Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)



Similar documents
NH-ISAC. Cybersecurity Resilience Securing the Infrastructures that Secure Healthcare & Public Health. The National Health ISAC

CEH Version8 Course Outline

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Hackers are here. Where are you?

EC-Council Certified Security Analyst (ECSA)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Program Brochure. EC-Council. Page 1

EC-Council Ethical Hacking and Countermeasures

Certified Ethical Hacker (CEH)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CRYPTUS DIPLOMA IN IT SECURITY

[CEH]: Ethical Hacking and Countermeasures

Detailed Description about course module wise:

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

EC Council Certified Ethical Hacker V8

CYBERTRON NETWORK SOLUTIONS

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Hackers are here. Where are you?

Ethical Hacking Course Layout

Course Title: Course Description: Course Key Objective: Fee & Duration:

LINUX / INFORMATION SECURITY

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Cyber R &D Research Roundtable

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Why you should adopt the NIST Cybersecurity Framework

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

CONCEPTS IN CYBER SECURITY

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Analyze. Secure. Defend. Do you hold ECSA credential?

Bellevue University Cybersecurity Programs & Courses

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

A Systems Engineering Approach to Developing Cyber Security Professionals

Defending Against Data Beaches: Internal Controls for Cybersecurity

Own your LAN with Arp Poison Routing

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Understanding Security Testing

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Introduction to Cyber Security / Information Security

NICE and Framework Overview

information security and its Describe what drives the need for information security.

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

SANS Top 20 Critical Controls for Effective Cyber Defense

Cyber Security Metrics Dashboards & Analytics

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

INFORMATION SECURITY TRAINING CATALOG (2015)

Certified Cyber Security Analyst VS-1160

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Loophole+ with Ethical Hacking and Penetration Testing

CyberNEXS Global Services

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Cybersecurity Strategic Talent Management. March, 2012

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Critical Controls for Cyber Security.

SECURITY. Risk & Compliance Services

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

A Decision Maker s Guide to Securing an IT Infrastructure

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Cisco Security Optimization Service

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

National Initiative for Cyber Security Education

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

FSP-201: Ethical Hacking & IT Security

Security Policy JUNE 1, SalesNOW. Security Policy v v

U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Cyber Exercises, Small and Large

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Virtual Learning Tools in Cyber Security Education

Top 20 Critical Security Controls

Security Event Management. February 7, 2007 (Revision 5)

GEARS Cyber-Security Services

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

IT Networking and Security

Professional Penetration Testing Techniques and Vulnerability Assessment ...

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Principles of Information Assurance Syllabus

Application Security Testing

Security + Certification (ITSY 1076) Syllabus

Certified Cyber Security Analyst VS-1160

Presented by Evan Sylvester, CISSP

Transcription:

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014

CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity National Cybersecurity Workforce Framework Global Cyber Range

CRITICAL INFRASTRUCTURE RESILIENCE Sector Specific Agency (SSA) Department Of Agriculture Department of Health & Human Services Department of Defense Department of Energy Department of Health & Human Services Department of the Interior Department of the Treasury Environmental Protection Agency Department of Homeland Security (DHS) Office of Infrastructure Protection DHS Office of Cybersecurity & Communications DHS Transportation Security Administration DHS Transportation Security Administration United States Coast Guard DHS Immigration & Customs Enforcement, Federal Protective Service Critical Infrastructures & Key Resources Agriculture & Food Defense Industrial Base Energy Healthcare & Public Health National Monuments and Icons Banking & Finance Water Chemical / Commercial Facilities / Dams Critical Manufacturing /Emergency Services Nuclear Reactors, Materials and Waste Information Technology Communications Postal and Shipping Transportation Systems Government Facilities

INFRASTRUCTURE PROTECTION PLANS Managing Risks from Significant Threats and Hazards to Critical Infrastructures Requires an Integrated Approach Across a Trusted Diverse Community

ACHIEVING A STRATEGIC PARTNERSHIP Public/Private Collaboration NASA / Kennedy Space Center (KSC) NASA / KSC Center for Lifecycle Design (CflCD) US Department of Homeland Security (US DHS) National Institute for Standards & Technology (NIST) Private Sector Government Agencies Academia Global Institute for Cybersecurity + Research (GICSR) GICSR 2014 NICE September All Conference Rights Reserved 19, 2014

ACHIEVING A STRATEGIC MISSION Mission To serve as the trusted global collaborative facilitating open dialogue, critical insight and thought exchange linking critical infrastructure owners and operators, government, and academia to define and deliver scalable, flexible and adaptable cybersecurity resilience solutions. Mission Support Public/Private Collaboration Government Industry Academia

