Day 1: Let’s Jump In the Deep End!
Day 1 Assignment
-
Cybersecurity Resources
-
https://www.cisa.gov/resources-tools/resources/secure-our-world-resources
-
https://www.cisa.gov/topics/cybersecurity-best-practices
-
https://www.cisa.gov/secure-our-world/secure-your-business
-
https://www.cisa.gov/secure-our-world/secure-your-products
-
What are we protecting?
- PII
- IP
- Business Continuity
- Jobs/Employment
- Health and Safety
- Property and $
-
There’s not a “Miracle Pill” for Cybersecurity
- Environments are not the same
- Products are not the same
- People’s skills and abilities are not the same
-
OSI Model - Layered Approach
- Physical
- Datalink
- Network
- Transport
- Session
- Presentation
- Application
-
Offense vs. Defense
- This is not a pen testing course - Offense
- This is a protection course - Defense
-
We must understand the objectives of the Offense
- What do you have that’s valuable?
- Where do you keep your valuables?
- Who has access to your valuables?
- How do you keep track of your valuables?
-
Practical Application
- 5 Days - 4 Scenarios - What can we do?
- Day 1: Setup
-
Day 2–5: Scenarios
- Small Business Online Shop - Home Operation
- SMB Parts Distributor - Small Warehouse
- Charter School - Grades K–8 (400 students)
- Large MultiNational Organization
-
What tools/skills do we need?
- Hardware
- Software
- Windows
- Linux
- Web Servers
- Email
- Networking
- Databases
- Proxy
- LDAP/AD
- DHCP
- DNS
- Remote Access
- VPN
- Ports
- Physical Security
- Business Processes
- Legal Requirements
-
Technical Application
-
Remote Access
- Windows (RDP)
- Linux (SSH)
-
Web Servers
- IIS
- Apache2
- Nginx
-
Standard Ports
- 80
- 443
- 22
- 25
- 3389
- 3306
- 21
- SSL Certificates (Let’s Encrypt)
- DNS (Zones, A Records, Internal vs External)
-
Environment Setup
- VM Instance - Debian
- Install Apache2
- Introduction to NAT
- Setup Server Certificates
- Hello World Web Page