240 likes | 422 Views
Module 1 - Introduction. About This Course Why Perform Penetration Tests? Security Certifications Types of Pentesting. About This Course. Presenter Information Video Access Course Disks Network Configuration Certificate of Course Completion Course Support. About This Course.
E N D
Module 1 - Introduction • About This Course • Why Perform Penetration Tests? • Security Certifications • Types of Pentesting
About This Course • Presenter Information • Video Access • Course Disks • Network Configuration • Certificate of Course Completion • Course Support
About This Course • Presenter Information • Thomas Wilhelm • ISSMP / CISSP / SCSECA / SCNA / SCSA / IAM • IT Industry: 15+ years • Security Industry: 7+ years • U.S. Army • SIGINT Analyst / Cryptanalyst • Fortune 100 • Penetration Testing / Risk Assessments • Author • “Penetration Tester’s Open Source Toolkit, Vol.2”
About This Course • Video Access • 30 days access to videos • Use login information provided when enrolled • 60 days to complete PenTest Document to ISSAF standards • http://heorot.net/instruction/PTF/
About This Course • Course Disks • Disk 1.100 • Used in Video Instruction • Disk 1.101 • Used in Hands-On Exercises & “IndependentPenTest Effort” for Course Completion Certification • BackTrack • Used as Penetration Tester’s Toolkit
About This Course • Network Configuration Configuration Issues: • http://de-ice.net/index.php?name=PNphpBB2&file=viewforum&f=17 • Can be used in a virtual machine
About This Course • Certificate of Course Completion • Awarded upon receipt and acceptance of formal documentation of Independent PenTest Effort • Meet ISSAF standards • “Independent PenTest Effort” uses Disk 1.101 • Required material is covered in Module 4-8
About This Course • Certificate of Course Completion - Grading • General Documentation – 250 • Management Summary • Scope of the project (and Out of Scope parts) • Tools that have been used (including exploits) • Dates & times of the actual tests on the systems • Identification of Weakness & Vulnerabilities – 650 • A list of all identified vulnerabilities • Output of tests performed (screenshots or “script” text file) • Action Points – 100 • Recommendation of what to mitigate first • Recommended solution
About This Course • Course Support • Email: training@heorot.net • Support 24x7 • Instructor: PTF@heorot.net • Online chat T,Th 9pm Eastern • Also available by appointment • Available via phone by appointment
Why PerformPenetration Tests? • Black Hat vs. White Hat • Code of Ethics • Legal Responsibilities
Why PerformPenetration Tests? • Code of Ethics • CISSP Code of Ethics Canons: • Protect society, the commonwealth, and the infrastructure. • Act honorably, honestly, justly, responsibly, and legally. • Provide diligent and competent service to principals. • Advance and protect the profession.
Why PerformPenetration Tests? • Black Hat vs. White Hat • Black Hat: • “A black hat is a person who compromises the security of a computer system without permission from an authorized party, typically with malicious intent” - Wikipedia • White Hat: • “A white hat hacker, also rendered as ethical hacker, is, in the realm of information technology, a person who is ethically opposed to the abuse of computer systems” - Wikipedia
Why PerformPenetration Tests? • Legal Responsibilities • Federal Mandates • SOX • HIPPA • FISMA, etc. • State Mandates • California Senate Bill 1386 • Many other states are following California’s Example
Security Certifications • Generalized Knowledge • Appliance-Specific • Methodology
Security Certifications • Generalized Knowledge • (ISC)2 • ISSMP / ISSAP / ISSEP / CISSP / SSCP • Prosoft Learning • Certified Internet Web Professional Program • Designer / Administrator / Manager / Developer • SANS Institute • Global Information Assurance Certification • GISF / GSEC / GCFW / GCIA / GCUX… and more
Security Certifications Appliance-Specific • CISCO • CCSP / CCIE • Check Point • CCSA / CCSE • RSA Security • CSA / CSE • TruSecure • TICSA / TICSE • Operating Systems • SCSECA • RHCSS • MCSE: Security
Security Certifications • Methodology • National Security Agency • IAM / IEM • EC-Council • CEH
Types of Penetration Testing • Network • Host • Application • Database
Types of Penetration Testing Network • Password • Switches / Routers • Firewall • Intrusion Detection • VPN • Storage • WLAN Security • Internet User Security • AS400 • Lotus Notes
Types of Penetration Testing • Host • Unix / Linux • Windows • Novell Netware • Web Server
Types of Penetration Testing • Application • Web Application • Source Code Auditing • Binary Auditing
Types of Penetration Testing • Database • Database Security • Social Engineering
Module 1 - Conclusion • Why Perform Penetration Tests? • About This Course • Security Certifications • Types of Pentesting