April 2015 Issue No: 1.0. Application Guidance - CCP Penetration Tester Role, Senior Level

Size: px
Start display at page:

Download "April 2015 Issue No: 1.0. Application Guidance - CCP Penetration Tester Role, Senior Level"

Transcription

1 April 2015 Issue No: 1.0 Application Guidance - CCP Penetration Tester Role,

2 Application Guidance - CCP Penetration Tester Role, Issue No: 1.0 April 2015 This document is for the purposes of issuing advice to UK Government, public and private sector organisations and/or related organisations. The copying and use of this document for any other purpose, such as for training purposes, is not permitted without the prior approval of CESG. The copyright of this document is reserved and vested in the Crown. Document History Version Date Comment 1.0 April 2015 First issue

3 Application Guidance - CCP Penetration Tester Role, Purpose & Intended Readership This document is intended as a guide on how to structure evidence when applying for certification under the CESG Certification for IA Professionals (CCP) scheme as a Penetration Tester at Senior level and includes suggestions of what you need to learn and know before applying. It complements the publications CESG Certification for IA Professionals (reference [a]) and the CESG Guidance to Certification for IA Professionals (reference [b]). Executive Summary CESG has developed a framework for certifying Information Assurance (IA) Professionals who meet competency and skill requirements for specified IA roles. The purpose of certification is to enable better matching between requirements for IA Professionals and the competence and skills of those undertaking common IA roles. The framework was developed in consultation with Government departments, academia, industry, the certification bodies and members of the CESG Listed Adviser Scheme (CLAS). The framework includes a set of IA role definitions and a certification process. This document provides guidance for applicants for certification as a CCP Penetration Tester at Senior level. Feedback CESG Information Assurance Standards and Guidance welcomes feedback and encourage readers to inform CESG of their opinions, positive or otherwise, in respect to the content of this document. Please [email protected] Page 1

4 Application Guidance - CCP Penetration Tester Role, Contents: Overall Requirements for the Penetration Tester Role,... 3 Key Principles... 3 Role Purpose... 3 Senior Penetration Tester Skills Framework for the Information Age (SFIA) Responsibility Level Role Headline Statement... 4 Qualifications... 4 Senior Penetration Tester - Headline Statement... 4 Knowledge Requirements Overall Requirements... 6 Knowledge Requirements for the Penetration Tester Role... 7 Knowledge Requirements - Engagement, Legislation & Risk... 7 Knowledge Requirements - Core Technical Knowledge... 9 Knowledge Requirements - Information Gathering Knowledge Requirements - Networking Knowledge Requirements - Microsoft Windows Security Assessment Knowledge Requirements - UNIX Security Assessment Knowledge Requirements - Databases Knowledge Requirements - Web Technologies Knowledge Requirements - Physical Access & Security Knowledge Requirements - Web Application Security Assessment Skills Experience The Certification Process next steps The CCP Scheme Certification Learning Cycle References Glossary Page 2

5 Overall Requirements for the Penetration Tester Role, Key Principles This document is intended as a guide on how to structure evidence when applying for certification as a Penetration Tester at Senior level in the CESG Certification for IA Professionals (CCP) scheme. It includes suggestions of what you need to learn and know before applying and complements the CESG Certification for IA Professionals (reference [a]) and Guidance to CESG Certification for IA Professionals (reference [b]) publications, for which see Learning comes through acquiring skills and knowledge (from training, experience and learning from others doing the same job) and then putting these into practice. Most people will need a few years to acquire these, although in some cases this period may be longer or shorter. The section on skills provides prompts for evidence to demonstrate that you meet the required standards. You are encouraged to follow the advice in this section when completing your written submission. Role Purpose Penetration testing is an independent assessment of the different elements that comprise an information system or product with the goal of finding and documenting any vulnerabilities present. The resultant report is considered together with threat reports and other information sources to derive a risk assessment that can be used to drive security improvements. The role of a Penetration Tester is to: ensure that any testing activity is lawful, compliant with all relevant regulations and within the agreed scope conduct technical security tests against the information system or product with the aim of identifying vulnerabilities communicate the results of the tests at a level tailored to the audience provide technical consultancy and recommendations to customers as to how any reported vulnerabilities could be mitigated Page 3

6 Senior Penetration Tester Skills Framework for the Information Age (SFIA) Responsibility Level 4 Role Headline Statement Enables and contributes to the successful delivery of penetration testing services Qualifications The following qualifications are recognised by CESG as demonstrating compliance with the Senior Penetration Tester knowledge requirements. An applicant for this role must therefore hold at least one of the following mandatory qualifications which must be valid (i.e. the qualification must not have expired) when the assessment is made by the Certification Body (CB): Cyber Scheme Team Member Tiger Scheme Qualified Security Team Member Crest Registered Tester GCHQ Senior Penetration Tester Senior Penetration Tester - Headline Statement scopes penetration tests accurately, allocating resources and ensuring personal compliance with relevant legislation and standards works autonomously and under general direction, delivering accurate technical results in accordance with a scope and test plan performs a broad range of complex penetration tests that demonstrate an analytical and systematic approach applies knowledge of configuration errors, vulnerabilities and coding flaws to create and execute a series of tests to validate the security of a system or product communicates penetration test results to both technical and non-technical audiences, facilitating collaboration between stakeholders where necessary. Influences peers and customers by delivering presentations, papers and reports on the results of penetration testing Page 4