GICSR / NASA-KSC COLLABORATIVE PARTNERSHIP

CYBERSECURITY CORE 5 GICSR CORE 5 G3 C3i CRi CSD GC R Global Cooperation + Collaboration + Coordination Cybersecurity Intelligence + Information Sharing + Incident Response Cybersecurity Research Innovation Cybersecurity Secure Design Global Cyber Range Performance / Role Based Education Virtual Customizable Network Applying Skills Certified Cyber First Responder Coordinated Response Modeling & Simulation, Exercise Simulation Testing Secure Design Verification and Validation

GICSR NASA KENNEDY SPACE CENTER

PRESIDENTIAL POLICY DIRECTIVE EXECUTIVE ORDER

FRAMEWORK RELEASE 2014 Executive Order 13636 Improving Critical Infrastructure Cybersecurity

FRAMEWORK CORE Framework Core Identify Protect Detect Respond Recover Identify (Systems, Assets, Data, Capabilities) Protect (Develop and Implement Safeguards) Detect (Timely Discovery of Cybersecurity Events) Respond (Develop and Implement Appropriate Action Activities) Recover (Develop and Implement Resilience Plans Restore Capabilities Categories Subcategories Informative References (Categories Access Management Control, Detection Process ) (Subcategories Activities Outcomes Data at Rest is Protected )

FRAMEWORK PROFILES Framework Profile Alignment of Functions, Categories and Subcategories With Business Requirements, Risk Tolerance and Organization Resources Establishes Reducing Cybersecurity Risk Current Profile Target Profile Current Profile Cybersecurity Outcomes Currently Being Achieved Target Profile Outcomes Needed to Achieve Cyber Risk Management Goals Profile Comparison Gap Mitigation Cost Effective Roadmap

FRAMEWORK TIERS Framework Implementation Tiers How an Organization Views Cyber Risk + Risk Management Risk Management Process Integrated Risk Management Program External Participation Tier 1: Partial Not Formalized, Ad Hoc, Reactive, Limited Awareness, No Processes Tier 2: Risk Informed Processes, Not Org. Wide, Informal Sharing, Limited Interaction Tier 3: Repeatable Practices Approved/Policy, Org Wide, Knowledge/Skills, Sharing Information Internally Tier 4: Adaptive Continuous Improvement, Org Wide, Active Sharing, Cyber Risk Part of Culture, Share Information Internally / Externally

The Framework establishes: A common taxonomy and lexicon which organizes cybersecurity into 31 specialty areas within 7 categories. A baseline of tasks, specialty areas, and knowledge, skills and abilities (KSAs) associated with cybersecurity professionals. The Framework assists with strategic human capital efforts, including: Workforce Planning Recruitment and Selection Training and Development Succession Planning

CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity National Cybersecurity Workforce Framework Global Cyber Range

GLOBAL CYBER RANGE OBJECTIVES Simulate systems and their complexities and advance visualization of data with the goal of improving policy, practices, technologies, operations and education to measure and strengthen cybersecurity resilience and safety, including but not limited to: Support Global Cyber Education Performance/Role Based based Education Customizable Network Environments to Apply Skills (Offensive or Defensive) Modeling & Simulation Cyber Drill Exercises (Gaming, Metrics, and Storytelling to Accelerate Action and Seed Innovation) KSC Technology Test Bed Assessment, Testing Secure Design IV&V Certified Cyber First Responder Coordinated National Cyber Response Supporting Retaining, Sustaining and Creating Cybersecurity Jobs Safety, Security, Modeling and Simulation, Information Assurance, Verification and Validation.

HOW IT WORKS Target Virtual Machine Networks Online Virtualized Platform. Student Logs In Presented with Learning Objectives and Goals, Content Briefing Student Launches the Range environment Within 1 Minute Full Target Range Booted in the Range Cloud Environment. All Labs Fully Isolated and Disconnected from the Live Internet Student Logs In Learning Objectives and Goals, Content Briefing Remote Viewer Operates Through Range of Protocols for Maximum Compatibility Provides Student with Screen View and Machine Commands for Virtual Machines Virtual Machines (VMs) Housed Inside Learning Environment Includes Ability to Provide Direct Guidance, Learning Objectives, Exercises and Tasks Advanced Feedback Models (Alerts, Recommendations, Screen Shots, Short Video Tutorials)

GLOBAL CYBER RANGE LOG-IN Welcome to the Global Cyber Range (GCR) ON DEMAND 24/7

GLOBAL CYBER RANGE Global Cyber Range (GCR) CyPro (Cybersecurity Professional) Training Catalog Most Comprehensive and Feature Rich Cyber Range Currently Over 400 Complete Exercises Hundreds of Fully Virtualized Operating Systems

GLOBAL CYBER RANGE ENVIRONMENT On Demand 24/7 LIVE Cyber Range Professional Development Environment Access Anywhere Internet Connection & Web Browser No Plug Ins, No Software Desktop Laptop ipad iphone Android Any Device Supporting HTML5 Launch and Dynamically Access a Host of Virtual Machines Preconfigured with Vulnerabilities, Exploits, Tools and Scripts Range Images Global Cyber Range Environment Target Machines Completely Virtualized Control and Reset Machines Quickly Student Has 100% Control of the Environment Instructor Over the Shoulder Review

