SlideShare a Scribd company logo
Good Security is Annoying
Presented by: Nick Lane

January 23rd, 2014
Welcome!
Who belongs here?
•
•
•

IT beginners
IT professionals
Office workers

What will you learn?
•
•
•
•

Who is New Horizons Computer Learning Centers
Security basics
Importance of security
Training options
Who is New Horizons?
Facts to Consider
•
•
•

•
•
•
Strong Vendor Partnerships
Instructor
Nicholas Lane
•
•
•
•

Technical Instructor at New Horizons of Southern California
Two-time “Top 25 Technical Instructor in the World”
New Horizons trainer since 2005
IT certified since 1998

Certifications:
•
•
•
•
•
•

CEI
CEH
UKICI
MCT
MCITP
MCSE

•
•
•
•
•
•

MCSA
MCTS
MCP
MOS
SMSP
Cloud Essentials

•
•
•
•

Cloud+
Security+
Network+
A+
• Security sure seems annoying!
• Increasing security decreases our freedoms
• Increasing security decreases our ease of use
• Increasing security decreases our functionalities
So…who found themselves too
annoyed to implement good
security recently?
Because………
The default usernames and passwords weren’t
changed on many of the point-of-sales terminals
in their stores.
As a result…….
My credit card
was stolen
Oh and….

.... other credit cards too
The truth is good security is annoying for
us but it is more annoying for the enemy.
 Increasing security decreases enemy freedoms more
 Increasing security decreases enemy ease of use more
 Increasing security decreases enemy functionality more!
Security Basics: The infamous security
triangle and the dot……
Security Basics: The other triangle……
Security Basics: Who are you and how do I
know?
Security Basics: Security is like an onion
because it is best implemented in layers.
Source:
www.stopthehacker.com
Training options:
40032 Networking and Security Fundamentals
50094 Deploying and Administering Microsoft Forefront Security
5049 Managing Messaging Security using Microsoft Exchange Server 2007

Certified Ethical Hacker (CEH) v8.0
Certified Information Security Manager (CISM)

Certified Information System Security Professional (CISSP)
Cisco® Deploying Cisco® ASA Firewall Features v2.0 (FIREWALL)
Cisco® Deploying Cisco® ASA VPN Solutions v2.0 (VPN)
Cisco® Implementing Cisco® Intrusion Prevention System v7.0 (IPS)
Cisco® Implementing Cisco® IOS Network Security v2.0 (IINS)
Cisco® Securing Networks with Cisco® Routers and Switches v1.0 (SECURE)

CompTIA Advanced Security Practitioner (CASP)
CompTIA Security+ Certification
CompTIA Social Media Security Professional (SMSP)

Computer Hacking Forensics Investigator (CHFI) v8.0
Strategic Infrastructure Security
Systems Security Certified Practitioner (SSCP®)
VMware® vCloud Networking & Security for vSphere Professionals v5.1
Visit www.nhsocal.com and search for “security”
Courses, Outlines, Delivery Methods, Length, and Locations
Certified Ethical Hacker – Course Description
This class will immerse the students into an interactive environment where
they will be shown how to scan, test, hack and secure their own systems.
The lab intensive environment gives each student in-depth knowledge and
practical experience with the current essential security systems. Students
will begin by understanding how perimeter defenses work and then be lead
into scanning and attacking their own networks, no real network is harmed.
Students then learn how intruders escalate privileges and what steps can
be taken to secure a system. Students will also learn about Intrusion
Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer
Overflows and Virus Creation. When a student leaves this intensive 5 day
class they will have hands on understanding and experience in Ethical
Hacking. This course prepares you for EC-Council Certified Ethical Hacker
exam 312-50
Certified Ethical Hacker – Target Audience
This course will significantly benefit security
officers, auditors, security professionals, site
administrators, and anyone who is concerned
about the integrity of the network infrastructure.
Labs include latest OS’s, built-in instructions, and 24/7
access from anywhere
Questions?

More Related Content

What's hot

AISA Sydney Presentation - Would PT add value to the SDLC and why
AISA Sydney Presentation - Would PT add value to the SDLC and whyAISA Sydney Presentation - Would PT add value to the SDLC and why
AISA Sydney Presentation - Would PT add value to the SDLC and whyGergana (Kiryakova) Winzer
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
PECB
 
Outpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid themOutpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24
 
Compute Security - Host Security
Compute Security - Host SecurityCompute Security - Host Security
Compute Security - Host Security
Eng Teong Cheah
 
Virtual Networking Security - Network Security
Virtual Networking Security - Network SecurityVirtual Networking Security - Network Security
Virtual Networking Security - Network Security
Eng Teong Cheah
 
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROSécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
TelecomValley
 
ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!
PECB
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001kmperkins85
 
security in development lifecycle
security in development lifecyclesecurity in development lifecycle
security in development lifecycle
TelecomValley
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security Testing
PECB
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Elasticsearch
 
Kevin wharram
Kevin wharramKevin wharram
Kevin wharram
Kevin Wharram
 
Security it trans
Security it transSecurity it trans
Security it trans
Prasad Shevate
 
