Tuesday, 17 April 2012

Webinars

1 Webinars, Lectures etc.

The following is a breakdown and list of webinars and lectures by topic and grouping.

IT Masters and Charles Sturt University will be delivering these lectures over the coming months as well as providing the archived copies for future access.

Each event is worth at least 1 CPE/CPD point for ISACA, ISC2 and other professional accreditations that you may need to maintain and are recognised by the Australian Computer Society (http://www.acs.org.au).

1.1 IPv6

This series of lectures focuses on the issues in security with the coming IPv6 protocol.

1.1.1 Intro to Security in IPv6 (Archived)

In this session you will learn what the Internet Protocol version 6 (IPv6) is, know who has adopted it, understand the vulnerabilities causing security concerns, and learn methods used to protect networks against hacker attacks and tools.

IPv6 Security forms the basis of the coming protection measures for the next Internet Protocol.

In this session, you will learn of the coming changes as well as where to get further Information.

https://www2.gotomeeting.com/register/730357890

1.1.2 Windows domain security with IPv6 (Archived)

In this session you will learn how Windows domains are moving to use IPv6 and the added controls that IPv6 can give to your environment.

Understand the implementation concerns, changes and pitfalls as well as some new features and tricks. The session will cover the changes in Windows that IPv6 delivers.

In this session, you will learn of the coming changes as well as where to get further Information. More you will learn to improve the security of your site whilst incorporating mobility and new technologies.

https://www2.gotomeeting.com/register/927119450

1.1.3 Improving controls using IPv6

Fri, Apr 20, 2012 12:30 PM - 1:30 PM AEST

In this session you will learn what the main security issues with the Internet Protocol version 6 (IPv6) will be. Understand the vulnerabilities causing security concerns, and learn methods used to protect networks against hacker attacks and tools. The session will cover the weaknesses in IPv6 that are key areas of focus.

IPv6 Security forms the basis of the coming protection measures for the next Internet Protocol. Learn what you can do in order to ensure that you remain on top of your sites security controls and ensure that you are prepared for the coming changes.

In this session, you will learn of the coming changes as well as where to get further Information. More you will learn to improve the security of your site whilst incorporating mobility and new technologies.

https://www2.gotomeeting.com/register/398429674

1.1.4 Continuing

More IPv6 Sessions will be loaded soon. We will be covering the following topics in coming sessions:

• Pen testing with IPv6 Networks

• DHCPv6DNSv6 and DNSSEC

• Means to monitor exfiltration and IPv6 tunnels

• Multicast traffic and the move away from broadcast domains

• IPv6 routing security

• Privacy controls in IPv6

• IPv6 and Mobility

1.2 General Information Security Sessions

In these sessions we have a number of general information security and Forensic sessions.

1.2.1 What to Do When Your Network is Hacked?

Mon, May 7, 2012 12:30 PM - 1:30 PM AEST

In this session you will learn what to Do When Your Network is Hacked

• The Incident handling process.

• Case Studies

• Key factors that hackers look for when selecting targets

• Attack trends

• Accessing your vulnerability

• Making sure you optimise the ability of criminal and forensic investigates to gather evidence

• Preparation

• Identification

• Containment

• Eradication

• Recovery

• Lessons Learned

In this session, you will learn of the coming changes as well as where to get further Information.

https://www2.gotomeeting.com/register/939395402

1.2.2 What today’s Digital Forensic Scientists can and cannot do

Friday, May 18, 2012 12:00 PM - 1:00 PM AEST

In this session you will learn about digital forensics and where this discipline is heading. More, you will learn methods used to protect networks against hacker attacks and tools.

• The latest tools for conducting Computer Investigations

• Investigating Wireless Attacks

• Investigating Web Attacks

• Investigating DoS Attacks

• Tracking Emails and Investigating Email crimes

• Australian Law and Computer Forensics

• Who is liable for losses that result from attacks

• The role of Education is limiting liability

• Tools for conducting Risk Assessments

• Mobile forensics

• Web forensics

• Expect anything you say to remain and become discoverable

• eDiscovery

• The future of digital forensics

https://www2.gotomeeting.com/register/956138442

1.2.3 Tracing IP Addresses

Thu, Jun 14, 2012 12:00 PM - 1:00 PM AEST

In this session you will learn how to trace an IP address.

• Understanding the networking clues left on the computer

• IP tracing including ping, traceroute, whois, nslookup, port scanners, Sam Spade, and DNSstuff.

• Proving who sent an email.

• Providing exculpatory or incriminating information

• The role that IP tracing holds in forensic investigations.

