Day 1: Let’s Jump In the Deep End!
- Cybersecurity Resources
-
https://www.cisa.gov/resources-tools/resources/secure-our-world-resources
-
https://www.cisa.gov/topics/cybersecurity-best-practices
-
https://www.cisa.gov/secure-our-world/secure-your-business
-
https://www.cisa.gov/secure-our-world/secure-your-products
- What are we protecting?
- PII
- IP
- Business Continuity
- Jobs/Employment
- Health and Safety
- Property and $
- There’s not a “Miracle Pill” for Cybersecurity
- Environments are not the same
- Products are not the same
- People’s skills and abilities are not the same
- OSI Model - Layered Approach
- Physical
- Datalink
- Network
- Transport
- Session
- Presentation
- Application
- Offense vs. Defense
- This is not a pen testing course - Offense
- This is a protection course - Defence
- We must understand the objectives of the Offense
- What do you have that’s valuable?
- Where do you keep your valuables?
- Who has access to your valuables?
- How do you keep track of your valuables?
- Practical Application:
- 5 Days - 4 Scenarios - What can we do?
- Day 1: Setup
- Day 2-5: Scenarios
- Small Business Online Shop - Home Operation
- SMB Parts Distributor - Small Warehouse in Industrial Complex
- Charter School - Grades K-8 with 400 students
- Large MultiNational Organization - Amazon, Dell, Kroger, Utilities
- What tools/skills do we need
- Hardware
- Software
- Windows
- Linux
- Web Servers
- Email
- Networking
- Databases
- Proxy
- LDAP/AD
- DHCP
- DNS
- Remote Access
- VPN
- Ports
- Physical Security
- Business Processes
- Legal Requirements
- Evaluation
- How do we know our Cybersecurity Plan is working
- How do we test our plan
- How can we man our plan better
- How do we market our plan and perform training
- Technical Application
- Remote Access
- Windows
- RDP
- Linux
- SSH
- Bonus - SSH Tunnels
- Windows
- IIS
- Linux
- Apache2
- Ports
- Standard ports
- 80
- 443
- 22
- 25
- 3389
- 3306
- 21
- Setting up an Environment
- Network vs “Network”
- Physical vs Logical
- This is where the Cybersecurity Plan begins!
- What if this has already been setup for us?
- This is typical
- We have started a new job
- The network could be years old
- Infrastructure
- What is the currently layout of the network
- Why?
- Who?
- When?
- Technology
- What?
- Where?
- Cloud vs Local vs Hybrid
- What’s our cloud presence?
- Do we have local resources?
- What are the very basics
- Network - DMZ
- Firewall
- Host Based Firewall
- Windows
- Nftables
- SSL Certificates
- Operating Procedures
- Web Servers
- Nginx
- Apache2
- IIS
- Databases
- Oracle
- SQL Server
- MySQL
- Postgresql
- Others?
- Syslog Server
- Syslog Analysis
- Time to set up an environment….
- Google Cloud Free Tier Credit - $300 (however will require a billing account to setup)
- We just need it for 5 Days!
- We’re going to start small and end big
- Don’t focus on GCP specifics
- Focus on the theory
- Focus on the plan
- Focus on your goals
- What’s your speciality
- Programming?
- Networking?
- Systems?
- Databases?
- Setup Web server
- VM Instance - Everyone Can Step Through this Together
- https://console.cloud.google.com
- Default Micro Debian System
- Install Software
- apt update
- Install Apache2
- What went wrong? Why can't we install anything?
- Introduction to NAT
- Outbound
- Setup Server Certificates
- Let’s Encrypt
- Pros/Cons
- Is this a good idea
- What are the alternatives
- Hello World Web Page
- Can you access this page from the internet?
- Introduction to DNS!
- Types
- Definitions
- What do I need from you???
- What you want your hostname to be….
- ?????.mycybersecurityclass.com
- Check to see if it already exists
- Create a DNS Zone and tell me your zone NS address.
- Create an A record to access your machine
- Internal vs External
- This can be fun!!!