SlideShare a Scribd company logo
COURSE OUTLINE

    Training Week 2012
       May 7-11 2012


       Hyatt Regency
Port of Spain, Trinidad, W.I.
FACILITATOR’S BIO



                   John Tannahill, CA, CISM, CGEIT, CRISC is a management
                   consultant specializing in information security and audit
                   services. His current focus is on information security
                   management and control in large information systems
                   environments and networks. His specific areas of technical
                   expertise inclu de UNIX and Windows operating system security,
                             include
                   network security, and Oracle and Microsoft SQL Server security.
John is a frequent speaker in Canada, Europe and the US on the subject of
information security and audit.

He is a member of the Toronto ISACA Cha pter and has spoken at many ISACA
                                      Chapter
Conferences and Chapter Events including ISACA Training Weeks; North America
CACS; EuroCACS; Asia- Pacific CACS; International and Network and Information
Security Conferences.

John is the 2008 Recipient of the ISACA John KuyerBest Speaker/Best Conference
                                                  Best
Contributor Award.

Prior speaking engagements include:
                ngagements

   ISACA Chapter seminars (e.g. Toronto, Pittsburgh, Houston, Washington ,
    Trinidad & Tobago)
   ISACA Training Weeks (2001 present)
                          (2001-
   ISACA NACACS, EuroCACS, Asia -Pacific CACS Conferences
   ISACA Information Security Management Conferences
   ISACA International Conferences
   CSI Annual Computer Security Conference (2009)
   Presented many in-house 1
                       house 1-day – 5-day seminars
                                                                                              2
                                                                                              Page




                             Training Week 2012. May 7-11 2012.Hyatt Regency Trinidad, W.I.
                                                                     Regency.
SESSION ABSTRACTS

INTRODUCTION TO ETHICAL HACKING & FIREWALL SECURITY:                              2 DAYS (HANDS-ON)

This session will provide participants with a practical methodology and approach to performing ethical
hacking assessments, and will include testing firewall security design and control. Detailed exercises and
demonstrations of tools and techniques used will allow the participant to evaluate network vulnerabilities
and identify key control recommendations that should be implemented to address the issues.

                                        SESSION HIGHLIGHTS


 Hands-on environment used for                           Sample assessment report outline
  demonstration & discussion purposes                     Listing of reference material for ethical
 Detailed discussion of output and results                hacking assessment methodologies,
  obtained from each part of the assessment                techniques and tools

1. NETWORK DISCOVERY AND FOOTPRINT

 Network Address Spaces (DNS, IP Address                 Information Gathering Tools (e.g. SNMP
  Blocks)                                                  information)
 Ping Sweep Techniques; Firewalking etc.                 Use of Search Engines such as Google and
                                                           other Web-based resources

2. TCP/IP SERVICE IDENTIFICATION AND ENUMERATION

 Port Scanning Techniques (tcp; udp and                  Other Port Scanning, Fingerprinting and
  icmp scanning)                                           Service Identification Tools such as amap
                                                           (application fingerprinting) and netcat
 Use of Nmap(including NSE – Nmap
  Scripting Engine)                                       Advanced scanning techniques and tools
                                                           (including use of Hping and other packet
                                                           crafting tools)

3. ETHICAL HACKING – IDENTIFY AND EXPLOITING VULNERABILITIES

 Vulnerability identification tools and                  Testing web applications
  techniques (including configuration and use
  of network testing tools such as OpenVAS)               Testing vulnerabilities in Unix and Windows
                                                           operating systems using tailored scripts and
 Use of NIST National Vulnerability Database              OS-specific tools
  (NVD) and related resources
                                                          Using the Metasploit Framework
 Testing firewalls including configuration and
  rules assessments                                       Effective reporting and risk-ranking of
                                                           assessment results
 Testing specific TCP/IP Services e.g. web
                                                                                                             3



  servers
                                                                                                             Page




                                      Training Week 2012.May 7-11 2012.Hyatt Regency. Trinidad, W.I.
UNDERSTANDING AND SECURING WINDOWS 2008:                                         2 DAYS (HANDS-ON)

This session will focus on the audit and security issues related to the use of the Windows 2008 Server
Operating System.