7 understands information technology and actively maintains awareness of developments in the penetration testing and information security fields participates in technical and/or professional development activities beyond his/her own team, sharing knowledge with colleagues to improve the penetration testing service This diagram gives an overall picture of the different elements of Information Assurance and their interdependence. Penetration Testers need to work with others to understand the organisation s environment and risk appetite in order to scope and influence testing. They also need effective communication skills to present their advice in a way that their clients can understand and use. Page 5

8 Knowledge Requirements Overall Requirements The following are examples of background knowledge which a Penetration Tester should maintain: Information classification and protective markings Risk assessment tools, techniques and methodologies, business impact levels, risk controls (preventive, detective, corrective); sources of assurance (intrinsic, extrinsic, operational) Vulnerability detection tools Current research trends Applicable risk appetite and risk tolerance Information systems engineering and development practices What good and bad security look like and how to factor security into the system development lifecycle Common causes of security incidents Incident management Common sources of information to support security incident investigation Preservation of evidence for use in formal procedures Local business objectives More detail is provided in the following pages. Page 6

9 Knowledge Requirements for the Penetration Tester Role Knowledge Requirements - Engagement, Legislation & Risk 1 5 Engagement Life-Cycle understands: the penetration testing life-cycle, from the initial client contact to the delivery of the final report and subsequent consultancy work the structure of a penetration test, including all relevant processes and procedures the different types of penetration test, such as infrastructure and application, white- and black-box penetration testing methodologies, including those defined by the tester s employer, together with recognised standards, such as those required in the CHECK Scheme and knows how to: articulate the benefits a penetration test will bring to a client and accurately convey the results of the penetration testing in a verbal de-brief and written report Scoping understands: client requirements and can produce an accurate and adequately resourced penetration testing proposal technical, logistical, financial and other constraints, and how to take these into account without compromising the effectiveness of the penetration test Legal Matters understands: the legislation pertaining to penetration testing and can give examples of compliance/non-compliance. This legislation includes: Computer Misuse Act 1990; Data Protection Act 1998; Human Rights Act 1998; Police and Justice Act 2006; Police and Criminal Evidence Act 1984; Regulation of Investigatory Powers Act 2000; Telecommunications (Lawful Business Practice (Interception of Communications Regulations)) 2000 the impact this legislation has on the penetration testing process, the ethical issues associated with penetration testing, as well as understanding non-disclosure agreements and how to comply with their requirements Page 7

10 Understanding & Mitigating Risk understands: the risks associated with a penetration test and how these can be mitigated the importance of availability & how the risk of a denial-of-service can be reduced the importance of client confidentiality Record Keeping and Reporting understands: the reporting requirements mandated by internal and external standards the importance of keeping accurate and structured records during a penetration test, including the output from tools the security requirements associated with record keeping, both during the penetration test and following the delivery of the final report and knows how to: write an appropriately tailored report from the information gathered during a penetration test categorise vulnerabilities with respect to recognised methodologies Platform Preparation knows how to: prepare for a penetration test with regard to the required hardware and software ensure that all necessary hardware is available, including laptops, switches, media converters and wireless devices and that all operating systems and testing tools are relevant and up-to-date avoid data cross-contamination, e.g. by sanitising a hard disk prior to deployment or taking an image from a master build Page 8

11 Knowledge Requirements - Core Technical Knowledge IP Protocols understands: IPv4 and IPv6 and their associated security attributes common IP/Ethernet protocols and their associated security attributes, including: TCP, UDP, ICMP, ARP, DHCP, DNS, CDP, HSRP, VRRP, VTP, STP and TACACS+ the security implications of using clear-text protocols, such as Telnet and FTP File System Permissions and System Processes understands: how to demonstrate the manipulation of file system permissions on UNIX-like and Windows operating systems how insecure file system permissions can be exploited to escalate privileges and/or gain further access to a host how to find interesting files on an operating system, e.g. those with insecure or unusual permissions, or containing user account passwords how to identify running processes on UNIX-like and Windows operating systems and exploit vulnerabilities to escalate privileges Cryptography understands: cryptography and its use in a networked environment common encrypted protocols and software applications, such as SSH, SSL, IPSEC and PGP wireless protocols that support cryptographic functions, including: WEP, WPA, WPA2, TKIP, EAP, LEAP, PEAP and their associated security attributes and how they can be attacked the differences between symmetric and asymmetric cryptography and can give examples of each common cryptographic algorithms, such as DES, 3DES, RSA and AES, including their security attributes and how they can be attacked common hash functions, such as MD5 and SHA1, including their security attributes and how they can be attacked Message Authentication Codes (MACs) and Hashed MACs (HMACs) Page 9

12 Pivoting understands: the concept of pivoting through compromised devices how to demonstrate pivoting through a number of devices in order to gain access to targets on a distant subnet Using Tools and Interpreting Output understands: how to use a variety of tools during a penetration test, selecting the most appropriate tool to meet a particular requirement and interpret and understand the output of tools, including those used for port scanning, vulnerability scanning, enumeration, exploitation and traffic capture Packet Generation understands: the different types of packets that are likely to be encountered during a penetration test ARP spoofing and how to demonstrate this technique in a safe and reliable way how to generate arbitrary packets, including TCP, UDP, ICMP and ARP, modifying packet parameters as required, e.g. source and destination IP addresses, source and destination ports, and TTL Service Identification understands: how to identify the network services offered by a host and state the purpose of an identified network service and determine its type and version Fingerprinting understands: active and passive operating system fingerprinting techniques and how to demonstrate their use during a penetration test Traffic filtering and Access Control understands: network traffic filtering and where this may occur in a network and the devices and technology that implement traffic filtering, such as firewalls and how to advise on their configuration how to demonstrate methods by which traffic filters can be bypassed network access control systems, such as 802.1x and MAC address filtering and how these technologies can be bypassed Patch Levels understands: how to obtain operating system patch levels on UNIX-like and Windows operating systems Page 10

