EVT BOK TOC III
EVT BOK TOC III
SECURITY OPERATIONS
1. SECURITY CONVERGENCE
2. GLOBAL SECURITY OPERATIONS
CENTERS (GSOCS)
GOVERNANCE
INFORMATION STORAGE SECURITY
1. DISK AND FILE ENCRYPTION
2. DATA ERASURE
DATA AT CORE 3. DATA MASKING
REST/STORAGE 4. DATABASE SECURITY
SECURITY
MANAGEMENT
TRANSMISSION GOVERNANCE
SECUIRTY CORE SECURE COMMUNICATION PROTOCOLS IMPLEMENTATION NETWORK IMPLEMENTATIONS
1. TRANSMISSION CONTROL 1. VALIDATING INPUT AND CHECKING 1. IEEE 802/ISO NETWORKS
PROTOCOL/INTERNET ITS REPRESENTATION 2. IETF NETWORKS AND
PROTOCOL (TCP/IP) STACK 2. USING API’S CORRECTLY TCP/IP
2. APPLICATION AND TRANSPORT 3. USING SECURITY FEATURES 3. PRACTICAL INTEGRATION
LEVEL PROTOCOLS 4. CHECKING TIME AND STATE AND GLUE PROTOCOLS
3. ATTACKS ON TLS-TRANSPORT RELATIONSHIPS 4. VULNERABILITIES AND
LAYER SECURITY 5. HANDLING EXCEPTIONS AND EXAMPLE EXPLOITS
4. INTERNET/NETWORK LAYER ERRORS PROPERLY
5. PRIVACY PRESERVING 6. PROGRAMMING ROBUSTLY: ROBUST NETWORK DEFENSE
PROTOCOLS DEFENSIVE PROGRAMMING 1. NETWORK HARDENING
6. DATA LINK LAYER CONCEPTS. 2. IMPLEMENTING FIREWALLS
7. ENCAPSULATING STRUCTURES AND AND VIRTUAL PRIVATE
MODULES NETWORKS (VPNS)
8. TAKING ENVIRONMENT INTO 3. DEFENSE IN DEPTH
ACCOUNT 4. HONEYPOTS AND HONEYNETS
5. NETWORK MONITORING
6. NETWORK TRAFFIC
ANALYSIS
7. MINIMIZING EXPOSURE
(ATTACK SURFACE AND
VECTORS)
8. NETWORK ACCESS CONTROL
(INTERNAL AND EXTERNAL)
9. PERIMETER
NETWORKS/PROXY SERVERS
10. NETWORK POLICY
DEVELOPMENT AND
ENFORCEMENT
11. NETWORK OPERATIONAL
PROCEDURES
12. NETWORK ATTACKS
13. THREAT HUNTING AND
MACHINE LEARNING
MANAGEMENT
GOVERNANCE
CRYPTOGRAPHY
1. INTRODUCTION: BASIC AND
ADVANCED CONCEPTS
2. MATHEMATICAL BACKGROUNDS
3. CIPHERS
CRYPTANALYSIS: CODE BREAKING
1. INTRODUCTION
DATA 2. CLASSICAL ATTACKS
TRANSMISSION CORE 3. SIDE-CHANNEL ATTACKS
SECUIRTY 4. ATTACKS AGAINST PRIVATE-KEY
CIPHERS
5. ATTACK AGAINST PUBLIC-KEY
CIPHERS
6. ALGORITHMS FOR SOLVING THE
DISCRETE LOG PROBLEM
7. ATTACKS ON RSA
MANAGEMENT
ACCESS GOVERNANCE
SECURITY CORE AUTHENTICATION: DATA
INTEGRITY/CORRECTNESS
1. CRYPTOGRAPHIC TECHNIQUES:
HASH FUNCTIONS
2. AUTHENTICATION FACTORS:
PASSWORDS, PINS
CRYPTOGRAPHIC TOKENS,
BIOMETRICS
3. DATA INTEGRITY: CONCEPTS
AND IMPLEMENTATION
MODELS/MECHANISMS
4. WHAT YOU KNOW
AUTHENTICATION FACTORS:
PASSWORDS: SECRET CODES,
SECRET PINS
5. AUTHENTICATION STRENGTH
(STRENTHENING
AUTHENTICATION OF
PASSWORDS)
6. PASSWORD ATTACKS
7. PASSWORD STRORAGE
TECHNIQUES (STRENTHENING
STORAGE OF PASSWORDS)