                                        SESSION HIGHLIGHTS
 Understand Windows 2008 architecture and               Demonstration of Windows 2008 security
  security components                                     and audit tools
 Use of Windows 2008 server operating                   Demonstration of Windows 2008 Server
  systems to demonstrate key security                     security features, including default security
  features                                                settings, security hardening steps and use of
                                                          the Group Policy


1. WINDOWS 2008 CONCEPTS

 Overview of Windows 2008                               Build and Deployment Processes
 Server Versions                                        Configuration Management
 Service Packs & Hotfixes                               Patch Management

2. UNDERSTANDING WINDOWS 2008 SECURITY COMPONENTS
 Active Directory Services (ADS)                        Security Configuration
 Group Policy Objects (GPO)

3. WINDOWS 2008 SECURITY AND CONTROL
   Security Baselines                                      Privilege Management
   Active Directory Security                               Network Share Security
   Windows 2008 Domains                                    Directory & File Permissions
   Trust Relationship Mechanisms                           Registry Security
   Group Policy Objects (GPO)                              Security Event Logs
   User Accounts                                           Windows Services
   Authentication Controls                                 Network Security
   User Rights                                             Security Administration
   Groups

4. AUDITING THE WINDOWS 2008 ENVIRONMENT
 Audit Objectives                                       Automated Tools/ Scripts for Audit Testing
 Auditing Domain Controllers                            Approach to Windows 2008 Security Audit
 Auditing Member Servers

5. SECURITY AND AUDIT TOOLS & TECHNIQUES
                                                         Windows 2008 Resource Kit
 Demonstration of Windows 2008 Security &
  Audit Tools
                                                                                                          4
                                                                                                          Page




                                     Training Week 2012.May 7-11 2012.Hyatt Regency. Trinidad, W.I.
UNDERSTANDING AND SECURING WIRELESS & MOBILE TECHNOLOGIES: 1 DAY(SEMINAR)

This seminar will focus on the audit and security issues related to the use of Wireless and Mobile
Technologies.

                                        SESSION HIGHLIGHTS
 Detailed discussion of Wireless Network                 Demonstration and discussion of security
  Security Issues                                          and audit tools and techniques

 Live wireless LAN environment used in class
  to demonstrate key concepts and
  security/audit areas /steps

1. UNDERSTANDING WIRELE SS & MOBILE TECHNOLOGIES

    Wireless LANs (WLAN)                                     Bluetooth Technology and Security
                                                               (IEEE 802.15)
    Wireless LAN standards and current
     implementations - IEEE 802.11g;                          Other Wireless Technologies (e.g. Wi-
     802.11n technologies and security                         Max – 802.16)
     mechanisms
                                                              Mobile Technologies – Blackberry;
    Wi-Fi Protected Access (WPA/WPA2)                         iPhone; iPAD; Android; USB and
                                                               removable media

2. UNDERSTANDING WIRELE SS & MOBILE TECHNOLOGY THREATS AND RISKS

       WLAN Access Point Security                              Fake Access Points
       War Driving                                             Traffic Capture and Analysis
       Unauthorized Network Access                             Bluetooth Threats
       Rogue Access Points                                     Theft / Loss of Client Devices

3. SECURING & AUDITING WIRELESS & MOBILE TE CHNOLOGIES

                                                                Authentication and Encryption
    Wireless Security Policy and Standards                     VPN, Firewall and IDS measures
    Mobile Technology Security Standards                       Wireless Security Assessment
    Wireless & Mobile Technology Risk                          Auditing a WLAN environment
     Assessment                                                 Wireless Client Security
    Secure Wireless Architecture, Design                       Bluetooth Security Configuration
     and Deployment                                             Mobile Device Configuration Security
    Access Point Security

4. SECURITY AND AUDIT TOOLS & TECHNIQUES

    Demonstration of wireless security and audit tools and techniques, including Kismet, Aircrack;
     Bluetooth Assessment tools etc
                                                                                                        5




    Useful reference material
                                                                                                        Page




                                      Training Week 2012.May 7-11 2012.Hyatt Regency. Trinidad, W.I.

