infosec2018-bt

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision Both sides next revision
infosec2018-bt [2018/11/20 12:47]
warren created
infosec2018-bt [2018/11/20 12:49]
warren
Line 24: Line 24:
 Topics that will be covered include: Topics that will be covered include:
  
-* Information Security Overview +  * Information Security Overview 
-* Threat and Countermeasures to Confidentiality, Integrity, and Availability +  * Threat and Countermeasures to Confidentiality, Integrity, and Availability 
-* Security Policies +  * Security Policies 
-* Operating System Security +  * Operating System Security 
-* Penetration Testing +  * Penetration Testing 
-* Securing FTP, TFTP, SSH/SFTP/SCP +  * Securing FTP, TFTP, SSH/SFTP/SCP 
-* Insecure File Permissions +  * Insecure File Permissions 
-* Operational Security +  * Operational Security 
-* Cryptography +  * Cryptography 
-* Password Control – End-User Perspective +  * Password Control – End-User Perspective 
-* Password Control – Secure Server Side Storage +  * Password Control – Secure Server Side Storage 
-* Cryptocurrencies and cryptojacking +  * Cryptocurrencies and cryptojacking 
-* Incident and Response handling  +  * Incident and Response handling  
-* Cyber Drill simulation+  * Cyber Drill simulation
  
 **Workshop Items** **Workshop Items**
  • infosec2018-bt.txt
  • Last modified: 2021/04/19 16:39
  • (external edit)