CIS 52
Welcome to the last class!
Cybersecurity career overview
Logistics
The lab was due at 9am today
Last quiz will take place from 1pm till Sunday midnight
And you will be done!
Presentations
1 | CSA Star Findings and Shai Hulud | David,Sanjay |
2 | Prowler | Ramos,Cesar |
3 | CSA STAR Summary and Prowler Tool | Njoroge,Peter Rerai |
4 | AWS Macie | Hollow,Craig Edward |
5 | Tool -- AWS Inspector | Thomas,Charnnel Shane |
6 | City of Oakland breach | Lam,James K |
7 | Shai-Hulud NPM worm | Pang,Andrew K |
8 | 2019 Capital One Breach | Her,Rob Lue |
9 | Breach:microsoft cloud 2023-2024 | Frozenda,Enayatullah |
10 | Snowflake Breach | Hall III,Nolan |
11 | Collins Aerospace Attack | Erdene-ochir,Byambaragchaa |
12 | CSA STAR Level 1 – AWS Self-Assessment | Abubaker, Ali |
Detection And Response
Prowler
Review
AWS Cleanup
Self-explanatory
Keep in touch!
That’s all, folks!
Security Careers & Certs
Additional Content
Jobs in Cybersecurity are plentiful!
There are many types of jobs as well
Compliance specialists
Project Management
Detection & Response
Threat Analytics
DevOps
A bunch of others..
Many paths
From technical perspective..
Networking & Linux
The Three States of Digital Data�
Data at rest; Data at rest is a term that refers to data stored on hard drives, flash disks, in the cloud, or even on mobile devices.
Data in motion; Data in motion is data that is currently traveling across a network or processed in a computer’s RAM ready to be read or updated.
Data in use; Data in use is data that is being processed by one or more applications.
CIA Triad
In analyzing cybersecurity, the first step is to look at the CIA triad, which is a well-known model for the development of cybersecurity.
Confidentiality is the ability not to disclose information to unauthorized persons, programs, or processes.
Integrity means that protection against improper modification and destruction of information, ensuring that information cannot be changed undetected, and ensuring the integrity of the information.
Availability ensures that information is available to those in need that includes timely and reliable access, regardless of the time of day, place of residence, location, or other factors.
Being a Hacker vs Being a Bug Bounty Hunter
Being a cybersecurity professional doesn’t necessarily to be a hacker or a bug bounty hunter.
Bug Bounty Hunt is the process of searching for bugs, finding vulnerabilities, and reporting the reward to the security team of the site.
Usually, the word “hacker” is used with its negative meaning. From this perspective, a hacker is a person who uses knowledge to somehow undermine technology and steal something valuable or other malicious. Hacker, on the other hand, can be categorized into three;
Hats
White Hat Hackers; White Hat Hackers exploit vulnerabilities not to gain a personal advantage but helping organizations assess and strengthen their network security against bad actors.
Black Hat Hackers; Black Hat hackers are cybercriminals who infiltrate computer networks and use the compromised data for personal purposes, so if you are looking for a solid career path, look no further than Black Hat hacking — for those who want to go.
Gray Hat Hackers; Gray Hat Hackers violate ethical standards or principles, but without the malicious intent ascribed to black hat hackers.
Few Vendor-agnostic Certs
There are �a lot of certs� out there..
What the future holds
What about AWS�specific certs?
Blogs
The End