Small-Scale Cyber Security Competitions
|
|
|
- Elmer Webster
- 10 years ago
- Views:
Transcription
1 Small-Scale Cyber Security Competitions Mike O Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
2 Regional & National Competitions National Collegiate Cyber Defense Competition (NCCDC) Regional Collegiate Cyber Defense Competitions UCSB Capture the Flag Competition Military Academies CDX National Cyber League (NCL) DC3 Digital Forensic Challenge MITRE Cyber Challenge Maryland Cyber Challenge Utah Cyber Challenge CANVAS MIT Lincoln Laboratory / CSAIL Capture the Flag Competition M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
3 Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
4 Introduction Source: M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
5 Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
6 Introduction Source: M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
7 Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
8 Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
9 Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
10 Introduction M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
11 Our Experiences Long running hands-on capstone course in computer security Club level competitions Informal competitions with as many as five different schools Long time coach of the Towson Cyber Defense team Mid-Atlantic Collegiate Cyber Defense Competition National Collegiate Cyber Defense Competition Maryland Cyber Challenge CSC Cyb3r Battl3ground Competition M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
12 Our Environment Four tables with six computers per table. Hosts run VMWare Workstation Each computer has 16 GB of memory enabling us to run as many as eight virtual machines comfortably on a single host. The computers live on an isolated private network with only a file server containing software and installation discs. Students do not have privileged access to the host, and do not have access to the network infrastructure. We can (and do) use the lab for a class at 3:00, run a short 75 minute competition at 5:00, and then use the lab for another class at 7:00. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
13 Our Environment A competition can be run by simply developing the necessary virtual machines and deploying them through the classroom. This is well within the capability of a single faculty member. Restricting work solely to virtual machines reduces complexity means students do not experiment with hardware firewalls, routers, and switches. Student participants all have a solid background in networking, operating systems, and databases. Our competitions are aimed at students of comparable skill levels. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
14 Competition Types We have run three types of competitions: Class-based competitions Competitions with pre-built systems Competitions where student teams build their own systems. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
15 Classroom Competitions: Setup Four teams of three to six students. Students are given functional requirements for a network. Students design, build, and implement their own network. Typical exercise tasks require DNS infrastructure Domain controllers File servers Remote access (e.g. SSH, RDP) Logging infrastructure More complex exercise tasks include Web servers (IIS and/or Apache) Databases Intrusion detection systems (Snort) E-Commerce solutions (e.g. Zen Cart) IPFire firewall solutions M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
16 Classroom Competitions: Structure Students provide the instructor with credentials for their network. Some credentials are secretly provided to other teams, who verify that the required services are running. Student teams without credentials are free to attack using any available tools. Student teams with credentials are free to attempt to escalate privileges. Student teams cannot know in advance if connections are legitimate (service verifications) or attacks. Some attacks are prohibited for pedagogical reasons- e.g. resource exhaustion DoS or log deletions. Students are graded on the basis of a written report Example: Cosc481-S12/Exercise3.pdf M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
17 Classroom Competitions: Lessons The instructor does not need to build all of the machines for the network. The instructor does not know the true state of the network. Course material is now available at cyberoperations.wordpress.com M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
18 Prebuilt Competitions: Environment Local competition used to prepare student teams for regional and national competitions. Two to four teams of four to eight students. Organizer provides each team with 6-10 prebuilt machines These are identical, save for names and addresses. They cover a range of services and operating systems. The systems are deliberately misconfigured to contain security holes. Students can play offense by playing defense. Students are awarded points for Detecting and remediating holes in their own network Successfully attacking other teams Style Why style? M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
19 Student Cyber Defense Teams Source: M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
20 Prebuilt Competitions: Holes What kinds of holes can be put on systems? Pre-shared SSH keys Trojaning Metasploit Configuring VNC to silently start on boot Modifying path variables to allow other programs (e.g. netstat) to be trojaned Misconfiguring FTP servers- allowing anonymous read/write, or running as root Putting tools like PHPShell on the web server Adding privileged users to the system This is particularly fun via cron jobs or at tasks to occur later Using xinetd to bind a root shell Changing permissions on key system files Trojaning startup documentation M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
21 Prebuilt Competitions: Lessons Setup time is formidable 4 teams 6-10 systems 2-3 hours per system = a long week. Systems are less recyclable than might be expected Student interaction with the systems is limited to competition time Students enjoy the puzzle nature of the event M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
