3. Security In Practice

3.  Security In Practice


I have successfully led a team, prepared and completed coursework and presented to ~40 people on the following topics:


Endpoint Protection

Looking at the principles of EPP, risk assessment and promoting compliance. Specific to external devices such as , laptops, smartphones, IoT etc.  Also Network Access Control, DLP, Encryption


Cloud Infrastructure

Deployment models (public, private, hybrid, community), service models (SaaS, PaaS, IaaS) and recommendations as to which were most suitable for various case studies.


Applied Cryptography

Cryptography functions and the implementation of it as  a threat countermeasure (e.g. for network data in transit). How system design mistakes can undermine cryptographic security (e.g. incorrect encryption methods, weak algorithms and cyphers). Symmetric and asymmetric encryption and their typical uses. Also public key encryption, digital signatures. hashing etc.


Forensics

What tools are required. The procedure and order of volatility in evidence collection. Avoiding destruction of evidence. Privacy+legal. Steps involved in collection. Transparency of methodology. Archiving, chain of custody.


Malware

Analysis of malicious file/URL and its purpose.  Covering viruses, ransomware, rootkits, trojans, worms, spyware. Static and dynamic analysis, memory forensics, monitoring. Precautionary measures, file determination, fingerprinting. AV, string extraction, obfuscation, Vocabulary and tools.


Internet of Things

Vulnerabilities in IoT devices and prevention of them. Covering secure web interface, secure network services, protection of data in transit, protection of privacy, secure cloud and mobile, flexible security, secure firmware and physical security.


Identity and Access Management

Broken access control (OWASP) and its consequences. Access control authentication and authorization. Federation, governance, lifecycle, SSO and MFA, PAM, customer IAM. Documentation of access control policy, reviewing access, auditing of policy.

Share by: