Day 1: Let’s Jump In the Deep End!

  1. Cybersecurity Resources
  1. https://www.cisa.gov/resources-tools/resources/secure-our-world-resources
  2. https://www.cisa.gov/topics/cybersecurity-best-practices  
  3. https://www.cisa.gov/secure-our-world/secure-your-business
  4. https://www.cisa.gov/secure-our-world/secure-your-products
  1. What are we protecting?
  1. PII
  2. IP
  3. Business Continuity
  4. Jobs/Employment
  5. Health and Safety
  6. Property and $
  1. There’s not a “Miracle Pill” for Cybersecurity
  1. Environments are not the same
  2. Products are not the same
  3. People’s skills and abilities are not the same
  4. OSI Model - Layered Approach
  1. Physical
  2. Datalink
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application
  1. Offense vs. Defense
  1. This is not a pen testing course - Offense
  2. This is a protection course - Defence
  3. We must understand the objectives of the Offense
  1. What do you have that’s valuable?
  2. Where do you keep your valuables?
  3. Who has access to your valuables?
  4. How do you keep track of your valuables?
  1. Practical Application:
  1. 5 Days - 4 Scenarios - What can we do?
  2. Day 1: Setup
  3. Day 2-5: Scenarios
  1. Small Business Online Shop - Home Operation
  2. SMB Parts Distributor - Small Warehouse in Industrial Complex
  3. Charter School - Grades K-8 with 400 students
  4. Large MultiNational Organization - Amazon, Dell, Kroger, Utilities
  1. What tools/skills do we need
  1. Hardware
  2. Software
  3. Windows
  4. Linux
  5. Web Servers
  6. Email
  7. Networking
  8. Databases
  9. Proxy
  10. LDAP/AD
  11. DHCP
  12. DNS
  13. Remote Access
  14. VPN
  15. Ports
  16. Physical Security
  17. Business Processes
  18. Legal Requirements
  1. Evaluation
  1. How do we know our Cybersecurity Plan is working
  2. How do we test our plan
  3. How can we man our plan better
  4. How do we market our plan and perform training
  1. Technical Application
  1. Remote Access
  1. Windows
  1. RDP
  1. Linux
  1. SSH
  1. Bonus - SSH Tunnels
  1. Windows
  1. IIS
  1. Linux
  1. Apache2
  1. Ports
  1. Standard ports
  1. 80
  2. 443
  3. 22
  4. 25
  5. 3389
  6. 3306
  7. 21
  1. Setting up an Environment
  1. Network vs “Network”
  1. Physical vs Logical
  1. This is where the Cybersecurity Plan begins!
  1. What if this has already been setup for us?
  1. This is typical
  2. We have started a new job
  3. The network could be years old
  1. Infrastructure
  1. What is the currently layout of the network
  1. Why?
  2. Who?
  3. When?
  1. Technology
  1. What?
  2. Where?
  1. Cloud vs Local vs Hybrid
  1. What’s our cloud presence?
  2. Do we have local resources?
  1. What are the very basics
  1. Network - DMZ
  2. Firewall
  3. Host Based Firewall
  1. Windows
  2. Nftables
  1. SSL Certificates
  1. Operating Procedures
  1. Web Servers
  1. Nginx
  2. Apache2
  3. IIS
  1. Databases
  1. Oracle
  2. SQL Server
  3. MySQL
  4. Postgresql
  5. Others?
  1. Syslog Server
  1. Syslog Analysis
  1. Time to set up an environment….
  1. Google Cloud Free Tier Credit - $300 (however will require a billing account to setup)
  1. We just need it for 5 Days!
  2. We’re going to start small and end big
  3. Don’t focus on GCP specifics
  4. Focus on the theory
  5. Focus on the plan
  6. Focus on your goals
  1. What’s your speciality
  1. Programming?
  2. Networking?
  3. Systems?
  4. Databases?
  1. Setup Web server
  1. VM Instance - Everyone Can Step Through this Together
  1. https://console.cloud.google.com
  2. Default Micro Debian System
  3. Install Software
  1. apt update
  2. Install Apache2
  3. What went wrong?  Why can't we install anything?
  1. Introduction to NAT
  1. Outbound
  1. Setup Server Certificates
  1. Let’s Encrypt
  1. Pros/Cons
  2. Is this a good idea
  3. What are the alternatives
  1. Hello World Web Page
  1. Can you access this page from the internet?
  2. Introduction to DNS!
  1. Types
  2. Definitions
  1. What do I need from you???
  1. What you want your hostname to be….
  1. ?????.mycybersecurityclass.com
  1. Check to see if it already exists
  1. Create a DNS Zone and tell me your zone NS address.
  2. Create an A record to access your machine
  3. Internal vs External
  1. This can be fun!!!