Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
infosec2018-bt [2018/11/20 12:47] warren created |
infosec2018-bt [2018/11/20 12:49] (current) warren |
||
---|---|---|---|
Line 24: | Line 24: | ||
Topics that will be covered include: | Topics that will be covered include: | ||
- | * Information Security Overview | + | |
- | * Threat and Countermeasures to Confidentiality, | + | * Threat and Countermeasures to Confidentiality, |
- | * Security Policies | + | * Security Policies |
- | * Operating System Security | + | * Operating System Security |
- | * Penetration Testing | + | * Penetration Testing |
- | * Securing FTP, TFTP, SSH/ | + | * Securing FTP, TFTP, SSH/ |
- | * Insecure File Permissions | + | * Insecure File Permissions |
- | * Operational Security | + | * Operational Security |
- | * Cryptography | + | * Cryptography |
- | * Password Control – End-User Perspective | + | * Password Control – End-User Perspective |
- | * Password Control – Secure Server Side Storage | + | * Password Control – Secure Server Side Storage |
- | * Cryptocurrencies and cryptojacking | + | * Cryptocurrencies and cryptojacking |
- | * Incident and Response handling | + | * Incident and Response handling |
- | * Cyber Drill simulation | + | * Cyber Drill simulation |
**Workshop Items** | **Workshop Items** | ||
- | * [[netsec20181112-BT/ | + | * [[infosec2018-bt/ |
* Instructors: | * Instructors: |