computer security pro english course

44
Computer Security By Abdo and Roberts Professional English Communication November 2016 | DIN16SP OAMK

Upload: abdo-shajadi

Post on 06-Jan-2017

140 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Computer Security pro english course

Computer SecurityBy Abdo and Roberts

Professional English CommunicationNovember 2016 | DIN16SP

OAMK

Page 2: Computer Security pro english course

Or Insecurity?

Page 3: Computer Security pro english course

So you think you are secure?

Page 4: Computer Security pro english course

Think again!

Page 5: Computer Security pro english course

If you think like an attacker you can defend better...

Page 6: Computer Security pro english course
Page 7: Computer Security pro english course

You asking what is this colors?

Page 8: Computer Security pro english course
Page 9: Computer Security pro english course
Page 10: Computer Security pro english course

Who is a hacker?

Page 11: Computer Security pro english course

It’s not what you think it is!

Page 12: Computer Security pro english course

Hackers are the good ones!

Page 13: Computer Security pro english course

Crackers are the bad ones

Page 14: Computer Security pro english course

But they keep calling bad guys “hacker” in general

because of media

Page 15: Computer Security pro english course

And then there are colored hats!

Page 16: Computer Security pro english course
Page 17: Computer Security pro english course

What are their motivations?

Page 18: Computer Security pro english course

“White hat” hacker

Operate with permission to improve security

Page 19: Computer Security pro english course

“Grey hat” hacker

May violate ethical standards or laws, but without “bad” intentions

Page 20: Computer Security pro english course

“Black hat” hacker

Operate with “bad” intentions, for example, personal financial gain

Page 21: Computer Security pro english course
Page 22: Computer Security pro english course

HacktivistsHacktivists

Page 23: Computer Security pro english course

State sponsored hackers

Cyber warfare

Page 24: Computer Security pro english course

Spy hackers

Page 25: Computer Security pro english course
Page 26: Computer Security pro english course

Security by obscurity...

Page 27: Computer Security pro english course

How about NO?

Page 28: Computer Security pro english course
Page 29: Computer Security pro english course

BUT

Page 30: Computer Security pro english course
Page 31: Computer Security pro english course

Hackers are always one step ahead of you...

Page 32: Computer Security pro english course

Get the mindset

Page 33: Computer Security pro english course

Tools?

Page 34: Computer Security pro english course

Kali linux (kali.org)

Page 35: Computer Security pro english course

Areas?

Page 36: Computer Security pro english course

1. Computer forensics2. Cryptography3. Reverse engineering and vulnerability analysis4. Social engineering5. Penetration testing6. Malware analysis7. Security management

Page 37: Computer Security pro english course

Penetration testing

1. Information gathering (OSINT)2. Enumeration3. Exploit4. Report

Page 38: Computer Security pro english course

Certifications?

Page 39: Computer Security pro english course

1.OSCP (offensive-security.com)2.CEH3.Security+4.GIAC5.CISSPAnd ...

Page 40: Computer Security pro english course

How to be secure?

Page 41: Computer Security pro english course

1. password password password! 2. Updated antivirus3. Updated softwares4. Firewall5. There is no patch for human stupidity! :) lol

Page 42: Computer Security pro english course

Brain food

1. defcon.org2. social-engineer.org3. The first book: Penetration testing By Georgia

Weidman ISBN: 978-1-59327-564-84. Vulnhub.com and other wargames and CTF5. My twitter @n3tg33k :D6. google.com

Page 43: Computer Security pro english course

“TRY HARDER”-- offensive security

Page 44: Computer Security pro english course

Th4nk y0u