22 Build-A-Net Competitions: Design Student teams are provided with precise network specifications, which they then build on their own as virtual machines. Windows 2003 Server (Not R2), DC, DNS, RDP Windows 2008 Server (Not R2), DC, RDP, Exchange Fedora Core 4, DNS, SSH, MySQL (4.1.1) Ubuntu 8.04, SSH, Apache, PHP, MySQL, Joomla Fedora 6, SSH, vsftpd Windows XP (No SP) joined to the domain Windows Vista SP1, joined to the domain Precise required version numbers of other software (browsers, mail clients,.pdf readers, Adobe Flash) are provided. Version numbers are selected with known vulnerabilities in mind Software can be found at MSDNAA or at various open source repositories. The site is quite valuable for older Windows software. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
23 Build-A-Net Competition: Timing & Lessons The amount of lead time provided to the students depends on their ability level. For newer students, one to two weeks. For advanced students or multi-school competitions, hours. Students mis-estimate (badly) the amount of work necessary to set up such a network. Students learn much in this format. Significantly less work for the organizer. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
24 Red Team All of these competitions have been run both with and without an external Red Team. Recruiting Red Team has been much simpler than expected. Approaching Red Team from the regional CCDC led to many volunteers, and to many recommendations. After running these competitions for many years, graduating seniors and other former students regularly volunteer to serve. M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
25 Questions? Mike O Leary School of Emerging Technologies Towson University [email protected] M. O Leary (Towson University) Small-Scale Cyber Security Competitions CISSE / 25
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * Alexandru G. Bardas and Xinming Ou Computing and Information Sciences Kansas State University Manhattan, KS 66506 [email protected], [email protected]
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
The Open Cyber Challenge Platform *
The Open Cyber Challenge Platform * Jacob Fonseca, Kevin Bryan, Lisa DiPippo, Victor Fay-Wolfe * Supported By The U.S. National Science Foundation grants: Federal Cyber Service Scholarship For Service
Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.
Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
Where can I install GFI EventsManager on my network?
Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location
Small-Scale Cyber Security Competitions
Small-Scale Cyber Security Competitions Mike O'Leary, Towson University Abstract Cyber security competitions are becoming more common and more complex, and faculty interested in hosting a small scale event
Minnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals
Five Steps to Improve Internal Network Security Chattanooga Information security Professionals Who Am I? Security Analyst: Sword & Shield Blogger: averagesecurityguy.info Developer: github.com/averagesecurityguy
WA2192 Introduction to Big Data and NoSQL. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2192 Introduction to Big Data and NoSQL Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach
TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach Rahul V. Tikekar Southern Oregon University Abstract: Increasing awareness of the vulnerabilities of computer systems has led to the introduction
Standard: Event Monitoring
Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information
User Manual of the Pre-built Ubuntu 9 Virutal Machine
SEED Document 1 User Manual of the Pre-built Ubuntu 9 Virutal Machine Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
Ubuntu 12.04 Sever Administration
Ubuntu 12.04 Sever Administration 1. Introduction to Ubuntu Linux Ubuntu Server Ubuntu Server 12.04 Server Installation Alternatives and Options Server on the Desktop Installation Desktop on the server
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008
Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit
Metasploit Pro Getting Started Guide
Metasploit Pro Getting Started Guide Metasploit Pro Getting Started Guide Release 3.6 March 7, 2011 Table of Contents Metasploit Pro... 1 Getting Started Guide... 1 Welcome... 4 About This Guide... 5 Target
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
SMART Classroom Suite 2011
SMART Classroom Suite 2011 Windows operating systems System administrator s guide Trademark notice SMART Board, SMART Classroom Suite, SMART Notebook, SMART Response, SMART Sync, SMART Document Camera,
An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan
An Open Source IPS IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan Introduction IPS or Intrusion Prevention System Uses a NIDS or Network Intrusion Detection System Includes
Exploring a National Cyber Security Exercise for Community Colleges
Exploring a National Cyber Security Exercise for Community Colleges Casey W. O'Brien Co-PI, CyberWatch Center Community College of Baltimore County Baltimore, Maryland :: CyberWatch :: Current Cyber Exercise
User Manual of the Pre-built Ubuntu 12.04 Virutal Machine
SEED Labs 1 User Manual of the Pre-built Ubuntu 12.04 Virutal Machine Copyright c 2006-2014 Wenliang Du, Syracuse University. The development of this document is/was funded by three grants from the US
Upgrade to Webtrends Analytics 8.7: Best Practices
Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
Open Source Security Tools for Information Technology Professionals
Open Source Security Tools for Information Technology Professionals CUNY SPS Course Syllabus Aron Trauring May 23, 2005 (rev October 21, 2005) Course Description Information security is a top priority
Check Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
GFI Product Manual. Administrator Guide
GFI Product Manual Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,
GFI Product Manual. Administrator Guide
GFI Product Manual Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,
Cloud Homework instructions for AWS default instance (Red Hat based)
Cloud Homework instructions for AWS default instance (Red Hat based) Automatic updates: Setting up automatic updates: by Manuel Corona $ sudo nano /etc/yum/yum-updatesd.conf Look for the line that says
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Verax Service Desk Installation Guide for UNIX and Windows
Verax Service Desk Installation Guide for UNIX and Windows March 2015 Version 1.8.7 and higher Verax Service Desk Installation Guide 2 Contact Information: E-mail: [email protected] Internet: http://www.veraxsystems.com/