MANAGEMENT
GOVERNANCE
CORE AUTHENTICATION AND FUNDAMENTAL DESIGN PRINCIPLES COMPONENT DESIGN PHYSICAL MEDIA
AUTHORIZATION: ACCESS CONTROL 1. LEAST PRIVILEGE 1. COMPONENT DESIGN 1. TRANSMISSION IN A SYSTEM THINKING
1. SECURE ARCHITECTURE DESIGN 2. FAIL-SAFE DEFAULTS SECURITY MEDIUM 1. WHAT IS A SYSTEM?
2. LOGICAL DATA ACCESS CONTROL 3. COMPLETE MEDIATION 2. PRINCIPLES OF SECURE 2. SHARED AND POINT-TO- 2. WHAT IS SYSTEMS
3. PHYSICAL DATA SECURITY 4. SEPARATION OF DUTIES COMPONENT DESIGN POINT MEDIA ENGINEERING?
4. DATA LEAK PREVENTION 5. MINIMIZE TRUST 3. COMPONENT 3. SHARING MODELS 3. SECURITY OF GENERAL-
6. ECONOMY OF MECHANISM IDENTIFICATION 4. COMMON TECHNOLOGIES PURPOSE SYSTEMS
7. MINIMIZE COMMON MECHANISM 4. ANTI-REVERSE 4. SECURITY OF SPECIAL-
8. LEAST ASTONISHMENT (SOMETIMES ENGINEERING TECHNIQUES PURPOSES SYSTEMS
REFERRED TO AS “PSYCHOLOGICAL 5. SIDE CHANNEL ATTACK 5. THREAT MODELS
ACCEPTABILITY”) MITIGATION PHYSICAL INTERFACES AND 6. REQUIREMENTS ANALYSIS
9. OPEN DESIGN 6. ANTI-TAMPER CONNECTORS 7. FUNDAMENTAL PRINCIPLES
10. LAYERING TECHNOLOGIES 1. HARDWARE LEAST PRIVILEGE
11. MODULARITY CHARACTERISTICS AND COMPLETE MEDIATION
12. COMPLETE LINKAGE MATERIALS FAIL-SAFE DEFAULTS
13. DESIGN FOR ITERATION 2. CATEGORIES OF UTP CABLE LEAST COMMON
3. STANDARDS MECHANISM
COMPONENT REVERSE 4. PIN ASSIGNMENTS FOR THE SEPARATION OF
SPECIFICATION OF SECURITY ENGINEERING TIA/EIA 568A AND 568B PRIVILEGE:
REQUIREMENTS 1. DESIGN REVERSE STANDARDS. PSYCHOLOGICAL
SOFTWARE DEVELOPMENT LIFE ENGINEERING 5. COMMON CONNECTORS ACCEPTABILITY AND
CYCLE/SECURITY DEVELOPMENT LIFE 2. HARDWARE REVERSE RJ45 WORK FACTO
CYCLE ENGINEERING RJ11 ECONOMY OF MECHANISM
PROGRAMMING LANGUAGES AND TYPE- 3. SOFTWARE REVERSE F-TYPE AND ANALYZABILITY
SAFE LANGUAGES ENGINEERING FIBER DEFENSE IN DEPTH
USB 8. DEVELOPMENT FOR TESTING
BNC
RS-232
IEEE 1394 INTERFACE
SYSTEM ACCESS
HARDWARE ARCHITECTURE 1. AUTHENTICATION METHODS
1. STANDARD ARCHITECTURES 2. IDENTITY
2. HARDWARE INTERFACE
STANDARDS
3. ORGANIZATIONS SYSTEM CONTROL
RESPONSIBLE FOR
COMPUTER AND 1. ACCESS CONTROL
CONNECTIVITY STANDARDS 2. AUTHORIZATION MODELS
4. COMMON ARCHITECTURES 3. GENERIC AUTHORIZATION
5. EXAMPLES OF COMMERCIAL METHODS:
MULTIPROCESSORS 01. POLICY-BASED ACCESS
CONTROL
DISTRIBUTED SYSTEMS 02. MANDATORY ACCESS
ARCHITECTURE CONTROL (MAC)
1. NETWORK ARCHITECTURES, 03. ROLE-BASED ACCESS
GENERAL CONCEPTS CONTROL (RBAC)
2. WORLD WIDE WEB 4. INTRUSION DETECTION
3. THE INTERNET 5. CYBERATTACKS AGAINST
4. PROTOCOLS AND LAYERING COMPUTER SYSTEMS
5. NETWORK LAYER 01. BACKDOORS
INTERACTION. 02. SPOOFING
6. HIGH PERFORMANCE 03. TAMPERING
COMPUTING 04. PRIVILEGE ESCALATION
(SUPERCOMPUTERS) 05. PHISHING
7. HYPERVISORS AND CLOUD 06. SOCIAL ENGINEERING
COMPUTING 6. DEFENSES
IMPLEMENTATIONS 7. AUDIT
8. VULNERABILITIES 8. MALWARE
9. VULNERABILITY MODELS
NETWORK ARCHITECTURE 10. PENETRATION TESTING
1. GENERAL CONCEPTS 11. VULNERABILITY MAPPING
2. NETWORK TOPOLOGIES. 12. FORENSICS
3. COMMON ARCHITECTURES 13. RECOVERY RESILIENCE
4. FORWARDING
5. ROUTING
6. SWITCHING/BRIDGING COMMON SYSTEM ARCHITECTURES
7. EMERGING TRENDS 1. VIRTUAL MACHINES
8. VIRTUALIZATION AND 2. INDUSTRIAL CONTROL
VIRTUAL HYPERVISOR SYSTEMS
ARCHITECTURE 3. INTERNET OF THINGS (IOT)
4. EMBEDDED SYSTEMS
NETWORK SERVICES 5. MOBILE SYSTEMS
6. AUTONOMOUS SYSTEMS
1. CONCEPT OF A SERVICE 7. GENERAL-PURPOSE SYSTEMS
2. SERVICE MODELS (CLIENT–
SERVER, PEER TO PEER)
3. SERVICE PROTOCOLS AND
CONCEPTS (IPC, APIS,
IDLS)
4. COMMON SERVICE
COMMUNICATION
ARCHITECTURES
5. SERVICE VIRTUALIZATION
6. VULNERABILITIES AND
EXAMPLE EXPLOITS