More Related Content

PDF
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
Smals
 
PPTX
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
QADay
 
PDF
Secure Web Servers Protecting Web Sites That Are Accessed By ...
webhostingguy
 
PDF
Security model-of-sip-d2-05 at kishore
AT Kishore
 
PDF
TUD CS4105 | 2015 | Lecture 1
Eelco Visser
 
PDF
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Minded Security
 
PPTX
Scada Industrial Control Systems Penetration Testing
Yehia Elghaly
 
PPTX
Luminus – CES 2012.mtg 11 10 11
Cat Virca
 
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
Smals
 
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
QADay
 
Secure Web Servers Protecting Web Sites That Are Accessed By ...
webhostingguy
 
Security model-of-sip-d2-05 at kishore
AT Kishore
 
TUD CS4105 | 2015 | Lecture 1
Eelco Visser
 
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Minded Security
 
Scada Industrial Control Systems Penetration Testing
Yehia Elghaly
 
Luminus – CES 2012.mtg 11 10 11
Cat Virca
 

Similar to ISACA T&T Training Week Course Outline (20)

PDF
Azaz_Sharepoint & Security_Admin
Sun Infosystems Pvt. Ltd.
 
PDF
Secure Web Servers Protecting Web Sites That Are Accessed By ...
webhostingguy
 
PDF
WIRELESS COMPUTING AND IT ECOSYSTEMS
cscpconf
 
PDF
Session 1: Windows 8 with Gerry Tessier
CTE Solutions Inc.
 
PDF
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Ns3Edu
 
PDF
Security+ Course Overview (2008)
GTS Learning, Inc.
 
PPTX
Cloud Security vs Security in the Cloud
Tjylen Veselyj
 
PDF
DoD IA Training Products, Tools Integration, and Operationalization
VICTOR MAESTRE RAMIREZ
 
PPTX
102 Information security standards and specifications
SsendiSamuel
 
PPTX
New Horizons SCYBER Presentation
New Horizons Computer Learning Centers / 5PE
 
PPT
2011 NASA Open Source Summit - Forge.mil
NASA Open Government Initiative
 
PPTX
Saltzer principles.pptx
bekirm
 
DOCX
Sudheendra
Sudheendra P
 
PPTX
Penetration testing dont just leave it to chance
Dr. Anish Cheriyan (PhD)
 
PDF
NSA and PT
Rahmat Suhatman
 
PPT
GridWise 2010 Cyber Security Update
Andy Bochman
 
PDF
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 
PPTX
Server 2008 Project
wsolomoniv
 
PPT
Privacy audittalkfinal
Alan Hartman
 
PDF
IRJET-Domain Data Security on Cloud
IRJET Journal
 
Azaz_Sharepoint & Security_Admin
Sun Infosystems Pvt. Ltd.
 
Secure Web Servers Protecting Web Sites That Are Accessed By ...
webhostingguy
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
cscpconf
 
Session 1: Windows 8 with Gerry Tessier
CTE Solutions Inc.
 
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Ns3Edu
 
Security+ Course Overview (2008)
GTS Learning, Inc.
 