GLOBAL CYBER RANGE COURSE CATALOG Mobile Forensics: Advanced Mobile Hacking & Forensics Hardening Your Enterprise: Advanced Network Defense Network Exploitation Concepts and Methods (Boot Camp) Network Forensics Identifying and Correlating Events (Network Forensics) Packet and Traffic Analysis (Wiretap) Digital Media Forensics I (Basic Digital Media Forensics) Digital Media Forensics II (Advanced Digital Media Forensics) Understanding Machine Assembly Language (Assembly Fundamentals)

GLOBAL CYBER RANGE COURSE CATALOG ETHICAL HACKING Access to 75 Different Exercises Fully Patched Operating Systems / Virtual Machines Footprinting and Reconnaissance Scanning Networks Enumeration System Hacking Trojans and Backdoors Viruses and Worms Sniffers Social Engineering Denial of Service Session Hijacking Hacking Web Servers Hacking Web Applications SQL Injection Hacking Wireless Networks Evading IDS, Firewalls & Honeypots Buffer Overflow Cryptography

GLOBAL CYBER RANGE COURSE CATALOG COMPUTER FORENSICS Access to 34 Different Exercises Each exercise category has it s own Virtual Private Cloud preconfigured with vulnerable websites, victim machines, an environment LOADED with tools, and investigation files, hard disk clones and targets. Computer Forensics Investigation Process Computer Forensics Lab Understanding Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Forensics Investigation Using AccessData FTK Forensics Investigation Using EnCase Steganography and Image File Forensics Application Password Crackers Log Capturing and Event Correlation Investigating Wireless Attacks Network Forensics, Investigation Logs, Investigating Network Traffic Tracking and Investigating Email Crimes Mobile Forensics Investigative Reports

GLOBAL CYBER RANGE COURSE CATALOG SECURITY ANALYST EXERCISES Access to 15 Different Exercises Fully Patched Operating Systems / Virtual Machines TCPIP Packet Analysis Information Gathering Vulnerability Analysis External Penetration Testing Internal Network Penetration Testing Firewall Penetration Testing IDS Penetration Testing Password Cracking Penetration Testing Social Engineering Penetration Testing Web Application Penetration Testing SQL Penetration Testing

GLOBAL CYBER RANGE COURSE CATALOG SECURE PROGRAMMING Access to 68 Different Exercises Fully Patched Operating Systems / Virtual Machines Input Validation and Output Encoding.NET Authentication and Authorization Secure Session and State Management.NET Cryptography.NET Error Handling, Auditing and Logging.NET Secure File Handling.NET Configuration Management and Secure Code Review

GLOBAL CYBER RANGE COURSE CATALOG INCIDENT HANDLING Access to 75 Exercises Fully Patched Operating Systems / Virtual Machines Trojans and Backdoors Computer Forensics Investigation Process Understanding Hard Disks and File Systems Forensics Investigation Using AccessData FTK Forensics Investigation Using EnCase Log Capturing and Event Correlation

Cloud Based 100% Automated 100% Virtualization Accessible Anywhere Via Internet Connection Instant Connectivity to all Range Labs Access to Real World Tools and Scenarios After Log In Full Access to Preconfigured Targets, Networks and Attack Tools Preconfigured Vulnerable Websites Hidden Victim Machines Vulnerable, Unpatched Operating Systems Fully Networked Environments Forensic Cast Files and Hard Disks

Active (Live) Machines Interchangeable at any time. Display Full Screen, Dual Monitors, Machine Commands

Real Life Scenarios Tasks Group of Exercises to Complete Bottom Task Bar Helpful Ideas, Screen Shots, Video, Instruction

Log On to Windows Server Machine

Active Machines Interchangeable At Any Time

Access Open Source Attacker Tool Cain & Able, Playing the Attacker Against Victims Sniff the Network within the Range, Access IP Addresses, Monitor, Access Password

What we ll see IP Addresses related to Machines in the Range

Cain and Able Sniffing Configuration

Scanning for IP Addresses

IP Address Scanning

Scanning

Displays IP Addresses

Selecting an IP Address to Poison

Poisoning Machine

Switching Machine

Connecting to Machine

Entering Access Information Trying to Log In

Log in Failed

Switch To Server

Access Timestamp, FTP Server, Client, User Name, Password Attempt

Switch Back to Server 2008

Entering Access Information Trying to Log In

Capturing Actual Password

Success User Log In = Complete User Access

NEXT STEPS -ACCESS GOVERNMENT ACADEMIA PRIVATE INDUSTRY Alignment Global Cyber Range to Cybersecurity Education Access Monday, November 10, 2014

ACHIEVING A Sustainable Cybersecurity Workforce Cybersecurity Resilience