Technology Fee Proposal
Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,
Delphi+ System Requirements
Delphi+ System Requirements Revision 1.1 Newmarket International, Inc. October 24, 2013 Delphi+ System Requirements Users Up to 15 Up to 25 Up to 50 Up to 90 Up to 200 Over 200 Minimum 2008 Server Hardware
How to Test Out Backup & Replication 6.5 for Hyper-V
How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
This Deployment Guide is intended for administrators in charge of planning, implementing and
YOUR AUTOMATED EMPLOYEE Foxtrot Deployment Guide Enterprise Edition Introduction This Deployment Guide is intended for administrators in charge of planning, implementing and maintaining the deployment
Contestant Requirements:
2014 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn and improve cybersecurity skills Enhance: Teamwork,
How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall
Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Remote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell [email protected] Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
Sage Grant Management System Requirements
Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Parallels Plesk Panel 11 for your Linux server
Getting Started Guide Parallels Plesk Panel 11 for your Linux server Getting Started Guide Page 1 Getting Started Guide: Parallels Plesk Panel 11, Linux Server Version 1.1 (11.1.2012) Copyright 2012. All
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
A New Era. A New Edge. Phishing within your company
Phishing within your company Learning Objectives What is phishing and how to minimize its impact Obtain a basic understanding of how to use virtual machines Use BackTrack, a tool used by many security
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
All Information is derived from Mandiant consulting in a non-classified environment.
Disclaimer: All Information is derived from Mandiant consulting in a non-classified environment. Case Studies are representative of industry trends and have been derived from multiple client engagements.
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Update 0 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for
Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.
Vmware ESX 4/5/6 - Provision virtual machines through vsphere, assign available resources and install operating systems. - Configure the various built in alarms for monitoring, configure alarm thresholds
Scholastic Reading Inventory Installation Guide
Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published
PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008
PLATO Learning Environment System and Configuration Requirements Version 1.1 (for use with Academic Systems Algebra only) for workstations April 14, 2008 Windows 2000 Professional with SP4 Windows XP Professional
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
Jumpstarting Your Security Awareness Program
Jumpstarting Your Security Awareness Program Michael Holcomb Director, Information Security HO20110473 1 Jumpstarting Your Security Awareness Program Classification: Confidential Owner: Michael Holcomb
QuickStart Guide for Managing Computers. Version 9.2
QuickStart Guide for Managing Computers Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
CYCLOPE let s talk productivity
Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution
Footprinting and Reconnaissance Tools
Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting
Table of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
Enterprise Network Deployment, 10,000 25,000 Users
Enterprise Network Deployment, 10,000 25,000 Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering
Server Configuration and Deployment (part 1) Lotus Foundations Essentials
Server Configuration and Deployment (part 1) Lab Manual Lotus Foundations Essentials Introduction: In this lab, students will configure an IBM Lotus Foundations server using a virtual image to perform
Kaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
New Lab Upgrading Vista to Windows 7 Brought to you by RMRoberts.com
New Lab Upgrading Vista to Windows 7 Brought to you by RMRoberts.com After completing the laboratory activity, you will be able to: Determine which versions of Vista can be successfully upgraded to Windows
Extending Remote Desktop for Large Installations. Distributed Package Installs
Extending Remote Desktop for Large Installations This article describes four ways Remote Desktop can be extended for large installations. The four ways are: Distributed Package Installs, List Sharing,
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * Yan Bei and Robert Kesterson Institute of Technology University of Washington, Tacoma Tacoma, WA 253-692-5863 [email protected] Kyle Gwinnup and Carol
LAMP [Linux. Apache. MySQL. PHP] Industrial Implementations Module Description
LAMP [Linux. Apache. MySQL. PHP] Industrial Implementations Module Description Mastering LINUX Vikas Debnath Linux Administrator, Red Hat Professional Instructor : Vikas Debnath Contact
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
Acronis Backup & Recovery 10 Workstation. Installation Guide
Acronis Backup & Recovery 10 Workstation Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent for Windows...
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
Course Title: ITAP 3471: Web Server Management
Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques
WA2256 Responsive Mobile Web Development with HTML5, CSS3, JavaScript, and jquery Mobile. Classroom Setup Guide. Web Age Solutions Inc.
WA2256 Responsive Mobile Web Development with HTML5, CSS3, JavaScript, and jquery Mobile Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum
The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole
The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical
Implementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
Understand Troubleshooting Methodology
Understand Troubleshooting Methodology Lesson Overview In this lesson, you will learn about: Troubleshooting procedures Event Viewer Logging Resource Monitor Anticipatory Set If the workstation service
Blended Security Assessments
Blended Security Assessments Combining Active, Passive and Host Assessment Techniques October 12, 2009 (Revision 9) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Table of Contents
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
