Paul Boz wrote: » Since you already have a skillset for system administration, continue with your plans to get really good at system administration security. I've found that if you can take your existing non-security knowledge then apply security to that you'll be a much more capable security practitioner. From there you can start branching out into other fields of infosec. I'd start with just learning how to properly secure the services and systems you're currently certified on or have work experience with. For example, work on hardening MS deployments or mail servers. Always stay true to your non-security background, as that expertise will make you valuable.
tdean wrote: » Paul, this is one of the areas i just dont get. i see it written all the time, but other than patching and tightening permissions, what exactly does that mean?
docrice wrote: » Hardening and systems security is the general practice of identifying the functional requirements of the systems in question (and their respective applications, etc.) and turning off / removing services, configuring the settings, forwarding logs to a central location, etc., as well as tightening permissions and all the other usual considerations. Establishing a well-documented baseline which you can take deviation measurements off of at later dates is another example. For example, take a look at the NSA hardening guides:Microsoft Windows Operating System - NSA/CSS These configuration tweaks should obviously represent the general parameters outlined in the corporate security policy.
tdean wrote: » Oh man....this is great info. this is exactly the info i didnt know how to get. Paul, does that link go into resolving what you say here? "If you have a mail server which is configured for Telnet, FTP, small services, and RDP, you can bet your butt that someone's going to try to leverage one of those vectors."