• Spoofing addresses

• What header and log information can tell you

• Evidence and volatility

• How attackers hide their tracks

https://www2.gotomeeting.com/register/844644002

1.2.4 How much do I really need to spend on security? (Archived)

A management webinar on Quantifying Information Systems Risk.

Information security is a risk function. Paying for too much security can be more damaging in economic terms than not buying enough. This leads to the optimal expenditure on damage prevention and where this should lie. Who should be responsible for the security failures that are impacting the economy and society and how can this be maximized in order to minimize negative externalities?

https://www2.gotomeeting.com/register/441000498

1.3 Cloud Security

In this series we have a set of lectures and webinars concerning cloud technology.

1.3.1 Changes in the cloud (Archived)

With IPv6 coming, there are many changes that people have not thought of. We look at the changing IT environment and how new technologies will make the cloud mainstream. We look at the nature of IPv6 and see how the distributed architecture and advanced in mobile computing will make everything cloud based, even the computer on your desktop, that is, if you even have a desktop any more.

This session will be presented at a high level and will give a management overview of the things people have not been telling you so far.

https://www2.gotomeeting.com/register/725285642

1.4 Cyber (Crime / Espionage / Terror)

We have just seen the largest cyber espionage incident in recorded history and it is only set to get bigger. The rise of cyber based groups engaging in hactivism is creating chaos, but it is only the start as these groups start to do more damage. Al-Qaeda and other pure terror groups have been on the back foot unable to leverage the social aspects of Web 2.0, but will this change as groups such as Anon and LulzSec define a distributed model for social malfeasance?

Add to this criminal controlled botnets of millions of zombie hosts and the decade is set to be the decade of the hack!

This is a 24 lecture series on crime and the Internet. The total series is worth 24 CPE/CDPD hours.

1.4.1 Lecture 1 (Archived)

This is the initial and introductory session. In this session, we look at the overview of the issue and introduce the subject.

https://www2.gotomeeting.com/register/253921674

1.4.2 Lecture 2 (Archived)

This was the first of 4 lectures detailing the rise and development of cybercrime and its links to traditional criminal enterprises (including the drug trade, prostitution and smuggling).

https://www2.gotomeeting.com/register/591729506

1.4.3 Lecture 3 (Archived)

In this lecture, we focus on Cyber Crime. This was the Second of 4 lectures detailing the rise and development of cybercrime and its links to traditional criminal enterprises (including the drug trade, prostitution and smuggling). We cover the use of cybercrime in terror funding this lecture.

https://www2.gotomeeting.com/register/424430178

1.4.4 Lecture 4 (Archived)

In this lecture, we focus on Cyber Crime. This was the Third of 4 lectures detailing the rise and development of cybercrime and its links to traditional criminal enterprises (including the drug trade, prostitution and smuggling). We cover the use of cybercrime in terror funding this lecture.

https://www2.gotomeeting.com/register/217048578

1.4.5 Lecture 5 (Archived)

In this lecture, we focus on Cyber Terror. This will be the first in 4 lectures detailing the rise and development of cyber terror and its links to traditional criminal enterprises (including the drug trade, prostitution and smuggling), states and more.

https://www2.gotomeeting.com/register/532843426

1.4.6 Lecture 6 (Archived)

In this lecture, we focus on Cyber Terror. This will be the second in 4 lectures detailing the rise and development of cyber terror and its links to traditional criminal enterprises (including the drug trade, prostitution and smuggling), states and more.

https://www2.gotomeeting.com/register/987573930

1.4.7 Lecture 7 (Archived)

In this lecture, we focus on Cyber Terror. This will be the third in 4 lectures detailing the rise and development of cyber terror and its links to traditional criminal enterprises (including the drug trade, prostitution and smuggling), states and more.

https://www2.gotomeeting.com/register/773287434

1.4.8 Lecture 8 (Archived)

In this lecture, we focus on Cyber Warfare. This will be the first in 4 lectures detailing the rise and development of state based weaponisation of electronic and digital attack systems.

https://www2.gotomeeting.com/register/552681122

1.4.9 Lecture 9 (Archived)

In this lecture, we focus on Cyber Espionage and Markets. This will be the first in 4 lectures detailing the rise and development of markets for cyber weapons, hackers and more and will start the exploration into espionage.

https://www2.gotomeeting.com/register/808283586

1.4.10 Lecture 10 (Archived)

In this lecture, we focus on Cyber Espionage and Markets. This will be the second in 4 lectures detailing the rise and development of markets for cyber weapons, hackers and more and will start the exploration into espionage.

https://www2.gotomeeting.com/register/436933098

1.4.11 Lecture 11

Mon, May 14, 2012 7:00 PM - 8:00 PM AEST

In this lecture, we focus on Cyber Espionage and Markets. This will be the third in 4 lectures detailing the rise and development of markets for cyber weapons, hackers and more and will start the exploration into espionage.

