Computer Security pro english course
-
Upload
abdo-shajadi -
Category
Documents
-
view
139 -
download
1
Transcript of Computer Security pro english course
![Page 1: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/1.jpg)
Computer SecurityBy Abdo and Roberts
Professional English CommunicationNovember 2016 | DIN16SP
OAMK
![Page 2: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/2.jpg)
Or Insecurity?
![Page 3: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/3.jpg)
So you think you are secure?
![Page 4: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/4.jpg)
Think again!
![Page 5: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/5.jpg)
If you think like an attacker you can defend better...
![Page 6: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/6.jpg)
![Page 7: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/7.jpg)
You asking what is this colors?
![Page 8: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/8.jpg)
![Page 9: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/9.jpg)
![Page 10: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/10.jpg)
Who is a hacker?
![Page 11: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/11.jpg)
It’s not what you think it is!
![Page 12: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/12.jpg)
Hackers are the good ones!
![Page 13: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/13.jpg)
Crackers are the bad ones
![Page 14: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/14.jpg)
But they keep calling bad guys “hacker” in general
because of media
![Page 15: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/15.jpg)
And then there are colored hats!
![Page 16: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/16.jpg)
![Page 17: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/17.jpg)
What are their motivations?
![Page 18: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/18.jpg)
“White hat” hacker
Operate with permission to improve security
![Page 19: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/19.jpg)
“Grey hat” hacker
May violate ethical standards or laws, but without “bad” intentions
![Page 20: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/20.jpg)
“Black hat” hacker
Operate with “bad” intentions, for example, personal financial gain
![Page 21: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/21.jpg)
![Page 22: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/22.jpg)
HacktivistsHacktivists
![Page 23: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/23.jpg)
State sponsored hackers
Cyber warfare
![Page 24: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/24.jpg)
Spy hackers
![Page 25: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/25.jpg)
![Page 26: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/26.jpg)
Security by obscurity...
![Page 27: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/27.jpg)
How about NO?
![Page 28: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/28.jpg)
![Page 29: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/29.jpg)
BUT
![Page 30: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/30.jpg)
![Page 31: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/31.jpg)
Hackers are always one step ahead of you...
![Page 32: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/32.jpg)
Get the mindset
![Page 33: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/33.jpg)
Tools?
![Page 34: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/34.jpg)
Kali linux (kali.org)
![Page 35: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/35.jpg)
Areas?
![Page 36: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/36.jpg)
1. Computer forensics2. Cryptography3. Reverse engineering and vulnerability analysis4. Social engineering5. Penetration testing6. Malware analysis7. Security management
![Page 37: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/37.jpg)
Penetration testing
1. Information gathering (OSINT)2. Enumeration3. Exploit4. Report
![Page 38: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/38.jpg)
Certifications?
![Page 39: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/39.jpg)
1.OSCP (offensive-security.com)2.CEH3.Security+4.GIAC5.CISSPAnd ...
![Page 40: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/40.jpg)
How to be secure?
![Page 41: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/41.jpg)
1. password password password! 2. Updated antivirus3. Updated softwares4. Firewall5. There is no patch for human stupidity! :) lol
![Page 42: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/42.jpg)
Brain food
1. defcon.org2. social-engineer.org3. The first book: Penetration testing By Georgia
Weidman ISBN: 978-1-59327-564-84. Vulnhub.com and other wargames and CTF5. My twitter @n3tg33k :D6. google.com
![Page 43: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/43.jpg)
“TRY HARDER”-- offensive security
![Page 44: Computer Security pro english course](https://reader036.fdocuments.in/reader036/viewer/2022062503/586f8b711a28ab54768b6695/html5/thumbnails/44.jpg)
Th4nk y0u