Manage Artifact Versioning, Security and Compliance
Manage Artifact Versioning, Security and ComplianceManage Artifact Versioning, Security and Compliance
Manage Artifact Versioning, Security and Compliance
Eng Teong Cheah
 
Virtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter SecurityVirtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter Security
Eng Teong Cheah
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
CRAW CYBER SECURITY PVT LTD
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
PECB
 
API Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About ThemAPI Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About Them
Eoin Woods
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
Eoin Woods
 

What's hot (20)

AISA Sydney Presentation - Would PT add value to the SDLC and why
AISA Sydney Presentation - Would PT add value to the SDLC and whyAISA Sydney Presentation - Would PT add value to the SDLC and why
AISA Sydney Presentation - Would PT add value to the SDLC and why
 
Matriux
MatriuxMatriux
Matriux
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
 
Outpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid themOutpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 Webinar - Common wireless security threats and how to avoid them
 
Compute Security - Host Security
Compute Security - Host SecurityCompute Security - Host Security
Compute Security - Host Security
 
Virtual Networking Security - Network Security
Virtual Networking Security - Network SecurityVirtual Networking Security - Network Security
Virtual Networking Security - Network Security
 
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROSécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
 
ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001
 
security in development lifecycle
security in development lifecyclesecurity in development lifecycle
security in development lifecycle
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security Testing
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
Kevin wharram
Kevin wharramKevin wharram
Kevin wharram
 
Security it trans
Security it transSecurity it trans
Security it trans
 
Manage Artifact Versioning, Security and Compliance
Manage Artifact Versioning, Security and ComplianceManage Artifact Versioning, Security and Compliance
Manage Artifact Versioning, Security and Compliance
 
Virtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter SecurityVirtual Networking Security - Perimeter Security
Virtual Networking Security - Perimeter Security
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
 
API Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About ThemAPI Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About Them
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
 

Similar to Good Info Security is Annoying!

Activity1 c1
Activity1 c1Activity1 c1
Activity1 c1
FORMAEMPLEO
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
Adrian Sanabria
 
Most Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex TrainingMost Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex Training
Bryan Len
 
!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx
ssuserf9358d
 
How cisco ccie certification can transform your career ?
How cisco ccie certification can transform your career ?How cisco ccie certification can transform your career ?
How cisco ccie certification can transform your career ?
Network Bulls
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
Tonex
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
CRAW CYBER SECURITY PVT LTD
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
Tonex
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
Lucideus Tech
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
Global Knowledge Training
 
Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In Security
Prasanna V
 
1640925838308_IT Courses Non-IT Courses.pdf
1640925838308_IT Courses Non-IT Courses.pdf1640925838308_IT Courses Non-IT Courses.pdf
1640925838308_IT Courses Non-IT Courses.pdf
ITkurd1
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
Firojali Laskar
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...Susan Hannan
 
Ccsk course content v1
Ccsk course content v1Ccsk course content v1
Ccsk course content v1
ShivamSharma909
 
Datasheet
DatasheetDatasheet
Datasheet
Carlos urrea
 
Security Operation Centre Specialist Course Content
Security Operation Centre Specialist Course ContentSecurity Operation Centre Specialist Course Content
Security Operation Centre Specialist Course Content
Infosec train
 
Security operations center_Specialist_training_course_content
Security operations center_Specialist_training_course_contentSecurity operations center_Specialist_training_course_content
Security operations center_Specialist_training_course_content
priyanshamadhwal2
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
Vskills
 

Similar to Good Info Security is Annoying! (20)

Activity1 c1
Activity1 c1Activity1 c1
Activity1 c1
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
Most Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex TrainingMost Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex Training
 
!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx
 
How cisco ccie certification can transform your career ?
How cisco ccie certification can transform your career ?How cisco ccie certification can transform your career ?
How cisco ccie certification can transform your career ?
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In Security
 
1640925838308_IT Courses Non-IT Courses.pdf
1640925838308_IT Courses Non-IT Courses.pdf1640925838308_IT Courses Non-IT Courses.pdf
1640925838308_IT Courses Non-IT Courses.pdf
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
 
Ccsk course content v1
Ccsk course content v1Ccsk course content v1
Ccsk course content v1
 
Datasheet
DatasheetDatasheet
Datasheet
 
Security Operation Centre Specialist Course Content
Security Operation Centre Specialist Course ContentSecurity Operation Centre Specialist Course Content
Security Operation Centre Specialist Course Content
 
Security operations center_Specialist_training_course_content
Security operations center_Specialist_training_course_contentSecurity operations center_Specialist_training_course_content
Security operations center_Specialist_training_course_content
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
Ecsa LPT V8 brochure
Ecsa LPT V8 brochureEcsa LPT V8 brochure
Ecsa LPT V8 brochure
 

More from McOWLMarketing

top 5 ways sharepoint can help your business
top 5 ways sharepoint can help your businesstop 5 ways sharepoint can help your business
top 5 ways sharepoint can help your businessMcOWLMarketing
 
