A Guide to Preparing for the GSM Capstone Exam
|
|
|
- Kristopher Walton
- 10 years ago
- Views:
Transcription
1 A Guide to Preparing for the GSM Capstone Exam by: Courtney Imbert, Last update: November 11, 2015 An Overview of the GSM Capstone Exam The GSM (GIAC Security Manager) is the capstone exam MSISM candidates take toward the end of their curriculum. The two- day exam is a proctored, lab- based exam that is taken live at a SANS event. Practical exams like this one are designed to test the real- world performance of candidates. During this exam, you ll balance organizational needs with secure practices, apply standards- based approaches to information security risk management, and devise incident response strategies. The GSM tests on the following knowledge areas, broken down throughout this guide: Common Information Security Technical Concepts Security Policy Development Web Application Vulnerability Scanning Incident Handling Risk Management Project Management Communication Auditing & Assessment Each section of this guide includes suggested activities for practicing for the lab. General Strategies for GSM Success Review Courseware and Labs The GSM is based on the core MSISM curriculum, including these courses. ISM 5000: Research and Communications Methods (SANS class MGT305) ISM 5100: Enterprise Information Security (SANS class MGT 512, GIAC GSLC) ISM 5200: Hacking Techniques and Incident Response (SANS class SEC504, GIAC GCIH) ISM 5300: Building Security Awareness (SANS class 433) ISM 5400: IT Security Planning, Policy, and Leadership (SANS class MGT 514) ISM 5600: Law of Data Security and Investigations (SANS class LEG523, GIAC GLEG) ISM 5800: IT Security Project Management (SANS class MGT525, GIAC GCPM) ISM 6000: Standards Based Implementation of Security (SANS class SEC566, GIAC GCC) Page 1 of 8
2 ISM 6200: Auditing Networks, Perimeters and Systems (SANS class AUD507, GIAC GSNA) Therefore, reviewing the courseware is a critical step in preparing for the capstone. A well- prepared candidate is one who can complete the labs in these courses with minimal guidance, and understands each step. Connect with other information security professionals Other information security professionals, particularly students in the MSISM program, can be a helpful resource when preparing for the exam. Others can recommend preparation strategies, provide insight or experience, and act as partners in accountability or goal- setting. If you ve received over a 90% on a GIAC exam, you are eligible to participate in the GIAC Advisory Board. This - based forum often discusses real- world situations, with advice and ideas from experienced information security practitioners. The SANS Technology Institute also has an forum open to students and faculty at sti- [email protected]. Several member- run forums are dedicated to helping students through SANS classes and exams, including an SANS STI student/alumni group (sans- sti- [email protected]) and a GIAC exam study group (giac- [email protected]). Though these groups are unofficial and not moderated by SANS/GIAC or STI, the archives and discussions can provide valuable resources to students preparing for an exam. In addition to online groups, you may find it helpful to join a local career networking group focused on Information Security or management, like the Information Systems Security Association (ISSA), ISACA, PMI, or Infragard. These organizations often schedule local meetings, presentations, or classes that help members meet other professionals in the same field. Take Advantage of Opportunities at Work The lab- based capstone is based on a wide variety of skills, guaranteeing the successful candidate is well- rounded. Most candidates do not have the opportunity to perform all these tasks on a day- to- day basis. Seek out opportunities in your work environment to practice the skills you ll need on the lab exam. For example, if you have the opportunity to volunteer for a project and gain visibility into the project management process, take it! Request a cross- training session with a member of your team who performs technical tasks. Since the exam is designed to test real- world skills, on- the- job experience can provide valuable training and practice. Play Netwars or another interactive scenario- based simulation Page 2 of 8
3 There are plenty of Capture the Flag events online for information security professionals. These can help you become comfortable working in unfamiliar or time- pressured environments. They also provide data or services to practice on using information security tools and technical skills. Though many of these events are competitive, they provide opportunities for learning new skills, practicing weak areas, and networking with other players. Netwars is a multi- level event that can be completed at a SANS conference or at home. Information is available at Common Information Security Technical Concepts This knowledge area is designed to test the candidate s ability to use Unix and Windows system tools to review the system s configuration and tasks. In order to succeed at this section, you ll also need to understand how to use a basic network sniffer and scanner, understand basic networking, encryption techniques, technologies, and applications, including hashing, signing, decrypting, and managing keys. Download a Linux distribution, and learn to navigate the system and run basic commands. Virtualized environments make it easy to practice tasks on a variety of operating systems. There are several options for virtualization software, but VMware is a popular option supported by most SANS classes. A free version, VMware Workstation Player, is available at This version has the ability to play pre- created virtual machines and tweak configuration. To create virtual machines from scratch or use more advanced features like snapshots, a VMware Workstation license is required. Other virtual machine applications include Oracle s VM VirtualBox ( Windows Virtual PC, and QEMU ( You may already have pre- configured virtual machines saved from your SANS classes. You can copy and use these to run through the class exercises, or practice navigating through the system. If you d prefer to practice on a new virtual machine, you can download pre- configured Linux VMs from reputable sites. Many information security professionals work with Kali Linux, an Offensive Security Linux distribution that comes with many common security tools. You can download Kali at There are images pre- configured for virtual environments, like VMware player or VirtualBox, available at security.com/kali- linux- vmware- arm- image- download/. Page 3 of 8
