) is an attack where the attacker secretly alters the communication between two parties who believe they are directly communicating with each other.
  29. 29. CCNA Security
  30. 30. CCNA Security Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money).
  31. 31. CCNA Security
  32. 32. CCNA Security  Vishing: phishing that uses voice and the phone system as its medium instead of e-mail.  Smishing: phishing that uses SMS texting as its medium instead of e-mail.  Pharming: Lures victims by compromising DNS.
  33. 33. CCNA Security A sniffer is an application or device that can read, monitor, and capture network data exchanges and read network packets.
  34. 34. CCNA Security
  35. 35. CCNA Security Guessing  weak passwords Dictionary-attack  common passwords Brute-force attack  short-length passwords
  36. 36. CCNA Security  Data modification  IP address spoofing  Compromised-key  Eavesdropping  Reconnaissance Attacks  Reflection attack  Amplification Attack
  37. 37. CCNA Security Hackers Tools
  38. 38. CCNA Security Kali Linux is a Debian-derived Linux distribution designed for digital forensics, penetration testing and Ethical Hacking.
  39. 39. CCNA Security
  40. 40. CCNA Security Parrot Security OS (or ParrotSec) is a Linux distribution based on Debian with a focus on computer security. It is designed for penetration testing, vulnerability assessment and mitigation, computer forensics and anonymous web browsing.
  41. 41. CCNA Security
  42. 42. CCNA Security http://sectools.org http://www.metasploit.com
  43. 43. CCNA Security Tools
  44. 44. CCNA Security Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network simulation and visualization tool.
  45. 45. CCNA Security
  46. 46. CCNA Security Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.
  47. 47. CCNA Security
  48. 48. CCNA Security facebook.com/mloey mohamedloey@gmail.com twitter.com/mloey linkedin.com/in/mloey mloey@fci.bu.edu.eg mloey.github.io
  49. 49. CCNA Security www.YourCompany.com © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME

×