Cloud Security vs Security in the Cloud
Tjylen Veselyj
 
DoD IA Training Products, Tools Integration, and Operationalization
VICTOR MAESTRE RAMIREZ
 
102 Information security standards and specifications
SsendiSamuel
 
New Horizons SCYBER Presentation
New Horizons Computer Learning Centers / 5PE
 
2011 NASA Open Source Summit - Forge.mil
NASA Open Government Initiative
 
Saltzer principles.pptx
bekirm
 
Sudheendra
Sudheendra P
 
Penetration testing dont just leave it to chance
Dr. Anish Cheriyan (PhD)
 
NSA and PT
Rahmat Suhatman
 
GridWise 2010 Cyber Security Update
Andy Bochman
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 
Server 2008 Project
wsolomoniv
 
Privacy audittalkfinal
Alan Hartman
 
IRJET-Domain Data Security on Cloud
IRJET Journal
 
Ad

Recently uploaded (20)

PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Virus sequence retrieval from NCBI database
yamunaK13
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Ad

ISACA T&T Training Week Course Outline

  • 1. COURSE OUTLINE Training Week 2012 May 7-11 2012 Hyatt Regency Port of Spain, Trinidad, W.I.
  • 2. FACILITATOR’S BIO John Tannahill, CA, CISM, CGEIT, CRISC is a management consultant specializing in information security and audit services. His current focus is on information security management and control in large information systems environments and networks. His specific areas of technical expertise inclu de UNIX and Windows operating system security, include network security, and Oracle and Microsoft SQL Server security. John is a frequent speaker in Canada, Europe and the US on the subject of information security and audit. He is a member of the Toronto ISACA Cha pter and has spoken at many ISACA Chapter Conferences and Chapter Events including ISACA Training Weeks; North America CACS; EuroCACS; Asia- Pacific CACS; International and Network and Information Security Conferences. John is the 2008 Recipient of the ISACA John KuyerBest Speaker/Best Conference Best Contributor Award. Prior speaking engagements include: ngagements  ISACA Chapter seminars (e.g. Toronto, Pittsburgh, Houston, Washington , Trinidad & Tobago)  ISACA Training Weeks (2001 present) (2001-  ISACA NACACS, EuroCACS, Asia -Pacific CACS Conferences  ISACA Information Security Management Conferences  ISACA International Conferences  CSI Annual Computer Security Conference (2009)  Presented many in-house 1 house 1-day – 5-day seminars 2 Page Training Week 2012. May 7-11 2012.Hyatt Regency Trinidad, W.I. Regency.
  • 3. SESSION ABSTRACTS INTRODUCTION TO ETHICAL HACKING & FIREWALL SECURITY: 2 DAYS (HANDS-ON) This session will provide participants with a practical methodology and approach to performing ethical hacking assessments, and will include testing firewall security design and control. Detailed exercises and demonstrations of tools and techniques used will allow the participant to evaluate network vulnerabilities and identify key control recommendations that should be implemented to address the issues. SESSION HIGHLIGHTS  Hands-on environment used for  Sample assessment report outline demonstration & discussion purposes  Listing of reference material for ethical  Detailed discussion of output and results hacking assessment methodologies, obtained from each part of the assessment techniques and tools 1. NETWORK DISCOVERY AND FOOTPRINT  Network Address Spaces (DNS, IP Address  Information Gathering Tools (e.g. SNMP Blocks) information)  Ping Sweep Techniques; Firewalking etc.  Use of Search Engines such as Google and other Web-based resources 2. TCP/IP SERVICE IDENTIFICATION AND ENUMERATION  Port Scanning Techniques (tcp; udp and  Other Port Scanning, Fingerprinting and icmp scanning) Service Identification Tools such as amap (application fingerprinting) and netcat  Use of Nmap(including NSE – Nmap Scripting Engine)  Advanced scanning techniques and tools (including use of Hping and other packet crafting tools) 3. ETHICAL HACKING – IDENTIFY AND EXPLOITING VULNERABILITIES  Vulnerability identification tools and  Testing web applications techniques (including configuration and use of network testing tools such as OpenVAS)  Testing vulnerabilities in Unix and Windows operating systems using tailored scripts and  Use of NIST National Vulnerability Database OS-specific tools (NVD) and related resources  Using the Metasploit Framework  Testing firewalls including configuration and rules assessments  Effective reporting and risk-ranking of assessment results  Testing specific TCP/IP Services e.g. web 3 servers Page Training Week 2012.May 7-11 2012.Hyatt Regency. Trinidad, W.I.