13 Knowledge Requirements - Information Gathering Domain Registration understands: the format of a WHOIS record and how to obtain such a record to derive information about an IP address and/or domain DNS understands: the Domain Name Service (DNS) including queries and responses, zone transfers, and the structure and purpose of records, including: SOA, NS, MX, A, CNAME; PTR, TXT and HINFO how to demonstrate how a DNS server can be queried to obtain the information detailed in these records and reveal other information that might reveal target systems or indicate the presence of security vulnerabilities Web Site Analysis understands: how to interrogate a website to obtain information about a target network, such as the name and contact details of the network administrator Search Engines, News Groups and Mailing Lists understands: how to use search engines, news groups, mailing lists and other services to obtain information about a target network, such as the name and contact details of the network administrator Information Leakage understands: how to obtain information about a target network from information leaked in headers, HTML meta tags and other locations, such as an internal network IP address Banner Grabbing understands: how to enumerate services, their software types and versions, using banner grabbing techniques SNMP understands: how to retrieve information from SNMP services and understands the MIB structure pertaining to the identification of security vulnerabilities Page 11

14 Knowledge Requirements - Networking Network Architecture understands: network architectures and logical network diagrams the security benefits of tiered architectures, DMZs and air-gaps the security implications of shared media and can exploit its vulnerabilities during a penetration test Network Routing understands: network routing and its associated protocols, including: RIP, OSPF, IGRP, EIGRP, BGP, EGP, IGMP the security attributes of these protocols Network Mapping understands: how to demonstrate the mapping of a network using a range of tools, such as traceroute, tcptraceroute and ping, by querying active services, such as DNS and SNMP servers how to present the map as a logical network diagram, detailing all discovered subnets and interfaces, including routers, switches, hosts and other devices how to accurately identify all hosts on a target network that meet a defined set of criteria, e.g. to identify all FTP servers or CISCO routers Management Protocols understands: how to demonstrate the use of protocols often used for the remote management of devices including Telnet, SSH, HTTP/HTTPS, SNMP, TFTP, NTP the security attributes of these protocols how to demonstrate how these services can be exploited to gain access to a device or derive further information about the target network, e.g. SNMP service enumeration or the exploitation of a vulnerable CISCO HTTP server Traffic analysis understands: how to intercept and monitor network traffic, capturing it to disk in a format required by analysis tools how network traffic can be analysed to recover user account credentials and detect vulnerabilities that may lead to the compromise of a target device Page 12

15 Configuration Analysis understands: configuration files of CISCO routers and switches and can advise on how their security can be approved (most common features, such as accesslists and enabled services) how to interpret the configuration files of other network devices, including those produced by a variety of vendors (most common features, such as access-lists and enabled services) Routers and Switches understands: how to demonstrate the exploitation of vulnerabilities in routers and switches, including the use of the following protocols: Telnet, HTTP/HTTPS, TFTP, SNMP VoIP understands: VoIP services, such as SIP, and can identify and fingerprint devices offering these services Page 13

16 Knowledge Requirements - Microsoft Windows Security Assessment Reconnaissance understands how to: identify Windows hosts on a target network identify domains, domain controllers, domain members and workgroups enumerate accessible Windows shares Enumeration understands how to: perform user and group enumeration on target systems and domains, using protocols including: NetBIOS, LDAP, and SNMP obtain other information, such as password policies Active Directory understands: Active Directory Group Policy Local Security Policy user accounts and how to manipulate these accounts to gain further access to a target system, e.g. by escalating privileges from a domain user to a domain admin Page 14

17 Passwords understands: password policies, including complexity requirements and lock-out how to avoid causing a denial-of-service by locking-out accounts Windows password hashing algorithms and their associated security attributes how passwords are stored and protected and can demonstrate how they can be recovered off-line password cracking using dictionary and brute-force attacks, including the use of rainbow tables, and how to demonstrate this and the recovery of password hashes when given physical access to a Windows host Remote Vulnerabilities understands: the remote exploitation of Windows operating system and third-party software application vulnerabilities and how to demonstrate this Local Vulnerabilities understands how to demonstrate: the local exploitation of Windows operating system and third-party software application vulnerabilities local privilege escalation techniques, e.g. through the manipulation of insecure file system permissions Post exploitation understands how to demonstrate: common post-exploitation activities including: password recovery, including cached credentials, lateral movement and domain compromise, the checking of operating system and third party software application patch levels Desktop Lockdown understands: the concept of desktop lockdown and how to demonstrate how a user can break-out of a locked down environment Patch Management understands: common patch and software management techniques and applications, including WSUS and Altiris Page 15

