O slideshow foi denunciado.
Seu SlideShare está sendo baixado. ×

Starting your Career in Information Security

Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Próximos SlideShares
Hiring for cybersecurity
Hiring for cybersecurity
Carregando em…3
×

Confira estes a seguir

1 de 37 Anúncio

Mais Conteúdo rRelacionado

Diapositivos para si (20)

Semelhante a Starting your Career in Information Security (20)

Anúncio

Mais recentes (20)

Starting your Career in Information Security

  1. 1. By Ahmed Abdel Hamid Mohamed Alwy
  2. 2. Outlines • What’s Information Security ? • General Paths of Security. • How to Start your Information Security Path. • Roles in information Security. • Information Security Market Need . • Opportunities in Middle East. • Roadmap to Information Security. • Hints in your Roadmap • First Step why CompTIA Security + is the Main Gate. • Q & A
  3. 3. Your Presenter in few Bullets Points • 14 Years of Experience in Information Technology field . • Technical Certificate :  Microsoft® Certified exchange 2013(MCSE)  Microsoft® Certified Solutions Associate (MCSA)  Microsoft® Certified IT Professional: Enterprise Administrator (MCITP)  Microsoft® Certified IT Professional: Server Administrator (MCITP)  Microsoft® Server Virtualization (Windows Server Hyper-V )  Microsoft® Certified TRAINER (MCT)  Infrastructure Library Foundation (ITIL v3)  VMware Certified Associate(VCA)  VMware Certified Associate – Cloud(VCA) • Information Security & Penetration Testing  CompTIA Security (Sys401)  E-learn Security Junior Penetration Tester (EJPT)
  4. 4. Your Presenter in few Bullets Points • 14 Years of Experience in Information Technology Security , Management and Administration . • Technical Certificate : • Systems & Storage  Microsoft Certified System Engineer (MCSE)  SAP Basis Administration (TDM10, 12)  IBM Midrange Storage Specialist.  Information Technology Infrastructure Library Foundation (ITIL v3)  VMware Certificated Data Center Virtualization (VCP-DCV)  Veeam Certified Engineer (VMCE) • Network & Wireless  Cisco Certified Network Associate(CCNA R&S).  Aruba Certified Mobility Professional (ACMP)
  5. 5. • Information Security & Penetration Testing  CompTIA Security (Sys401)  E-learn Security Junior Penetration Tester (EJPT)  E-learn Security Certified Professional Penetration Tester(eCCPT)  Certified Information Systems Security Professional (CISSP- In progress)  Fortinet Network Security Expert 1, 2, 4, (NSE 1, 2, 4)  Ruby Development  Linux Kali , Arch , Black Arch . • Academic Certificate  BSc of Computer Science  Master of Business Administration. Current Positon : Senior information Security Consultant .
  6. 6. What’s Information Security ?  Information security (infosec) is a set of strategies for managing the processes.  tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information  Infosec responsibilities include establishing a set of business processes that will protect information assets.  Infosec programs are built around the core objectives of the CIA trading: maintaining the confidentiality, integrity and availability of IT systems and business data.
  7. 7.  Is there a difference between cyber security and information security? • Information Security (also known as InfoSec) guarantees that the data, including both physical and digital is safeguarded from unauthorized use, access, disruption, inspection, modification, destruction or recording. In case a business is beginning to generate a security program, Information Security is where they should start; since, it is the data security foundation. • Cyber security guarantees that the computers, data, and network of the organization is defended from the unauthorized digital attack, access or damage by the mean of implementing several processes, practices, and technologies. This security is to prevent the data, network, and reputation of the company against the attack.
  8. 8. Security Paths General Path
  9. 9. 1-Network Security Path • Network security roles and responsibilities • Most common certificate
  10. 10. Network security roles and responsibilities • Guarantee network security best practices are executed through auditing: router, change control, switch, firewall configurations, and monitoring. • Coordinate and oversee log analysis for company managed services offerings to ensure customer policy and security requirements are met • Maintain network security devices to enable pro-active defense of networks within a managed service SOC environment, providing protective monitoring to multiple commercial customers • efficient on-boarding and understanding of varying customer log sources into SIEM environments
  11. 11. Most common certificate
  12. 12. 2-Penetration Testing 1- What’s the penetration testing ? 2- What’s the job of penetration tester? 3- What’s the types of hackers ? 4- Most common certificate.
  13. 13. What’s the penetration testing ?  Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
  14. 14. What’s the job of penetration tester? • Plan and prepare • Conduct discovery • Attempt penetration • Analyze and report • Clean up • Be prompt with the patch
