|
Publication Date: 10/27/2016
|
Here is a link to free Wireshark training to get you started sniffing packets This is a great blog to get you started you will learn Wireshark from the scratch.
They will show you the
menus, filters and many other options. Most of the people know about Wirehsark,
but they don’t want to try it, because they simply don’t know how to write filters. One focus will be on creating filter, not writing filters. Yes it is true,
that you can make filters without learning those filter parameters. On simple
words, you can use Wireshark without touching the keyboard. Those who have kali
linux, they have it in Kalilinux. I’ll be using wireshark 32 bit version. I’ll
concentrate on HTTP traffic throughout the tutorial. So let’s start with little
bit of theory.
You can also run Wireshark on almost any operating system.
To download Wireshark go here:
https://www.wireshark.org/download.html
http://pentesterblogs.blogspot.in/2016/10/jumpstart-your-wireshark-skills.html
This is your change to help create and review some new standards..
1. Draft SP 800-181, NICE Cybersecurity Workforce Framework (NCWF):
National Initiative for Cybersecurity Education:
Information and links to Draft Special Publication 800-181 can be found on the
NIST CSRC Draft publications page. There is also a comment template available
to use to submit comments.
<http://csrc.nist.gov/publications/PubsDrafts.html#800-181>
Deadline
to submit comments: January 6, 2017
2. Draft SP 1800-6, Domain Name Systems-Based Electronic Mail Security:
Provided below are 2 set of URLs which point to the same document – this draft
document is from the NIST National Cybersecurity Center of Excellence (NCCoE)
program, and this draft has been posted on the NCCoE’s website. Also, below, we
provided links to this draft SP from the CSRC Draft Publications page. Information
and links to Draft Special Publication 1800-6 has also been provided on the
NIST CSRC Draft publications page. There is also a comment template
available to use to submit comments.
<http://csrc.nist.gov/publications/PubsDrafts.html#1800-6>
-OR- Here is the link to the National Cybersecurity Center of
Excellence (NCCoE) website that has details of this draft as well:
<https://nccoe.nist.gov/projects/building_blocks/secured_email>
Deadline
to submit comments to Draft SP 1800-6 is: December 19, 2016
3. NIST Released Draft Special Publications (SP) 800-121 Revision 2, Guide to
Bluetooth Security is available for public
comment. See below for further details.
Information
and link to Draft SP 800-121 Revision 2 can be found on the NIST CSRC Draft
Publications page:
<http://csrc.nist.gov/publications/PubsDrafts.html#800-121r2>
Deadline
to submit comments to draft SP 800-121 Revision 2 is:
December 5, 2016
I wanted to inform
about a free, hands-on virtual lab from
the US Developer organization for your usage. This lab provides an introduction
on how to install, deploy and manage a Docker container on Hyper-V. In just 30
minutes, you’ll learn to build a modular, portable container on a real Windows
VM. There is no installation required
http://www.neacs.org/
The North East Annual Cybersecurity Summit (NEACS) is the premier cybersecurity resource for business executives and technology professionals. For the 4th consecutive year, NEACS (formerly the Annual CT Business Security Summit) will connect attendees with leading subject matter experts in security, privacy, and risk management. NEACS provides attendees with insights on current cybersecurity risks and threats, as well as business and technology strategies to protect against and respond to cyber-attacks, data breaches, and fraud.
This annual conference brings together the best and the brightest for three days of dialogue, networking, and cutting-edge insight. This dynamic event is carefully crafted to deepen our collective understanding of the challenges and opportunities facing boardrooms, Business Leaders, Security Leaders and technologists today and in our future. There will be high impact sessions on a broad range of topics.
The summit information is as follows.