18 Knowledge Requirements - UNIX Security Assessment Reconnaissance understands how to: identify UNIX hosts on a target network Enumeration understands how to: perform user enumeration on target system using a variety of techniques, including remote login protocols, SMTP, finger and SNMP perform file system enumeration on a target system, using a variety of techniques, including remote login protocols, FTP, HTTP, NFS and TFTP enumerate RPC services & identify those with known security vulnerabilities show awareness of legacy user enumeration techniques such as rusers and rwho Passwords understands: users, groups and password policies, including complexity requirements and lock-out how to avoid causing a denial-of-service by locking-out accounts the format of the passwd, shadow, group and gshadow files UNIX password hashing algorithms and their associated security attributes how passwords are stored and protected and can demonstrate how they can be recovered off-line password cracking using dictionary and brute-force attacks, and how to demonstrate this how to demonstrate the recovery of password hashes when given physical access to a UNIX host Remote Vulnerabilities understands: how to demonstrate the remote exploitation of Solaris & Linux operating system vulnerabilities (several key remote vulnerabilities are detailed individually within this section) Local Vulnerabilities understands how to demonstrate: the local exploitation of Solaris and Linux operating system vulnerabilities local privilege escalation techniques, e.g. through the manipulation of insecure file system permissions Page 16

19 Post exploitation understands how to: demonstrate common post-exploitation activities including: password recovery, lateral movement, the checking of operating system and third party software application patch levels FTP/TFTP understands: FTP and how to demonstrate how a poorly configured FTP server can be exploited, eg the downloading of arbitrary files, the uploading and overwriting of files, and the modification of file system permissions TFTP and how to demonstrate how a poorly-configured TFTP server can be exploited, e.g. the downloading of arbitrary files, the uploading and over-writing of files NFS understands: NFS and its associated security attributes, and how to demonstrate how exports can be identified How to demonstrate how a poorly configured NFS service can lead to the compromise of a server, allow a user to escalate privileges and/or gain further access to a host, eg through the creation of SUID-root files, the modification of files and file system permissions and UID/GID manipulation Berkeley r-services understands: the Berkeley r-services and their associated security attributes and how to demonstrate how trust relationships can lead to the compromise of a server, allow a user to escalate privileges and/or gain further access to a host, e.g. through the use, creation or modification of.rhosts and/or /etc/hosts.equiv files SSH understands: SSH and its associated security attributes, including the different versions of the protocol, version fingerprinting and how the service can be used to provide a number of remote access services how to demonstrate how trust relationships can lead to the compromise of a server, allow a user to escalate privileges and/or gain further access to a host, e.g. through the use, creation or modification of ~/.ssh/authorised_keys files X understands: X and its associated security attributes, and how to demonstrate how insecure sessions can be exploited, e.g. by obtaining screen shots, capturing keystrokes and injecting commands into open terminals Page 17

20 Knowledge Requirements - Databases Microsoft SQL Server understands how to demonstrate: the remote exploitation of Microsoft SQL server how access can be gained to a Microsoft SQL server through the use of default accounts credentials and insecure passwords how to identify and extract useful information stored within a database (e.g. user account names and passwords, recovering passwords where possible) following the compromise of Microsoft SQL server, how to use stored procedures to execute system commands, escalate privileges, read/write from/to the file system, and/or gain further access to a host Oracle understands: how to demonstrate the remote exploitation of an Oracle database the security attributes of the Oracle TNS Listener service how to demonstrate how access can be gained to an Oracle database server through the use of default accounts credentials and insecure passwords how to identify and extract useful information stored within a database (e.g. user account names and passwords, recovering passwords where possible) how the software version and patch status can be obtained from an Oracle database following the compromise of an Oracle database server, how to use stored procedures to execute system commands, escalate privileges, read/write from/to the file system and/or gain further access to a host Other Database Servers understands how to demonstrate: the remote exploitation of other common database servers, such as MySQL and PostgreSQL how access can be gained to such a database server through the use of default accounts credentials and insecure passwords how to identify and extract useful information stored within a database (e.g. user account names and passwords, recovering passwords where possible) Page 18

21 Knowledge Requirements - Web Technologies Web Servers understands: how to identify web servers on a target network and remotely determine their type and version how to demonstrate the remote exploitation of web servers the purpose, operation, limitation and security attributes of web proxy servers Protocols and Methods understands: how to demonstrate the use of web protocols, including HTTP, HTTPS, SOAP how the insecure implementation of software developed using these languages can be exploited All HTTP methods and response codes Reconnaissance understands: the purpose of website and application reconnaissance how to discover the structure of a website and application Languages understands: common web mark-up and programming languages, including.net, ASP, Perl, PHP, JSP, Javascript how the insecure implementation of software developed using these languages can be exploited (candidate may select two languages) APIs understands how to demonstrate: the use of web-based APIs to remotely access remote services how the insecure implementation of web-based APIs can be exploited Information Gathering understands how to: gather information from a website and application mark-up or programming language, including: hidden form fields, database connection strings, user account credentials, developer comments, external and/or authenticated-only URLs gather information about a website and application from the error messages it generates Page 19

22 Authentication understands: common authentication and access-control mechanism vulnerabilities and how to give examples of common vulnerabilities and implementation best practice Input Validation understands: the importance of input validation and how it can be implemented, e.g. white-lists, black-lists and regular expressions Fuzzing understands: fuzzing and its use in web application testing the generation of fuzzing strings and their potential effects, including the dangers they may introduce XSS understands: cross-site scripting (XSS) and can demonstrate the launching of a successful XSS attack Injection understands: injection vulnerabilities, including: code injection, SQL injection, XML injection Blind SQL injection understands: blind SQL injection vulnerabilities Sessions understands: how sessions are managed and can give examples of common vulnerabilities and implementation best practice Cryptography understands: how cryptography can be used to protect data in transit and data at rest, both on the server and client side the concepts of SSL and can determine whether an SSL-enabled web server has been configured in compliance with best practice (i.e. it supports recommended ciphers and key lengths) Code Review understands: the techniques for identifying vulnerabilities in source code Page 20