4 Windows virtual machines require a license if they are used beyond an initial 30 days, similar to Windows installed on a physical machine. You may choose to use a new Windows license to create or activate a virtual machine, or use the Windows host itself for practice. One advantage of using virtual machines is that the networking is also virtual, making it simple to connect VMs together! For example, VMware permits you to create a host- based network, with names like VMnet0. Though a host- based network is safely isolated from the Internet, the host and any running VMs on the same host- based network can talk to each other. This creates the ability to ping, transfer files, and run security scans or other tasks with low risk. To find out more about basic networking in VMware, read Once you ve designated both a Linux and a Windows machine for exam preparation, practice on them. You may want to begin by running through the labs in the courses you ve taken, practicing simple network configuration and finding common security settings on the machines. Change the IP address and see if you can get a Windows and Linux VM to talk to one another, both through IP addresses and computer or domain names. Move files back and forth using SCP or other tools. As you become comfortable with basic security tasks, you can practice performing a security audit on the systems, verifying results, and making and executing a remediation plan. Prepare Printed Resources for the Lab According to the GSM policy, you are permitted to take written or printed materials into the exam with you. Since the exam is timed, it may be difficult to find the resources you need in hundreds of pages of courseware. It is a good idea to prepare cheat sheets or other printed resources for quick reference. You may find it helpful to create your own printed resources or templates as you study, with common tasks and examples. Security Policy Development In the Security Policy Development section of the GSM, you are expected to be familiar with the development, review, and implementation of information security policies. You should be able to align the policies with information security best practices, the resources available to you, and the overall goals of an organization. Read and Revise Sample Policies SANS provides a library of information security templates to the community, available at resources/policies/. These policies were developed by seasoned practitioners, but they must be customized to any organization. Download a few Page 4 of 8
5 policies. Create a checklist of components you would expect the policies to include, like enforcement measures and a revision / change management history. Next, review the policies with a critical eye, and list the revisions you would make for them to fit into your organization. Would these policies need to be revised to align with organizational goals, resources, pre- existing policies, and other environmental factors? Web Application Vulnerability Scanning During the GSM lab, you ll be expected to understand common web application flaws and vulnerabilities, recognize and verify them either with or without automated tools, and recommend mitigating controls for those flaws. Read the OWASP Top 10 The OWASP Top 10 ( is a commonly- used compendium of the most common and critical web application security flaws. The documents are designed to be understandable for managers as well as technical staff, with examples of attack scenarios and recommendations for mitigating controls. Practice using web application scanning tools There are several deliberately vulnerable web applications available, both hosted online and downloadable as virtual machines. These are web applications designed for training and demonstrations by security practitioners. Though there are too many to list here, here are a few well- maintained, reputable ones: OWASP Broken Web Application Damn Vulnerable Web Application Gruyere gruyere.appspot.com/ There are also Hack this site websites, but these are controlled and hosted by external parties, and may focus primarily on penetration testing competition rather than training. It is important that you scan only those websites you have explicit permission to test - either by starting your own virtual machine that hosts the web application locally, or with the express permission of the site. Once you have a designated practice site, practice finding and verifying vulnerabilities. This should be done both manually (by entering a SQL injection test into a field, for example) and with common web vulnerability scanning tools. Page 5 of 8
6 Auditing and Assessment During the GSM, you ll be expected to perform an audit or assessment of network devices using common automated tools, review the assessment and audit results, and recommend actions based on the results of the audit. Practice a simulated audit on your home network Unfortunately, it can be a bit difficult to create a realistic network environment to practice the auditing process at home. However, you can step through a small- scope audit using the tools listed in your AUD507 workbook against your home network configuration, or virtualized network devices. As a bonus, by remediating the issues you uncover through your audit, you may end up with a more secure home network! Incident Handling, Risk & Project Management In the Incident Handling section of the GSM, you will be expected to understand incident handling phases and best practices, and recommend both short- and long- term actions in response to an incident. In addition, you will be expected to produce project- related documents such as a project charter, requirements, and scope, using the PMI framework. For risk management, you will be expected to assess and explain organizational risk, and prioritize projects or actions based on that risk. You should be familiar with special information security risks for industries like healthcare, finance, and government. Read Case Studies and News Stories of Incidents It may be helpful to become familiar with the types of information security incidents organizations encounter, and how they react both short- and long- term to these incidents. Participating in the remediation of incidents at work is great practice! If you don t have access to this information at work, it may help to seek out information about current incidents, and compare that information with the six phases of the incident handling process. Occasionally, case studies appear in the SANS reading room ( room) or in blog posts of the Internet Storm Center ( as well as many information security blogs and news sites like Krebs on Security ( Since organizations often hesitate to release details until the post- mortem of an incident, you may want to research information security incidents that occurred several months ago. Reading about incident response with a critical eye will help you become familiar with typical incidents and possible ways to respond to them. Page 6 of 8