https://www2.gotomeeting.com/register/174494050

1.4.12 Lecture 12

Mon, Jun 11, 2012

In this lecture, we will again focus on Cyber Crime. This was the last of 4 lectures specifically detailing the rise and development of cybercrime and its links to traditional criminal enterprises (including the drug trade, prostitution and smuggling). We summarise the growth of cybercrime this lecture.

https://www2.gotomeeting.com/register/174494050

1.4.13 Lecture 13

Mon, Jul 9, 2012

Hacktivism 1

https://www2.gotomeeting.com/register/174494050

1.4.14 Lecture 14

Mon, Aug 13, 2012

Hacktivism 2

https://www2.gotomeeting.com/register/174494050

1.4.15 Lecture 15

Mon, Sep 10, 2012

Hacktivism 3

https://www2.gotomeeting.com/register/174494050

1.4.16 Lecture 16

Mon, Oct 8, 2012

Hacktivism 4

https://www2.gotomeeting.com/register/174494050

1.4.17 Lecture 17

Mon, Nov 12, 2012

In this lecture, we focus on Cyber Warfare. This will be the second in 4 lectures detailing the rise and development of state based weaponisation of electronic and digital attack systems.

https://www2.gotomeeting.com/register/174494050

1.4.18 Lecture 18

Mon, Dec 10, 2012

In this lecture, we focus on Cyber Warfare. This will be the third in 4 lectures detailing the rise and development of state based weaponisation of electronic and digital attack systems.

https://www2.gotomeeting.com/register/174494050

1.4.19 Lecture 19

Mon, Jan 14, 2013

In this lecture, we focus on Cyber Terror. This will be the last in 4 lectures detailing the rise and development of cyber terror and its links to traditional criminal enterprises (including the drug trade, prostitution and smuggling), states and more.

https://www2.gotomeeting.com/register/174494050

1.4.20 Lecture 20

Mon, Feb 11, 2013

In this lecture, we focus on Cyber Warfare. This will be the last in 4 lectures detailing the rise and development of state based weaponisation of electronic and digital attack systems.

https://www2.gotomeeting.com/register/174494050

1.4.21 Lecture 21

Mon, Mar 11, 2013

In this lecture, we focus on Cyber Crime. This was the fourth of 4 lectures detailing the rise and development of cybercrime and its links to traditional criminal enterprises (including the drug trade, prostitution and smuggling). We cover the use of cybercrime in terror funding this lecture.

https://www2.gotomeeting.com/register/174494050

1.4.22 Lecture 22

Mon, Apr 8, 2013

In this lecture we look at state responses to terror, cybercrime and espionage.

https://www2.gotomeeting.com/register/174494050

1.4.23 Lecture 23

Mon, May 13, 2013

In this lecture we look at the underlying conflicts and legislative as well as policy goals created by states to minimise the impact of attacks and data theft.

https://www2.gotomeeting.com/register/174494050

1.4.24 Lecture 24

Mon, Jun 10, 2013

In this final lecture we will sum up the various topics we have covered in this course.

https://www2.gotomeeting.com/register/174494050

1.5 Reversing Code

Lecture Series - Reversing Code.

This is a lecture series on code reversing. We start with MASM/NASM and work towards an analysis of Packed and crypt'd code in malware and software protection systems.

The series is designed to start with little direct assembly knowledge and to lead to a detailed understanding of reversing code from machine language into a higher level language (such as C).

1.5.1 Lecture 1 (Archived)

In this lecture we covered:

• What are reversing, disassembling, decompiling

• What is a debugger

The initial few slides do not come up in this video but will be added soon.

Lecture archive: https://www2.gotomeeting.com/register/643455194

Slides: http://craigswright.podbean.com/2012/04/17/lecture-series-reversing-code/

1.5.2 Lecture 2 (Archived)

In this lecture we covered:

• The IAT

• What is a Register

• Using OllyDbg

• An intro to Assembly code

• Relocations

Lecture archive: https://www2.gotomeeting.com/register/114720122

Slides: http://craigswright.podbean.com/2012/04/17/lecture-series-reversing-code-2/

1.5.3 Lecture 3 (Archived)

In this lecture we covered:

• Using Olly

• Analysing the test file “ReverseMe.exe”

• X86 Registers and Flags

• An intro to Assembly Instructions

Lecture archive: https://www2.gotomeeting.com/register/584145802

Slides: http://craigswright.podbean.com/2012/04/17/lecture-series-reversing-code-3/

1.5.4 Lecture 4 (Archived)

In this lecture we covered:

• More Olly and more on the Test file

• Hands on and starting to step through and crack our code sample

Lecture archive: https://www2.gotomeeting.com/register/730871530

Slides: http://craigswright.podbean.com/2012/04/17/lecture-series-reversing-code-4/

1.5.5 Lecture 5 (Archived)

In this lecture we covered:

• Privileges and rings

• Jumps in Assembly

• Conditionals

• Reversing loops

Lecture archive: https://www2.gotomeeting.com/register/706481658

Slides: http://craigswright.podbean.com/2012/04/17/lecture-series-reversing-code-5/

1.5.6 Lecture 6

Thu, Apr 26, 2012 7:00 AM - 8:00 PM AEST

Now, we continue executing and walking through the program and trying to crack the main functions.