Lean Six Sigma White Belt Webinar
Lean Six Sigma White Belt WebinarLean Six Sigma White Belt Webinar
Lean Six Sigma White Belt Webinar
McOWLMarketing
 
2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deck2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deck
McOWLMarketing
 
2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck
McOWLMarketing
 
2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck
McOWLMarketing
 
Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control
McOWLMarketing
 
SharePoint Governance Slide Deck 1.16.2014
SharePoint Governance Slide Deck 1.16.2014SharePoint Governance Slide Deck 1.16.2014
SharePoint Governance Slide Deck 1.16.2014
McOWLMarketing
 

More from McOWLMarketing (8)

top 5 ways sharepoint can help your business
top 5 ways sharepoint can help your businesstop 5 ways sharepoint can help your business
top 5 ways sharepoint can help your business
 
Citrix Sales Training
Citrix Sales TrainingCitrix Sales Training
Citrix Sales Training
 
Lean Six Sigma White Belt Webinar
Lean Six Sigma White Belt WebinarLean Six Sigma White Belt Webinar
Lean Six Sigma White Belt Webinar
 
2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deck2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deck
 
2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck
 
2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck
 
Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control
 
SharePoint Governance Slide Deck 1.16.2014
SharePoint Governance Slide Deck 1.16.2014SharePoint Governance Slide Deck 1.16.2014
SharePoint Governance Slide Deck 1.16.2014
 

Recently uploaded

Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
LukeRoyak
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
Hector Del Castillo, CPM, CPMM
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
Bruce Bennett
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
yuhofha
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
Pushpendra Kumar
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
vencislavkaaa
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
FarzanaRbcomcs
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
Sheldon Byron
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
foismail170
 
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdfRECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
AlessandroMartins454470
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
andreakaterasco
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
foismail170
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
alexthomas971
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
Dr. Mary Askew
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
yuhofha
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
nidm599
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Dirk Spencer Corporate Recruiter LION
 
The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
ssuser3e63fc
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
23211a7274
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
pxyhy
 

Recently uploaded (20)

Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
 
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdfRECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
 
The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
 

Good Info Security is Annoying!

  • 1. Good Security is Annoying Presented by: Nick Lane January 23rd, 2014
  • 2. Welcome! Who belongs here? • • • IT beginners IT professionals Office workers What will you learn? • • • • Who is New Horizons Computer Learning Centers Security basics Importance of security Training options
  • 3. Who is New Horizons?
  • 6. Instructor Nicholas Lane • • • • Technical Instructor at New Horizons of Southern California Two-time “Top 25 Technical Instructor in the World” New Horizons trainer since 2005 IT certified since 1998 Certifications: • • • • • • CEI CEH UKICI MCT MCITP MCSE • • • • • • MCSA MCTS MCP MOS SMSP Cloud Essentials • • • • Cloud+ Security+ Network+ A+
  • 7. • Security sure seems annoying!
  • 8. • Increasing security decreases our freedoms • Increasing security decreases our ease of use • Increasing security decreases our functionalities
  • 9. So…who found themselves too annoyed to implement good security recently?
  • 10.
  • 12. The default usernames and passwords weren’t changed on many of the point-of-sales terminals in their stores.
  • 15. Oh and…. .... other credit cards too
  • 16. The truth is good security is annoying for us but it is more annoying for the enemy.  Increasing security decreases enemy freedoms more  Increasing security decreases enemy ease of use more  Increasing security decreases enemy functionality more!
  • 17. Security Basics: The infamous security triangle and the dot……
  • 18. Security Basics: The other triangle……
  • 19. Security Basics: Who are you and how do I know?
  • 20. Security Basics: Security is like an onion because it is best implemented in layers.
  • 22. Training options: 40032 Networking and Security Fundamentals 50094 Deploying and Administering Microsoft Forefront Security 5049 Managing Messaging Security using Microsoft Exchange Server 2007 Certified Ethical Hacker (CEH) v8.0 Certified Information Security Manager (CISM) Certified Information System Security Professional (CISSP) Cisco® Deploying Cisco® ASA Firewall Features v2.0 (FIREWALL) Cisco® Deploying Cisco® ASA VPN Solutions v2.0 (VPN) Cisco® Implementing Cisco® Intrusion Prevention System v7.0 (IPS) Cisco® Implementing Cisco® IOS Network Security v2.0 (IINS) Cisco® Securing Networks with Cisco® Routers and Switches v1.0 (SECURE) CompTIA Advanced Security Practitioner (CASP) CompTIA Security+ Certification CompTIA Social Media Security Professional (SMSP) Computer Hacking Forensics Investigator (CHFI) v8.0 Strategic Infrastructure Security Systems Security Certified Practitioner (SSCP®) VMware® vCloud Networking & Security for vSphere Professionals v5.1
  • 23. Visit www.nhsocal.com and search for “security”
  • 24. Courses, Outlines, Delivery Methods, Length, and Locations
  • 25. Certified Ethical Hacker – Course Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
  • 26. Certified Ethical Hacker – Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
  • 27. Labs include latest OS’s, built-in instructions, and 24/7 access from anywhere
  • 28.