7 One valuable exercise is to select a breach and discuss it with coworkers or a study group. Brainstorm for actions that would have mitigated the threat, or detected the attack. Do a Dry Run of an Incident Many organizations practice their incident response procedures with drills or live tests. If your work doesn t do incident response drills or permit you to observe them, you can practice for the exam by stepping through the phases of an incident on your own or with a study group. Select a common incident from the news stories you ve read. Here are some sample scenarios: A large amount of proprietary or PII data has been published online Hardware has been stolen from an office A virus outbreak affecting an entire department A disgruntled employee has sabotaged important data Consider the six phases of the incident process for your scenario: what would you do? What additional information would you need, and how would you get it? What risks are associated with the incident, and do you suspect any regulatory or legal requirements might come into play? Finally, practice writing communication summarizing the incident and recommending next steps for both technical and management audiences. In addition to simulating an incident yourself, you may have the opportunity to observe an incident response team in action. In the USA, most counties or states have an Emergency Management Agency (EMA). Some EMAs schedule regular simulated tabletop disaster scenarios, and many will allow the public to observe. Although the scenario is not necessarily an information security incident, it can be helpful to observe the management strategies, processes, and teamwork that an experienced team uses to handle incidents. Organizational Communication During the GSM, you will be expected to write clearly to a target audience from a set of complex information, and create an executive summary for an incident, project, or situation. Practice targeting and summarizing communication Whatever your role at work, there are many real- world opportunities to improve on your communication skills. Practice taking notes at meetings or during a work session to collect the most important points, then create an executive summary. You can also use projects you re working on, complex technical problems, or incidents to practice your written communication skills. Be sure your communication is accurate, but understandable. For more in- depth practice, imagine you must send three memos on the same subject: one to an executive team, one to Page 7 of 8
8 your organization s customers, and the other to the technical team assigned to work on the problem. Develop the memos in tandem to practice targeting important points and the style of communication to specific audiences. Get feedback from others Often, the text we ve written seems clear to us, but may be confusing from another perspective. As you practice your writing, ask trusted partners to read and critique it for clarity, targeted communication, and grammar or spelling. Questions? The SANS Technology Institute and GIAC teams are here to help you! If you have questions about the capstone itself, preparing for it, or the MSISM curriculum, [email protected] or [email protected]. Page 8 of 8
Course Descriptions November 2014
Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)
Information Security Engineering
Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information
Cyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS
OVERVIEW MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS 2016 Coursework to Meet Real World Demands The best. Made better. SANS graduate programs are the ultimate expression
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters [email protected]
Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters [email protected] Ralph Durkee Founder of Durkee Consulting since 1996 Founder of Rochester OWASP since 2004 President of Rochester ISSA chapter
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
Monitor and Secure Linux System with Open Source Tripwire
Cyber Forensics Laboratory 1 Monitor and Secure Linux System with Open Source Tripwire Copyright c 2012 Hui Li, Michael McGinty and Xinwen Fu, University of Massachusetts Lowell Permission is granted to
DoD Directive (DoDD) 8570 & GIAC Certification
DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
The fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn
HIT Workflow & Redesign Specialist: Curriculum Overview
HIT Workflow & Redesign Specialist: Curriculum Overview Component - Description Units - Description Appx. Time 1: Introduction to Health Care and Public Health in the U.S. Survey of how healthcare and
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
Define risk and risk management Describe the components of risk management List and describe vulnerability scanning tools Define penetration testing
One of the most important assets any organization possesses is its data Unfortunately, the importance of data is generally underestimated The first steps in data protection actually begin with understanding
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
A. Centrality to institutional mission statement and planning priorities:
SANS Technology Institute Program Proposal for a Substantial Modification Master of Science in Information Security Management May, 2014 A. Centrality to institutional mission statement and planning priorities:
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
GIAC Program Overview 2015 Q4 Version