  • 4. UNDERSTANDING AND SECURING WINDOWS 2008: 2 DAYS (HANDS-ON) This session will focus on the audit and security issues related to the use of the Windows 2008 Server Operating System. SESSION HIGHLIGHTS  Understand Windows 2008 architecture and  Demonstration of Windows 2008 security security components and audit tools  Use of Windows 2008 server operating  Demonstration of Windows 2008 Server systems to demonstrate key security security features, including default security features settings, security hardening steps and use of the Group Policy 1. WINDOWS 2008 CONCEPTS  Overview of Windows 2008  Build and Deployment Processes  Server Versions  Configuration Management  Service Packs & Hotfixes  Patch Management 2. UNDERSTANDING WINDOWS 2008 SECURITY COMPONENTS  Active Directory Services (ADS)  Security Configuration  Group Policy Objects (GPO) 3. WINDOWS 2008 SECURITY AND CONTROL  Security Baselines  Privilege Management  Active Directory Security  Network Share Security  Windows 2008 Domains  Directory & File Permissions  Trust Relationship Mechanisms  Registry Security  Group Policy Objects (GPO)  Security Event Logs  User Accounts  Windows Services  Authentication Controls  Network Security  User Rights  Security Administration  Groups 4. AUDITING THE WINDOWS 2008 ENVIRONMENT  Audit Objectives  Automated Tools/ Scripts for Audit Testing  Auditing Domain Controllers  Approach to Windows 2008 Security Audit  Auditing Member Servers 5. SECURITY AND AUDIT TOOLS & TECHNIQUES  Windows 2008 Resource Kit  Demonstration of Windows 2008 Security & Audit Tools 4 Page Training Week 2012.May 7-11 2012.Hyatt Regency. Trinidad, W.I.
  • 5. UNDERSTANDING AND SECURING WIRELESS & MOBILE TECHNOLOGIES: 1 DAY(SEMINAR) This seminar will focus on the audit and security issues related to the use of Wireless and Mobile Technologies. SESSION HIGHLIGHTS  Detailed discussion of Wireless Network  Demonstration and discussion of security Security Issues and audit tools and techniques  Live wireless LAN environment used in class to demonstrate key concepts and security/audit areas /steps 1. UNDERSTANDING WIRELE SS & MOBILE TECHNOLOGIES  Wireless LANs (WLAN)  Bluetooth Technology and Security (IEEE 802.15)  Wireless LAN standards and current implementations - IEEE 802.11g;  Other Wireless Technologies (e.g. Wi- 802.11n technologies and security Max – 802.16) mechanisms  Mobile Technologies – Blackberry;  Wi-Fi Protected Access (WPA/WPA2) iPhone; iPAD; Android; USB and removable media 2. UNDERSTANDING WIRELE SS & MOBILE TECHNOLOGY THREATS AND RISKS  WLAN Access Point Security  Fake Access Points  War Driving  Traffic Capture and Analysis  Unauthorized Network Access  Bluetooth Threats  Rogue Access Points  Theft / Loss of Client Devices 3. SECURING & AUDITING WIRELESS & MOBILE TE CHNOLOGIES  Authentication and Encryption  Wireless Security Policy and Standards  VPN, Firewall and IDS measures  Mobile Technology Security Standards  Wireless Security Assessment  Wireless & Mobile Technology Risk  Auditing a WLAN environment Assessment  Wireless Client Security  Secure Wireless Architecture, Design  Bluetooth Security Configuration and Deployment  Mobile Device Configuration Security  Access Point Security 4. SECURITY AND AUDIT TOOLS & TECHNIQUES  Demonstration of wireless security and audit tools and techniques, including Kismet, Aircrack; Bluetooth Assessment tools etc 5  Useful reference material Page Training Week 2012.May 7-11 2012.Hyatt Regency. Trinidad, W.I.