  15. 15. What’s the types of hackers ?
  16. 16. Most common certificates
  17. 17. How to Start your Information Security Path. • Many Roads to Go Down and they always Converged. • Even you Start your career as Network Engineer , System Administrator , web Developer you can still be Info Sec . • The Experience you can Gain being in one or more these roles can result a huge advantages over your Security . • SOC Manager (Security Operation Center Managers ) Should have Basic knowledge on all Systems and Application to manage it’s Vulnerabilities and Security . • Not all information Security Roles is Hacking but it’s related to Knowledge Base.
  18. 18. Roles in information Security - Penetration Testing . - Web Application Security - Cryptography . - Security Analyst . - Security Architecture. - Vulnerability Management & Assessment. - Compliance & Standers Auditing. - Digital Forensics. - Policy Development . - Business Continuity. - Incident Response . - Systems Security .
  19. 19. Information Security Market Need
  20. 20. Year of the Mega Breach
  21. 21. Opportunities in Middle East
  22. 22. Opportunities in Saudi Arabia
  23. 23. Roadmap to Information Security
  24. 24. Hints in your Roadmap • Choose a Roadmap Plan with Certificates . • Learn To Hack And Then Learn To Automate using Programming Language • Try Your Hand At Security Research . • Participate In Team Activities Like Capture The Flag Information Security. • Pay attention to information security news web sites. • Don’t break into anything without permission.
  25. 25. First Step why CompTIA Security + is the Main Gate. • It Gives you the Security Mind Set and terminologies. • It provides proof of professional achievement. • It increases your marketability. • It provides opportunity for advancement. • It fulfills training requirements. • It raises customer confidence.
  26. 26. • Introduction About CompTIA Security + • What To Expect From This Course • Course Overview • About The Security+ Exams Module 1 -Introduction Module 2 Understanding The Risks • Risk Assessment • Risk Calculation • Policies Standards And Guidelines • Understanding Control Types • Risk Management Module 3 AAA Concept • Understanding The AAA Concept • Authentication • Authentication Protocols • Authentication Services • Access Control • Access Control Methods • Access Controlling Best Practices • Trusted OS
  27. 27. • Understanding TCP/IP • Protocols And Services • Firewalls • Routers And Switches • Load Balancing Module 4 -Network Devices Module 5 Network Design Elements • Layering For Security • DMZ • VLANs • NAT Module 6 Security Threats • Understanding Malware • Viruses • Virus Types • Antivirus Software • Attack Types • Common Attacks • Application Attacks • Proxy Servers • IDS Versus IPS • UTM Devices • Protocol Analyzers
  28. 28. • Wireless Network Basics • Wireless Protocols • Encryption Options • WAP Basics • Extensible Authentication Protocol • Wireless Vulnerabilities Module 7 -Wireless Networks Module 8 Application Security • Application Hardening • Databases • Patches And Updates • Secure Coding Module 9 Host Security • Host Security Basics • ACLs And Permissions • Software Baselining • Email And Web Server Security • DHCP Security • DNS Security • Authorizing A DHCP Server
  29. 29. • Fault Tolerance Basics • Media Storage • RAID • Clustering & Load Balancing • The Backup Plan Module 10 -Data Security Module 11 Security In The Cloud • Understanding Social Engineering • Social Engineering Types • Dealing With Social Engineering • Physical Security Module 12 Social Engineering And Physical Security • Virtualization • Understanding Cloud Computing • Four Cloud Types • SaaS, PaaS And IaaS • Security In The Cloud Module 13 -Disaster Recovery • Disaster Recovery Plans • Incident Response Policies • Forensics Producers • Working With Vendors • Security Testing
  30. 30. • Cryptography Basics • PKI Basics • X.509 • Viewing Certificates • CAs And RAS • SSL And TLS Module 14 -Cryptography Module 15 Monitoring Networks • Security Awareness • Information Classification • Information Access • Security Regulation Compliance Module 16 Security Administration • Network Monitoring Basics • Event Viewer • Hardening Basics • Detection Versus Prevention • Security Monitoring • Hard And Soft Encryption • Encrypting Files • Web Server Certificate Request • Mobile Devices • BYOD

Notas do Editor

  • How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them.
    Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  • How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them.
    Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  • How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them.
    Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  • How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them.
    Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  • How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them.
    Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.

×