CIS 55
Welcome to the last lecture!
Logistics
Last quiz (optional for extra points) will take place today from 12pm till 2:30 pm Sunday
And you will be done!
Schedule for Today
Security News
Seasoned business and technology leader specializing in building companies and teams. As a lifelong cybersecurity technologist and CISO, he continues to provide strategic leadership while remaining hands-on to select clients directly.�
https://willpizzano.com/
Merritt College CIS 55 (Hacker Techniques) - Guest Lecture
Broad Context of Hacking -- Book
Edward O. Wilson once described the fundamental problem with humanity is that “we have Paleolithic emotions, medieval institutions, and godlike technology.”
Schneier, Bruce. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back (p. 251). W. W. Norton & Company. Kindle Edition.
Review Quizzes
Review Labs
Class Review
January 26 | 1 - Introduction | Nothing is due | CIA. �In-person meetup (Friday/Thursday) @ Jack London Sq between Mar 8 - 25 ~ 4-6pm |
February 2 | 2 - Cryptography & Incident Response | Lab 1 Quiz 1 | Ethics, Incident Response, Cryptography |
February 9 | 3 - Pentesting Tools (Nmap, Nessus, Metasploit, SQLMap) | Lab 2 Quiz 2 | Lab 2 - Linpeas (Linux Enumeration)�Nmap -T5 (fastest)�King of the hill - Happy to join if you make it and send a note discord.�SQLMap - Burp Suite |
February 16 | Holiday (President's Day) | | |
February 23 | 4 - Threat Modeling, OSINT, OWASP, Recon Tools - OSINT, Maltego, Shodan, Censys | Lab 3 Quiz 3 | Maltego Demo |
March 1 | 5 - Cloud Security, LLM Security | Lab 4 Quiz 4 | |
March 8 | 6 - Security Careers and Presentations | Lab 5, Quiz 5 | |
Bug Bounty Class -- 60 mins
Fri, Mar 14 - 11-12pm
Careers!
Jobs in Cybersecurity are plentiful!
Cyberseek.org
There are many types of jobs as well
Compliance specialists
Project Management
Detection & Response
Threat Analytics
DevOps
A bunch of others..
Many paths
Eternal students
Practice
From technical perspective..
Networking & Linux
Labs / CTF
Bug Bounties
The Three States of Digital Data�
Data at rest; Data at rest is a term that refers to data stored on hard drives, flash disks, in the cloud, or even on mobile devices.
Data in motion; Data in motion is data that is currently traveling across a network or processed in a computer’s RAM ready to be read or updated.
Data in use; Data in use is data that is being processed by one or more applications.
CIA Triad
In analyzing cybersecurity, the first step is to look at the CIA triad, which is a well-known model for the development of cybersecurity.
Confidentiality is the ability not to disclose information to unauthorized persons, programs, or processes.
Integrity means that protection against improper modification and destruction of information, ensuring that information cannot be changed undetected, and ensuring the integrity of the information.
Availability ensures that information is available to those in need that includes timely and reliable access, regardless of the time of day, place of residence, location, or other factors.
Being a Hacker vs Being a Bug Bounty Hunter
Being a cybersecurity professional doesn’t necessarily to be a hacker or a bug bounty hunter.
Bug Bounty Hunt is the process of searching for bugs, finding vulnerabilities, and reporting the reward to the security team of the site.
Usually, the word “hacker” is used with its negative meaning. From this perspective, a hacker is a person who uses knowledge to somehow undermine technology and steal something valuable or other malicious. Hacker, on the other hand, can be categorized into three;
Hats
White Hat Hackers; White Hat Hackers exploit vulnerabilities not to gain a personal advantage but helping organizations assess and strengthen their network security against bad actors.
Black Hat Hackers; Black Hat hackers are cybercriminals who infiltrate computer networks and use the compromised data for personal purposes, so if you are looking for a solid career path, look no further than Black Hat hacking — for those who want to go.
Gray Hat Hackers; Gray Hat Hackers violate ethical standards or principles, but without the malicious intent ascribed to black hat hackers.
Few Vendor-agnostic Certs
OSCP Study Group
There are �a lot of certs� out there..
What the future holds
Blogs
My resources to stay updated
Schneier on Security
Krebs on Security
Crowdstrike blog
Dark Reading
Daniel Miessler blog
Troy Hunt
CSO Online
There are hundreds of them..
Books!
More resources
Keep in touch!
Resources Links from Sumedh
That’s all, folks!