23 Knowledge Requirements - Physical Access & Security Locks understands: how locks can be used to restrict access to computer hardware Tamper seals understands: how tamper seals can be used to deter access to computer hardware Platform Integrity understands: platform integrity technologies, e.g. TPM Boot Sequence understands: the BIOS boot sequence and how to obtain privileged access to an operating system by exploiting vulnerabilities in a boot sequence configuration, e.g. booting from removable media or enabling PXE boot Disk Encryption understands: the security implications of unencrypted storage devices, such as hard disks how to demonstrate how data can be recovered from unencrypted storage devices, and how such data can be manipulated to introduce vulnerabilities into an operating system Recovery Functionality understands: the security attributes of operating system recovery functionality, e.g. Windows Recovery Console and Safe Mode Multi-Factor Authentication understands: multi-factor authentication systems, such as tokens and SMS Page 21

24 Knowledge Requirements - Web Application Security Assessment The knowledge requirements for Web Application Security Assessment apply to those who demonstrate this particular technical specialism within the wider Penetration Tester role. It is acknowledged that such a specialism may result in a penetration tester having a lesser understanding of the knowledge requirements detailed in the sections on Networking, Microsoft Windows Security Assessment and Unix Security Assessment. This is captured by the providers of the mandatory qualifications detailed within the role definition and need not be further explored by the Certification Body. The knowledge requirements for Web Application Security Assessment are defined in the OWASP Testing Guide v4. See for further information and to obtain a copy of this guide. To avoid duplication, these requirements have not been repeated in this document; however, the mandatory sections to be included and the associated knowledge requirements are detailed below: S Section Title 4.2 Information Gathering 4.3 Configuration and Deploy Management Testing 4.4 Identity Management Testing 4.5 Authentication Testing 4.6 Authorisation Testing 4.7 Session Management Testing 4.8 Data Validation Testing 4.9 Error Handling 4.10 Cryptography 4.11 Logging 4.12 Business Logic Testing 4.13 Denial- of-service 4.14 Web Service Testing 4.15 Client Site Testing Page 22

25 Skills When presenting your skills evidence, use the STAR format: Situation, Task, Action, Result Use a narrative form, e.g.... I produced...my decision was... Explain what accreditation decision you made and how the measures you required were proportionate and effective You must meet the required levels at all 4 core skills - (A2 Policy & Standards, D2 Security Testing, E3 Vulnerability Assessment, I3 Applied Research) In addition to all the core skills, you must meet 75% of the non-core skills A single piece of work may be used for several skills, but a variety of examples gives better evidence of being able to work in more than one situation. The following table provides suggestions for starting points in evidence. SKILL A1 Governance Level 1 Understands local arrangements for Information Governance (IG) A2 Policy & Standards, Level 1 - core skill Understands the need for policy and standards to achieve Information Security (IS) A3 Information Security Strategy Level 1 Understands the purpose of IS strategy to realise business benefits Technical Skills EVIDENCE OF SKILL Give examples of how your penetration testing was in accordance with the policies, processes and procedures of an organisation you ve worked for, which were designed to protect information assets during and after penetration testing. Give an example of how a customer s processes and controls affected the way you carried out penetration testing e.g. a customer requested that you did not perform any exploitation. Give examples of: your use of IS and other, non-technical, policies and standards. How did penetration testing fit within these requirements? how did you ensure that your penetration testing was in accordance with recognised methodologies, e.g. OWASP? Explain how in your experience local information security strategy has affected the technical security environment in a positive or negative way. Page 23

26 SKILL A4 Innovation & Business Improvement Level 1 Is aware of the business benefits of good IS A5 IS Awareness & Training Level 1 Understands the role of security awareness and training in maintaining Information Security A6 Legal & Regulatory Environment Level 2 Understands applicable legislation and regulations relating to IS in the context of own or client organisations A7 Third Party Management 1 Level 1 Is aware of the need for organisations to manage the information security of third parties B1 Risk Assessment Level 2 EVIDENCE OF SKILL How have risk mitigations which you have advised on benefitted the organisation (e.g. in terms of reduced costs/risk or more effective monitoring etc)? Give examples where you have seen the effectiveness of security awareness programmes, for example whether they made an organisation more or less vulnerable to a successful social engineering attack. Give examples from different work environments of how you ensured your work doesn t contravene relevant statutes and how you explained this to customers. (For example, the Computer Misuse Act prohibits breaking into a system but the contract you were employed on might require or permit this). How did you report the types of material/breaches which you were required to and what were the results of this? Give examples of any problems you ve encountered when asked to review something out of scope in a third party system. How did you gain legitimate access? How did you describe the relevance of tests if you were not allowed to access relevant third party systems? Describe how, as a result of penetration testing, you made an appropriate risk assessment and associate recommendations. What was the outcome of your work? Understands how to produce information risk assessments 1 Skill only required if information systems or services are provided by a third party Page 24

