SlideShare a Scribd company logo
Good Security is Annoying
Presented by: Nick Lane

January 23rd, 2014
Welcome!
Who belongs here?
•
•
•

IT beginners
IT professionals
Office workers

What will you learn?
•
•
•
•

Who is New Horizons Computer Learning Centers
Security basics
Importance of security
Training options
Who is New Horizons?
Facts to Consider
•
•
•

•
•
•
Strong Vendor Partnerships
Instructor
Nicholas Lane
•
•
•
•

Technical Instructor at New Horizons of Southern California
Two-time “Top 25 Technical Instructor in the World”
New Horizons trainer since 2005
IT certified since 1998

Certifications:
•
•
•
•
•
•

CEI
CEH
UKICI
MCT
MCITP
MCSE

•
•
•
•
•
•

MCSA
MCTS
MCP
MOS
SMSP
Cloud Essentials

•
•
•
•

Cloud+
Security+
Network+
A+
• Security sure seems annoying!
• Increasing security decreases our freedoms
• Increasing security decreases our ease of use
• Increasing security decreases our functionalities
So…who found themselves too
annoyed to implement good
security recently?
Good Info Security is Annoying!
Because………
The default usernames and passwords weren’t
changed on many of the point-of-sales terminals
in their stores.
As a result…….
My credit card
was stolen
Oh and….

.... other credit cards too
The truth is good security is annoying for
us but it is more annoying for the enemy.
 Increasing security decreases enemy freedoms more
 Increasing security decreases enemy ease of use more
 Increasing security decreases enemy functionality more!
Security Basics: The infamous security
triangle and the dot……
Security Basics: The other triangle……
Security Basics: Who are you and how do I
know?
Security Basics: Security is like an onion
because it is best implemented in layers.
Source:
www.stopthehacker.com
Training options:
40032 Networking and Security Fundamentals
50094 Deploying and Administering Microsoft Forefront Security
5049 Managing Messaging Security using Microsoft Exchange Server 2007

Certified Ethical Hacker (CEH) v8.0
Certified Information Security Manager (CISM)

Certified Information System Security Professional (CISSP)
Cisco® Deploying Cisco® ASA Firewall Features v2.0 (FIREWALL)
Cisco® Deploying Cisco® ASA VPN Solutions v2.0 (VPN)
Cisco® Implementing Cisco® Intrusion Prevention System v7.0 (IPS)
Cisco® Implementing Cisco® IOS Network Security v2.0 (IINS)
Cisco® Securing Networks with Cisco® Routers and Switches v1.0 (SECURE)

CompTIA Advanced Security Practitioner (CASP)
CompTIA Security+ Certification
CompTIA Social Media Security Professional (SMSP)

Computer Hacking Forensics Investigator (CHFI) v8.0
Strategic Infrastructure Security
Systems Security Certified Practitioner (SSCP®)
VMware® vCloud Networking & Security for vSphere Professionals v5.1
Visit www.nhsocal.com and search for “security”
Courses, Outlines, Delivery Methods, Length, and Locations
Certified Ethical Hacker – Course Description
This class will immerse the students into an interactive environment where
they will be shown how to scan, test, hack and secure their own systems.
The lab intensive environment gives each student in-depth knowledge and
practical experience with the current essential security systems. Students
will begin by understanding how perimeter defenses work and then be lead
into scanning and attacking their own networks, no real network is harmed.
Students then learn how intruders escalate privileges and what steps can
be taken to secure a system. Students will also learn about Intrusion
Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer
Overflows and Virus Creation. When a student leaves this intensive 5 day
class they will have hands on understanding and experience in Ethical
Hacking. This course prepares you for EC-Council Certified Ethical Hacker
exam 312-50
Certified Ethical Hacker – Target Audience
This course will significantly benefit security
officers, auditors, security professionals, site
administrators, and anyone who is concerned
about the integrity of the network infrastructure.
Labs include latest OS’s, built-in instructions, and 24/7
access from anywhere
Good Info Security is Annoying!
Questions?

More Related Content

PPTX
SOC Analyst Course
PPT
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
PDF
Gets cisco security training
PPTX
Career In Information security
PDF
Is Security Optional20100608
PPTX
Cyber Defence Intelligence (CDI)
PDF
Epoch Universal Solution: Security Offerings
PDF
ITrust Cybersecurity Services - Datasheet EN
SOC Analyst Course
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
Gets cisco security training
Career In Information security
Is Security Optional20100608
Cyber Defence Intelligence (CDI)
Epoch Universal Solution: Security Offerings
ITrust Cybersecurity Services - Datasheet EN

What's hot (16)

