Defending against the Dark Arts
Thurgood Marshall North
Today's threats to the enterprise are manifested in many ways, but all share similar traits: highly intelligent, well funded and determined to gain access. In this class, we will explore the murky world of the blackhats. We will examine your security footprint as they view it, and discuss ways to minimize it, various vectors for attack, and how to detect and defend. We will spend time talking about current threats and how they can impact your company, and we will build upon the foundations of good security practice. As with all my classes, this will be accompanied with a pinch of humor and a large dollop of common sense.
Beginning to high-level system administrators of any stripe with an interest in IT Security and a desire to understand their potential adversaries. It is suggested that participants have experience with *nix command line and virtual hosts.
Tools, tips, tricks and a working security toolkit that can be implemented to improve monitoring, detection, and defense in your organization. Experience working with (mostly) free security software tools.
- Understanding an attack from beginning to end
- Security Podiatry Social Engineering detection and prevention
- Detecting undesirable network and server behavior
- Detecting penetration attempts and successes, and stopping them
- Raising awareness
VMware Fusion or VirtualBox. You should have wireless or wired connectivity; we will have both available in the class. You will need to be able to acquire the VM for the class prior; registered attendees will receive the download information via email.
connect with us