27 SKILL B2 Risk Management Level 2 Contributes to management of risks to information systems with supervision C1 Security Architecture Level 2 Applies architectural principles to security design with some supervision C2 Secure Development Level 1 Network Infrastructure Penetration Testing Specialist Is aware of the benefits of addressing security during system development C2 Secure Development Level 2 Web Application Penetration Testing Specialist Contributes to the development of secure systems with some supervision D1 IA Methodologies Level 1 Is aware of the existence of methodologies, processes and standards for providing Information Assurance EVIDENCE OF SKILL Give examples of how you worked with others to produce recommendations to improve information assurance. Describe how you advised on IA architecture in the development cycle for information security systems. What was the outcome? Give examples from your experience of how security and secure development of products and systems were improved by penetration testing. Give examples of how secure development would have contributed to a better outcome from penetration testing. What examples of poor development standards have you come across? How could these have been improved? Give examples from your experience of appropriate and proportionate penetration. Give examples of standards, e.g. such as those required in the CHECK Scheme, and/or methodologies and when these should be used. Page 25

28 SKILL D2 Security Testing Level 2 core skill Effectively applies testing methodologies, tools or techniques with some supervision E1 Secure Operations Management, Level 2 Monitors the application of Security Operating Procedures (SyOPs) with some supervision E2 Secure Operations & Service Delivery, Level 2 Effectively applies SyOPs with some supervision E3 Vulnerability Assessment, Level 2 core skill Obtains and acts on vulnerability information in accordance with SyOPs F1 Incident Management, Level 2 Contributes to security incident management EVIDENCE OF SKILL Give examples from a range of work environments of: the difference between vulnerability assessments and penetration tests you ve carried out testing methodologies - and instances when you developed new ones test plans you developed and how you implemented them, or technical reports you wrote following security testing Give examples of tests you ve carried out to detect vulnerabilities. How did you ensure that operations were not impacted by the testing, and that alerts which were raised were not mistaken for an actual attack? Give examples of how you have influenced a customer to mitigate security risks. How did this affect monitoring and logging controls and escalation procedures? How was security improved? Give examples from different work environments of occasions when you identified vulnerabilities in a system or application. What tools and methodologies did you use and how did you make colleagues and/or customers aware of the vulnerabilities? What did you do to mitigate them and what was the outcome? What were the limitations of the vulnerability assessments compared with penetration testing? How often were vulnerability assessments done and was the frequency appropriate? How were the vulnerabilities used to mount exploits? Give examples from a range of environments of how you recommended incident management procedures which met a client s requirements. What role did post incident reviews and CERTs play in your recommendations? Page 26

29 SKILL F2 Investigation Level 2 Contributes to investigations into security incidents F3 Forensics Level 1 Is aware of the capability of forensics to support investigations G1 Audit and Review Level 1 Understands basic techniques for testing compliance with security criteria (policies, standards, legal and regulatory requirements) H1 Business Continuity Planning and H2 Business Continuity Management Level 1 Understands how Business Continuity Planning & Management contributes to information security I3 Applied Research Level 2 core skill Performs research activities under supervision EVIDENCE OF SKILL Give examples of how you contributed to security investigations, eg recommendations you made. How did you present your evidence and how would you recommend that evidence is preserved appropriately? How did you protect client information? How have you reported attacks you ve discovered during testing and what recommendations did you make? What balance did you strike between recovery and the need for forensic evidence? What remedial actions ensured no further attacks? Give examples of: malware you ve detected what testing did you carry out and what did you do with your results? recovering information from logs, hard discs, etc. What tools and techniques did you use and what legislation or regulations did you have to follow? How did you remain in scope and legal whilst trying to track the perpetrator(s)? Give examples of how you ve used your understanding of basic techniques for testing compliance with security criteria when developing or reviewing the scope of vulnerability testing. Describe how you incorporated business continuity management into your vulnerability testing e.g. out of hours testing, or sampling. How did you include business continuity in your advice on vulnerability mitigations and escalations? Give examples from different work environments to show how you tested whether traditional business continuity plans were fit for purpose in the context of cyber security incidents. Give examples from different work environments of: research papers you contributed to research you ve carried out what was the purpose of this and what benefit did it provide? Page 27

30 PEOPLE SKILLS J skills (instead of SFIA levels) SKILL EVIDENCE OF SKILL J1 Teamwork and Leadership Give examples of: Level 2.5 ways in which you provided a lead in helping teams or individuals to improve work processes. How did you Encourages & challenges others. Provides a address conflict if this arose? lead across an organisation J2 Delivering Give examples of : Level 2.5 situations where you ensured that your team or colleagues maintained delivery in challenging circumstances. Responsible for ensuring delivery is achieved What did you do to facilitate timely and responsible delivery? against a portfolio of business objectives, overcoming obstacles to achieve goals J3 Managing Customer Relationships Level 2.5 Give examples of ways you worked with customers to anticipate and positively influence their needs, so that business plans accommodated customer needs appropriately. This can include times when you negotiated satisfactory compromises Works with customers to ensure that their needs drive business plans J4 Corporate Behaviour Level 2.5 Give examples of cost effective and proportionate proposals you ve made to mitigate security vulnerabilities. Takes action to achieve greater corporate efficiency, in line with strategic aims J5 Change and Innovation Level 2.5 Contributes to change strategies and generates new ideas or approaches, going beyond the local area Give examples of changes you introduced what did you do, what techniques did you use and why? What were the outcomes and what would you do differently in the future? How did you consider the impact on other people and processes and try to find ways to acknowledge the opinions of others? Page 28