October 7, 2016
8:00 AM – 5:00 PM
Trumbull Marriott Merritt Parkway
180 Hawley Lane, Trumbull CT
You can register at
http://www.cvent.com/events/north-east-annual-cybersecurity-summit-neacs-2016-/event-summary-3f7d710fae1449278748a2a2f5282225.aspx
to learn more go to http://www.neacs.org/
Microsoft Azure is Microsoft’s cloud computing platform, providing a
wide variety of services you can use without purchasing and provisioning
your own hardware. Azure enables the rapid development of solutions and
provides the resources to accomplish tasks that may not be feasible in
an on-premises environment. Azure’s compute, storage, network, and
application services allow you to focus on building great solutions
without the need to worry about how the physical infrastructure is
assembled.
This book covers the fundamentals of Azure you need to start
developing solutions right away. It concentrates on the features of the
Azure platform that you are most likely to need to know rather than on
every feature and service available on the platform. This book also
provides several walkthroughs you can follow to learn how to create VMs
and virtual networks, websites and storage accounts, and so on. In many
cases, real-world tips are included to help you get the most out of your
Azure experience.
In addition to its coverage of core Azure services, the book
discusses common tools useful in creating and managing Azure-based
solutions. The book wraps up by providing details on a few common
business scenarios where Azure can provide compelling and valuable
solutions, as well as a chapter providing overviews of some of the
commonly used services not covered in the book.
This book focuses on providing essential information about the key
services of Azure for developers and IT professionals who are new to
cloud computing. Detailed, step-by-step demonstrations are included to
help the reader understand how to get started with each of the key
services. This material is useful not only for those who have no prior
experience with Azure, but also for those who need a refresher and those
who may be familiar with one area but not others. Each chapter is
standalone; there is no requirement that you perform the hands-on
demonstrations from previous chapters to understand any particular
chapter.
We expect that you have at least a minimal understanding of
virtualized environments and virtual machines. There are no specific
skills required overall for this book, but having some knowledge of the
topic of each chapter will help you gain a deeper understanding. For
example, the chapter on virtual networks will make more sense if you
have some understanding of networking, and the chapter on databases will
be more useful if you understand what a database is and why you might
use one. Web development skills will provide a good background for
understanding Azure Web Apps, and some understanding of identity will be
helpful when studying the chapter on Active Directory.
This book might not be for you if you are looking for an in-depth
developer or architecture-focused discussion on a wide range of Azure
features, or if you are looking for details on other public or private
cloud platforms.
This book explores six foundational features of the Microsoft Azure
platform, along with insights on getting started with Azure, management
tools, and common business scenarios. This book also includes a chapter
with overviews of some of the more commonly used services, such as
HDInsight (Azure’s Hadoop service) and Service Bus, but there are many
services in the Azure platform that are not in the scope of this book,
such as Azure Batch, Data Lake Analytics, and Azure DNS, just to mention
a few. To learn about all of the services available in the Azure
platform, start your journey at http://azure.microsoft.com. Also, there is a web application that shows the many services of Azure and allows you to drill down to learn move. See http://aka.ms/azposterapp.
The topics explored in this book include:
Get the book at this location
LAST DAY TO REGISTER
10/4/16
EVENT DATE
10/5/16
EVENT LOCATION
Midtown, NYC
FULL DETAILS AND REGISTRATION
www.nymjcsc.org
I will be speaking.
A group of friends who are Microsoft MVP create a group of tools to protect from ransomware, this is done vie a combination of documents, policies, recovery keys, and instruction sets for other tools native to Windows Server and Desktop OS’s. We also include suggestions of how you can modernize your network configuration best practices a build a great solution for your clients. What really nice about this solution is the cost. The Solution is donation based!!
The link for more information is here
Remember training user on opening email and links are part of the process in reducing risk of Ransomware, and good security practices.
Lock at this BOGUS screen
What cool about this is how they added the location and the IP address into the scareware screen…
This is NOT real, but how many people would fall for this. If you are a home user running windows 10 here a go trick to know click on the windows key and type support one of the FREE options is help from Microsoft ….. If you at work you should contact your Help desk.
Remember Microsoft does not call customers and tell you that have problems with your computer.
If you get that call hang up !