PPTX
AISA Sydney Presentation - Would PT add value to the SDLC and why
PDF
Outpost24 Webinar - Common wireless security threats and how to avoid them
PDF
Compute Security - Host Security
PDF
Virtual Networking Security - Network Security
PDF
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
PPT
Sec+ start guide #30001
PDF
security in development lifecycle
PDF
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
PPT
Kevin wharram
PDF
Security it trans
PDF
Manage Artifact Versioning, Security and Compliance
PDF
Virtual Networking Security - Perimeter Security
PDF
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
PDF
API Vulnerabilties and What to Do About Them
PDF
Secure by Design - Security Design Principles for the Working Architect
AISA Sydney Presentation - Would PT add value to the SDLC and why
Outpost24 Webinar - Common wireless security threats and how to avoid them
Compute Security - Host Security
Virtual Networking Security - Network Security
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sec+ start guide #30001
security in development lifecycle
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Kevin wharram
Security it trans
Manage Artifact Versioning, Security and Compliance
Virtual Networking Security - Perimeter Security
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
API Vulnerabilties and What to Do About Them
Secure by Design - Security Design Principles for the Working Architect
Ad

Similar to Good Info Security is Annoying! (20)

PDF
Best Cisco Courses in 2025 for Beginners.pdf
PPTX
Best Cisco Courses in 2025 for Beginners.pptx
PDF
top cyber security course in india...pdf
PPTX
Cybersecurity in Singapore: Trends, Careers & Training Path
PPTX
Activity1 c1
PPTX
The New Security Practitioner
PPTX
Most Advanced Cybersecurity, Network Security Training - Tonex Training
PPTX
!0. Ethical Hacking_overview.pptx
PDF
CISSP Certification Course InfosecTrain.pdf
DOCX
Why Pursue CCNP Security Certification in New York.docx
PPTX
How cisco ccie certification can transform your career ?
PPTX
ICS (Industrial Control System) Cybersecurity Training
PDF
Diploma In Information Security Training and Certification Details In Delhi
PPTX
Cyber security applied to embedded systems
PDF
Lucideus Certified Cyber Security Analyst
PPTX
How to Build a Winning Cybersecurity Team
PDF
Skills For Career In Security
PDF
Gitam Cyber Security Curriculum in PFD format
PDF
1640925838308_IT Courses Non-IT Courses.pdf
PDF
How to ethical hacking? The complete ethical hacking certification course beg...
Best Cisco Courses in 2025 for Beginners.pdf
Best Cisco Courses in 2025 for Beginners.pptx
top cyber security course in india...pdf
Cybersecurity in Singapore: Trends, Careers & Training Path
Activity1 c1
The New Security Practitioner
Most Advanced Cybersecurity, Network Security Training - Tonex Training
!0. Ethical Hacking_overview.pptx
CISSP Certification Course InfosecTrain.pdf
Why Pursue CCNP Security Certification in New York.docx
How cisco ccie certification can transform your career ?
ICS (Industrial Control System) Cybersecurity Training
Diploma In Information Security Training and Certification Details In Delhi
Cyber security applied to embedded systems
Lucideus Certified Cyber Security Analyst
How to Build a Winning Cybersecurity Team
Skills For Career In Security
Gitam Cyber Security Curriculum in PFD format
1640925838308_IT Courses Non-IT Courses.pdf
How to ethical hacking? The complete ethical hacking certification course beg...
Ad

More from McOWLMarketing (8)

PPTX
top 5 ways sharepoint can help your business
PPT
Citrix Sales Training
PPTX
Lean Six Sigma White Belt Webinar
PPTX
2.13.14 v mware software defined data center (sddc) in 2014 slide deck
PPTX
2.6.14 the end of windows xp what to do now slide deck
PPTX
2.6.14 the end of windows xp what to do now slide deck
PPTX
Info Security: Microsoft Dynamic Access Control
PPTX
SharePoint Governance Slide Deck 1.16.2014
top 5 ways sharepoint can help your business
Citrix Sales Training
Lean Six Sigma White Belt Webinar
2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.6.14 the end of windows xp what to do now slide deck
2.6.14 the end of windows xp what to do now slide deck
Info Security: Microsoft Dynamic Access Control
SharePoint Governance Slide Deck 1.16.2014

Recently uploaded (20)

DOCX
GIZ Capacity Building Requirements for ICT Department.docx
PPTX
E-commerce Security and Fraud Issues and Protection
PDF
CollegePresentation.pdf hsjsisjsjsjsssoo
PDF
LSR CASEBOOK 2024-25.pdf. very nice casbook
PPTX
GPAT Presentation PPT and details about imp topics.pptx
PPTX
Unit 1- Introduction to Corporate Etiquettes
PDF
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
PDF
Shopify Store Management_ Complete Guide to E-commerce Success.pdf
PPTX
Core Characteristics and Abilities of an Effective Teacher_0.pptx
PPT
444174684-Welding-Presentatiohhhn-ppt.ppt
PDF
Basic GMP - Training good manufacturing procedure
PPTX
D1basicstoloopscppforbeginnersgodoit.pptx
PPT
ppt-of-extraction-of-metals-12th-1.pptb9
PPTX
Opioid_Analgesics_Presentation (1).pptxp
PDF
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
PDF
CV of Architect Professor A F M Mohiuddin Akhand.pdf
PPTX
Creating-a-Personal-Blockchain-Portfolio-for-Developers-and-Experts.pptx
PPTX
Digital Education Presentation for students.
PPTX
formulation and evaluation of polyherbal antiageing cream
PPTX
UNIT 1 about all the important topics that you need
GIZ Capacity Building Requirements for ICT Department.docx
E-commerce Security and Fraud Issues and Protection
CollegePresentation.pdf hsjsisjsjsjsssoo
LSR CASEBOOK 2024-25.pdf. very nice casbook
GPAT Presentation PPT and details about imp topics.pptx
Unit 1- Introduction to Corporate Etiquettes
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
Shopify Store Management_ Complete Guide to E-commerce Success.pdf
Core Characteristics and Abilities of an Effective Teacher_0.pptx
444174684-Welding-Presentatiohhhn-ppt.ppt
Basic GMP - Training good manufacturing procedure
D1basicstoloopscppforbeginnersgodoit.pptx
ppt-of-extraction-of-metals-12th-1.pptb9
Opioid_Analgesics_Presentation (1).pptxp
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
CV of Architect Professor A F M Mohiuddin Akhand.pdf
Creating-a-Personal-Blockchain-Portfolio-for-Developers-and-Experts.pptx
Digital Education Presentation for students.
formulation and evaluation of polyherbal antiageing cream
UNIT 1 about all the important topics that you need

Good Info Security is Annoying!

  • 1. Good Security is Annoying Presented by: Nick Lane January 23rd, 2014
  • 2. Welcome! Who belongs here? • • • IT beginners IT professionals Office workers What will you learn? • • • • Who is New Horizons Computer Learning Centers Security basics Importance of security Training options
  • 3. Who is New Horizons?
  • 6. Instructor Nicholas Lane • • • • Technical Instructor at New Horizons of Southern California Two-time “Top 25 Technical Instructor in the World” New Horizons trainer since 2005 IT certified since 1998 Certifications: • • • • • • CEI CEH UKICI MCT MCITP MCSE • • • • • • MCSA MCTS MCP MOS SMSP Cloud Essentials • • • • Cloud+ Security+ Network+ A+
  • 7. • Security sure seems annoying!
  • 8. • Increasing security decreases our freedoms • Increasing security decreases our ease of use • Increasing security decreases our functionalities
  • 9. So…who found themselves too annoyed to implement good security recently?
  • 12. The default usernames and passwords weren’t changed on many of the point-of-sales terminals in their stores.
  • 15. Oh and…. .... other credit cards too
  • 16. The truth is good security is annoying for us but it is more annoying for the enemy.  Increasing security decreases enemy freedoms more  Increasing security decreases enemy ease of use more  Increasing security decreases enemy functionality more!
  • 17. Security Basics: The infamous security triangle and the dot……
  • 18. Security Basics: The other triangle……
  • 19. Security Basics: Who are you and how do I know?
  • 20. Security Basics: Security is like an onion because it is best implemented in layers.
  • 22. Training options: 40032 Networking and Security Fundamentals 50094 Deploying and Administering Microsoft Forefront Security 5049 Managing Messaging Security using Microsoft Exchange Server 2007 Certified Ethical Hacker (CEH) v8.0 Certified Information Security Manager (CISM) Certified Information System Security Professional (CISSP) Cisco® Deploying Cisco® ASA Firewall Features v2.0 (FIREWALL) Cisco® Deploying Cisco® ASA VPN Solutions v2.0 (VPN) Cisco® Implementing Cisco® Intrusion Prevention System v7.0 (IPS) Cisco® Implementing Cisco® IOS Network Security v2.0 (IINS) Cisco® Securing Networks with Cisco® Routers and Switches v1.0 (SECURE) CompTIA Advanced Security Practitioner (CASP) CompTIA Security+ Certification CompTIA Social Media Security Professional (SMSP) Computer Hacking Forensics Investigator (CHFI) v8.0 Strategic Infrastructure Security Systems Security Certified Practitioner (SSCP®) VMware® vCloud Networking & Security for vSphere Professionals v5.1
  • 23. Visit www.nhsocal.com and search for “security”
  • 24. Courses, Outlines, Delivery Methods, Length, and Locations
  • 25. Certified Ethical Hacker – Course Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
  • 26. Certified Ethical Hacker – Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
  • 27. Labs include latest OS’s, built-in instructions, and 24/7 access from anywhere