31 SKILL J6 Analysis and Decision Making Level 2.5 Makes effective decisions and/or solves complex problems in uncertain situations, or where the impact is greater than in the immediate working area J7 Communication and Knowledge Sharing Level 2.5 Is a persuasive communicator. Sets a lead in sharing knowledge effectively in diverse areas across the organisation EVIDENCE OF SKILL Give examples from different environments of recommendations and solutions you produced where there was no clear process. What problems did you deal with and what was the result? Give examples of how you adapted your communication to suit different media, including face to face, over the phone, s, presentations and meetings to ensure timely and responsible disclosure e.g.: publishing reports stand-up briefings Board presentations Risk escalation processes Participation in security working groups etc. What were the outcomes? Page 29

32 Experience Agree a plan with your manager to ensure that you cover the necessary ground, as suggested below. Your evidence should show that you: scope complex penetration tests which comply with relevant legislation and standards accurately and allocate resources for these work autonomously and under general direction and deliver accurate technical results in accordance with a scope and test plan carry out a broad range of penetration testing, following an analytical and systematic approach create and execute tests to validate system or product security, applying your knowledge of configuration errors, vulnerabilities and coding flaws communicate the outcomes and implications of penetration test results to colleagues and/or customers effectively, whether they are technical or non-technical in their knowledge and that you facilitate collaboration between stakeholders where necessary deliver presentations, papers and reports which influence peers and customers keep up to date with the latest developments in penetration testing and information security engage in technical and/or professional development activities beyond your team and share and use that knowledge to improve the penetration testing service in your organisation Page 30

33 The Certification Process next steps This Application Guidance contains material designed to help individuals applying for Senior Practitioner Penetration Tester. The certification processes for the different CBs follow below. Note: 1. If you are considering applying for the Principal level, you will need to show wider experience of more complex systems and satisfy the requirement for higher specialist skill levels see Consultancy experience would also be appropriate. 2. If you are considering applying for the Lead level, you will need to show that you influence and direct the penetration testing function at an organisational or inter-organisational level and satisfy the requirement for higher specialist skill levels. For example, you directly and regularly brief or advise a Directors Board in this regard. See 3. There are 3 CBs: the APM Group ( ), BCS, The Chartered Institute for IT ( ) and the IISP, RHUL & CREST Consortium ( ). Certification is for 3 years and requires evidence of continuing professional development throughout the period of certification. Page 31

34 End of certification process Interview Certification decision APMG CREST Registered Pen Tester Cyber Scheme Team Member TIGER Scheme Qualified Security Tester GCHQ Senior Pen Tester Apply online Senior Penetration Tester certification process - APMG Technical evaluation Written submission Personal evaluation Page 32

35 End of Certification Process certification decision BCS CREST Registered Pen Tester Cyber Scheme Team Member TIGER Scheme Qualified Security Tester GCHQ Senior Pen Tester interview apply online Senior Penetration Tester certification process - BCS assessment written submission Page 33

36 End of Certification Process Recommendation & certification decision interview IISP CREST Registered Pen Tester Cyber Scheme Team Member TIGER Scheme Qualified Security Tester GCHQ Senior Pen Tester apply online Senior Penetration Tester certification process - IISP assessment written submission Page 34

37 The CCP Scheme Certification Learning Cycle If there is a gap against CCP requirements, make a timebounded plan to develop skills and knowledge, with suitable opportunities to apply them Page 35

38 Application Guidance - CCP Penetration Tester Role, References [a] CESG Certification for IA Professionals. Available from: [b] Guidance to CESG Certification for IA Professionals. Available from: Page 36

39 Application Guidance - CCP Penetration Tester Role, Glossary AES API ARP BGP BIOS CDP CHECK CNAME CVSS DES DHCP DMZ DNS EAP EGP EIGRP FTP GID HINFO HMACs HSRP HTML HTTP HTTPS ICMP IGMP IGRP IPSEC LEAP LDAP Advanced Encryption Standard Application Programming Interface Address Resolution Protocol Border Gateway Protocol Basic Input Output System Cisco Discovery Protocol IT Health Check Service Canonical Name Record Common Vulnerability Scoring System Data Encryption Standard Dynamic Host Configuration Protocol Demilitarized Zone (firewall configuration) Domain Name System Extensible Authentication Protocol Exterior Gateway Protocol Enhanced Interior Gateway Routing Protocol File Transfer Protocol Group Identifier Host Information Hashed MACs Hot Standby Router Protocol Hyper Text Mark Up Language Hypertext Transfer Protocol communications protocol for secure communication over a computer network Internet Control Message Protocol Internet Group Management Protocol Interior Gateway Routing Protocol Internet Protocol Security Programming language Lightweight Directory Access Protocol Page 37

40 Application Guidance - CCP Penetration Tester Role, MACs MD5 MIB MX NetBIOS NFS NS NTP OSPF OWASP PEAP PGP PTR PXE RIP RPC RSA SHA1 SIP SMTP SNMP SOA SOAP SQL SSH SSL STP SUID TACACS TCP TFTP TKIP TPM Message Authentication Codes Message Digest algorithm cryptographic hash function Management Information Base Mail Exchanges Network Basic Input/Output System Network File System Name Server (implements a name service protocol) Network Time Protocol Open Shortest Path First Open Web Application Security Project Protected Extensible Authentication Protocol Pretty Good Privacy Pointer record Preboot execution environment Routing Information Protocol Remote Procedure Call public key cryptosystem (named after its authors) Secure Hash Algorithm cryptographic hash function Session Initiation Protocol Simple Mail Transfer Protocol Simple Network Management Protocol Service Oriented Architecture Simple Object Access Protocol Structured Query Language Secure Shell Secure Sockets Layer Straight through Processing Set Owner User ID up Terminal Access Controller Access-Control System Plus Transmission Control Protocol Trivial File Transfer Protocol Temporal Key Integrity Protocol Trusted Platform Module Page 38

41 Application Guidance - CCP Penetration Tester Role, TTL TXT UDP UID URL VOIP VRRP VTP WEP WPA WSUS XML Transistor-Transistor Logic Text file User Datagram Protocol User Identifier Uniform Resource Locator Voice Over Internet Protocol Virtual Router Redundancy Protocol VLAN (Virtual Local Area Networks) Trunking Protocol Wired Equivalent Privacy Wifi-protected access Windows Server Update Services Extensible Mark Up Language Page 39

42 IA CESG A2i Hubble Road Cheltenham Gloucestershire GL51 0EX Tel: +44 (0) Fax: +44 (0) Crown Copyright Communications on CESG telecommunications systems may be monitored or recorded to secure the effective operation of the system and for other lawful purposes.

January 2016 Issue No: 2.0. Application Guidance CCP Penetration Tester Role, Practitioner Level

January 2016 Issue No: 2.0. Application Guidance CCP Penetration Tester Role, Practitioner Level January 2016 Issue No: 2.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Tester Role, Practitioner Level Issue No: 2.0 January 2016 The copyright of this document is reserved and

More information

Application Guidance CCP Penetration Tester Role, Practitioner Level

Application Guidance CCP Penetration Tester Role, Practitioner Level August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document

More information

April 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level

April 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level April 2015 Issue No:1.0 Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level Application Guidance CCP Security and Information Risk Advisor Role, Practitioner Level

More information

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests

More information

(d-5273) CCIE Security v3.0 Written Exam Topics

(d-5273) CCIE Security v3.0 Written Exam Topics (d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002

More information

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Network Security Fundamentals

Network Security Fundamentals APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

Web App Security Audit Services

Web App Security Audit Services locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Cyber Essentials. Test Specification

Cyber Essentials. Test Specification Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

Implementing Cisco IOS Network Security

Implementing Cisco IOS Network Security Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

What is Web Security? Motivation

What is Web Security? Motivation [email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

April 11, 2011. (Revision 2)

April 11, 2011. (Revision 2) Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

Tim Bovles WILEY. Wiley Publishing, Inc.

Tim Bovles WILEY. Wiley Publishing, Inc. Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5

More information

IINS Implementing Cisco Network Security 3.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS) IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Black Box Penetration Testing For GPEN.KM V1.0 Month dd #$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;! Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Codes of Connection for Devices Connected to Newcastle University ICT Network

Codes of Connection for Devices Connected to Newcastle University ICT Network Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes

More information

February 2015 Issue No: 5.2. CESG Certification for IA Professionals

February 2015 Issue No: 5.2. CESG Certification for IA Professionals February 2015 Issue No: 5.2 CESG Certification for IA Professionals Issue No: 5.2 February 2015 The copyright of this document is reserved and vested in the Crown. This document may not be reproduced or

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Professional Penetration Testing Techniques and Vulnerability Assessment ... Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

Guidance End User Devices Security Guidance: Apple OS X 10.9

Guidance End User Devices Security Guidance: Apple OS X 10.9 GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform

More information

Description: Objective: Attending students will learn:

Description: Objective: Attending students will learn: Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

Exam Questions SY0-401

Exam Questions SY0-401 Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration

More information

Computer Networks. Secure Systems

Computer Networks. Secure Systems Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

SENSITIVE AUSTRALIAN SPORTS COMMISSION ATHLETE MANAGEMENT SYSTEM (AMS) SMARTBASE SECURITY TEST PLAN. Final. Version 1.0

SENSITIVE AUSTRALIAN SPORTS COMMISSION ATHLETE MANAGEMENT SYSTEM (AMS) SMARTBASE SECURITY TEST PLAN. Final. Version 1.0 SENSITIVE AUSTRALIAN SPORTS COMMISSION ATHLETE MANAGEMENT SYSTEM (AMS) SMARTBASE SECURITY TEST PLAN Final Version 1.0 Preconditions This security testing plan is dependent on the following preconditions:

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

General Network Security

General Network Security 4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

Rational AppScan & Ounce Products

Rational AppScan & Ounce Products IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

1. LAB SNIFFING LAB ID: 10

1. LAB SNIFFING LAB ID: 10 H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including

More information

McAfee Certified Assessment Specialist Network

McAfee Certified Assessment Specialist Network McAfee Certified Assessment Specialist Network Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 4 Recommended Exam Preparation 4 Exam Objectives 4 Sample

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security

More information

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149

More information

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods The Internet and its Protocols Protocol Specification & Design Robert Elz [email protected] [email protected] http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

- Basic Router Security -

- Basic Router Security - 1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password

More information

Reducing Application Vulnerabilities by Security Engineering

Reducing Application Vulnerabilities by Security Engineering Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development

More information

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems

Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems Page 1 of 12 Course Description The Network Defense Series from EC-Council Press is comprised of 5 books

More information

Network Security and Firewall 1

Network Security and Firewall 1 Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week

More information

locuz.com Professional Services Security Audit Services

locuz.com Professional Services Security Audit Services locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

Client logo placeholder XXX REPORT. Page 1 of 37

Client logo placeholder XXX REPORT. Page 1 of 37 Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration

More information

Basic & Advanced Administration for Citrix NetScaler 9.2

Basic & Advanced Administration for Citrix NetScaler 9.2 Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information