Security+ Domain 3.0: Secure Systems Design and Deployment: Chapter 12 cont’d

This is post 11 of 31 in the series “[ Security+ Certification ]” Secure Network Configuration Filtering packets as they arrive is the primary means of protection. Filtering can be by: IP address Domain name Protocol (TCP, UDP, IP) Port Text-based, by word or phrase The filtering criteria are called a rule base. This is …

Security+ Domain 3.0: Secure Systems Design and Deployment: Chapter 12

This is post 10 of 31 in the series “[ Security+ Certification ]” Chapter 12: Secure Systems Design and Deployment System Security is our initial set of best practices. It includes: Disabling non-essential systems and services Hardening operating systems by Applying updates and Securing file systems Hardening applications by Hardening servers (daemons or services) and …

Security+ Domain 3.0: Architecture and Design: Chapter 11

This is post 9 of 31 in the series “[ Security+ Certification ]” Chapter 11: Architecture Frameworks and Secure Network Architectures Industry-Standard Frameworks and Reference Architectures Regulatory NERC CIP – https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx Non-regulatory NIST CSF – https://www.nist.gov/cyberframework Framework Core Implementation Tiers Framework Profiles National vs International FedRAMP – https://www.fedramp.gov/ US-EU Safe Harbor Framework (old) – https://www.ftc.gov/tips-advice/business-center/privacy-and-security/u.s.-eu-safe-harbor-framework …

Security+ Domain 2.0: Technologies and Tools, Chapter 10

This is post 8 of 31 in the series “[ Security+ Certification ]” Chapter 10: Implementing Secure Protocols DNSSEC SSH S/MIME SRTP LDAPS FTPS SFTP SNMPv3 SSL / TLS HTTPS Secure POP / IMAP Use Cases Streaming media (voice and video) Time sync (NTP) Email, Web File transfer Directory Services Remote Access DNS Routing and …

Security+ Domain 2.0: Technologies and Tools, Chapter 8

This is post 6 of 31 in the series “[ Security+ Certification ]” Chapter 8: Troubleshooting Common Security Issues Unencrypted Credentials FTP (20,21) –> FTPS (SSL/TLS) or SFTP (SSH, 22) HTTP (80) –> SHTTP or HTTPS (443) Telnet (23) –> SSH SNMPv1 –> SNMPv3 Logs / Event Anomalies Things that shouldn’t be happening. Permission Issues …

Security+ Domain 2.0: Technologies and Tools, Chapter 7

This is post 5 of 31 in the series “[ Security+ Certification ]” Chapter 7: Security Tools and Technologies Protocol Analyzers Wireshark tcpdump Switched Port Analyzers Port mirroring Port monitoring Network Scanners nmap Rogue system detection Network mapping WiFi Scanners/Crackers Kismet Netstumbler CoWPAtty Password Crackers John the Ripper Cain and Abel Hydra Hashcat Vulnerability Scanners …

Security+ Domain 1.0: Threats, Attacks and Vulnerabilities

This is post 3 of 31 in the series “[ Security+ Certification ]” Chapter 1: Malware and Indicators of Compromise Malware Polymorphic malware Viruses Armored virus (encryption) Crypto-Malware Ransomware Worms Trojans Rootkit Keylogger Adware Spyware Bots RATs Logic Bombs Backdoors Indicators of Compromise IOC Tools from FireEye (Mandiant) OpenIOC from MITRE STIX TAXII CybOx Chapter …