• Looking at creating patches

• Automating debugging

https://www2.gotomeeting.com/register/597275986

1.5.7 Lecture 7

Thu, May 24, 2012

In this lecture we will:

• Create patches

• Look at analysing shellcode and

• Reverse shellcode samples

https://www2.gotomeeting.com/register/597275986

1.5.8 Lecture 8

Thu, Jun 28, 2012

In this lecture we will:

• Explore the techniques used in malware

• Packers Cryptors and more

https://www2.gotomeeting.com/register/597275986

1.5.9 Lecture 9

Thu, Jul 26, 2012

In this lecture we will:

• Reverse patches to discover system vulnerabilities

https://www2.gotomeeting.com/register/597275986

1.5.10 Lecture 10

Thu, Aug 23, 2012

In this lecture we will:

• Examine Java and .Net and reverse it

https://www2.gotomeeting.com/register/597275986

1.5.11 Lecture 11

Thu, Sep 27, 2012

In this lecture we will:

• Reverse code samples and create pseudo code, C and C++ equivilants

https://www2.gotomeeting.com/register/597275986

1.5.12 Lecture 12

Thu, Oct 25, 2012

In this lecture, we conclude the series and recap what we have learnt.

• We have an understanding of X86 code structures

• How to create patches

• How packers work

• Making use of loops and more to see what code does

https://www2.gotomeeting.com/register/597275986

1.6 Australian Computer Society.

The following are a set of live events held with the Australian Computer Society.

1.6.1 WORKSHOP
IpV6 Security

IPv6 is a new technology to many organizations, but one which will soon be integrated into everyday life. It implements and simplifies additional features not present in IPv4, however, also revitalizing old flaws and bugs. Network security, fundamentals, and new concepts will be discussed in this workshop. 
IPv6 Training Agenda

Morning

  • A basic introduction to IPv6 and IPv6 Security
  • Concepts
  • Addresses, headers, extension headers & packet size issues
  • Fragmentation
  • IPv6 Tunnels
  • ICMPv6, Neighbor discovery & DCHPv6
  • IPv6 DNS issues
  • Security, Firewalls and IDS/IPS
  • Dual Stacking

Lunch

Afternoon Session

  • Privacy Extensions, RFC 4941 Privacy addresses and layered networks
  • IPv4 vs. IPv6 Threats
  • IPv6 and NAT64
  • IPv6 and IPsec
  • Blacklisting, a thing of the past with IPv6?
  • A Distributed Security Model
  • Architecture and Deployment concerns (are your security tools ready?)

Questions and Close

Following the close Craig Wright will be available for questions.

About this Event

Venue:

ACS Auditorium
Level 11, 50 Carrington Street

Sydney  NSW  2000

Date:

Monday 23rd April 2012

Time:

8:45am for 9:00am start to 5:00pm

http://acs.org.au/index.cfm?action=load&area=9001&temID=eventdetails&eveID=10223674777777

1.6.2 Australian Computer Society Branch Forum
Effective Strategies to Manage People and Create Secure Low Risk Systems through Incentives That Work

In this session we will address risk management and information security concerns that plague the industry as well as providing a number of solutions that you can implement. Many of the current security solutions can be solved without spending money. They stem from a general focus on compliance at the cost of the people implementing solutions. We demonstrate that with the right incentives you can create more secure systems at a lower cost and have more productive personal in the process.

Venue:

Settlers Hall 
Waterfront Restaurant 
27 Circular Quay West 
The Rocks 
Sydney NSW 2000

Date:

Monday 30th April 2012

Time:

5:30pm for 6:15pm start - 7:30pm

http://www.acs.org.au/nsw/index.cfm?action=event&area=9001&temID=eventdetails&eveID=30222863167243

2 comments:

Tarah said...

Do you know where I would be able to find an ipv6 training course? I want to understand it a bit better but I'm not sure where to start.

Craig Wright said...

Hard to say, I do not know where you are. IO have one runing in Canberra in a couple weeks, but I cannot state where you are. More info needed.