GIAC Program Overview 2015 Q4 Version Program Overview - GIAC Certification 2015 1 What is GIAC? GIAC is the Global Information Assurance Certification program GIAC assesses candidate knowledge in specific
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures Don Hewitt and Chris Goggans March 1, 2001 Copyright 2001 by Security Design International, Inc. 1 Agenda The Proposed Rule
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
How to Justify Your Security Assessment Budget
2BWhite Paper How to Justify Your Security Assessment Budget Building a Business Case For Penetration Testing WHITE PAPER Introduction Penetration testing has been established as a standard security practice
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
GIAC Certification. Enterprise Solution
E- Business & Web Solutions IT Solutions (Hardware, Software, Services) Business Process & Technology Outsourcing Enterprise Solution Professionals on Information and Network Global Information Assurance
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
Spigit, Inc. Web Application Vulnerability Assessment/Penetration Test. Prepared By: Accuvant LABS
Web Application Vulnerability Assessment/enetration Test repared By: Accuvant LABS November 20, 2012 Web Application Vulnerability Assessment/enetration Test Introduction Defending the enterprise against
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments Introduction Server virtualization and private cloud services offer compelling benefits, including hardware consolidation,
Implementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V
MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials Outline Introduction
Deploying and Managing Microsoft System Center Virtual Machine Manager
Deploying and Managing Microsoft System Center Virtual Machine Manager Overview About this Course This three-day instructor-led course teaches students how to implement a Microsoft System Center Virtual
CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015
CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015 TODAY S PRESENTER Viviana Campanaro, CISSP Director, Security and
How To Choose the Right Vendor Information you need to select the IT Security Testing vendor that is right for you.
Information you need to select the IT Security Testing vendor that is right for you. Netragard, Inc Main: 617-934- 0269 Email: [email protected] Website: http://www.netragard.com Blog: http://pentest.netragard.com
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
The Seven Deadly Myths of Software Security Busting the Myths
The Seven Deadly Myths of Software Security Busting the Myths With the reality of software security vulnerabilities coming into sharp focus over the past few years, businesses are wrestling with the additional
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Extreme Networks Security Analytics G2 Risk Manager
DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
Intel Security Certified Product Specialist Security Information Event Management (SIEM)
Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
SVCC Exemplary Online Course Checklist
SVCC Exemplary Online Course Checklist Purpose of the SVCC Exemplary Course Checklist The SVCC Exemplary Course Checklist has been created to: guide faculty as they prepare a course for online instruction
White Paper The Dynamic Nature of Virtualization Security
White Paper The Dynamic Nature of Virtualization Security The need for real-time vulnerability management and risk assessment Introduction Virtualization is radically shifting how enterprises deploy, deliver,
Installing Windows On A Macintosh Or Linux Using A Virtual Machine
Installing Windows On A Macintosh Or Linux Using A Virtual Machine At Shaw Programs, the software we develop is made using Microsoft Access. As with all Microsoft Software it requires Windows in order
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
OVERVIEW DEGREES & CERTIFICATES
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)
10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information
Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited
Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running
eeye Digital Security Product Training
eeye Digital Security Product Training Retina CS for System Administration (4MD) This hands-on instructor led course provides security system administration/analysts with the skills and knowledge necessary
2012 Data Breach Investigations Report
2012 Data Breach Investigations Report A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM
BUILDING AN OFFENSIVE SECURITY PROGRAM Common Gaps in Security Programs Outsourcing highly skilled security resources can be cost prohibitive. Annual assessments don t provide the coverage necessary. Software
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
The fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO QUALIFYING PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)
www.peaklearningllc.com 6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days) Introduction This three-day instructor-led course teaches students how to implement and manage Windows Server
Powerhouses and Benchwarmers
Insights Powerhouses and Benchwarmers Assessing the Cyber Security Performance of Collegiate Athletic Conferences BitSight Technologies August 2014 Insights Assessing the Cyber Security Performance of
About Effective Penetration Testing Methodology
보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 5호 2008년 10월 About Effective Penetration Testing Methodology Byeong-Ho KANG 1) Abstract Penetration testing is one of the oldest methods for assessing
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Audit Tips and other Free Audit Resources Inside! h t tp://i t -audit.sans.or g
C U R R I C U L U M Audit Tips and other Free Audit Resources Inside! h t tp://i t -audit.sans.or g SANS IT Audit Curriculum Roadmap SANS IT Audit curriculum features courses developed specifically for
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
Course Syllabus. Implementing and Managing Windows Server 2008 Hyper-V. Key Data. Audience. At Course Completion. Prerequisites
Course Syllabus Implementing and Managing Windows Server 2008 Hyper-V Key Data Product #: 3961 Elements of this syllabus are subject to change. This three-day instructor-led course teaches students how
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
