Visual training materials to understand IT / firewall & data transfer security.

At work I often have to liaise with the security and network team to get firewall permissions approved and there are always delays as they have to liaise with the suppliers about their connection methods, ports, standards etc.  I would like to understand this more so I can ask suppliers about the flow of data at an earlier point in time to reduce delays.

I have a reasonable IT background but when it comes to all of the security based terminology I get confused.  I am aware that different standards such as TLS change over time but not what it means or it's impact / implementation.

For simple example, how is port 123 more secure than port 456 and how does the port number stop unauthorised access?  In basic terms I understand that when using FTP the data is transferred in plain text but using SFTP the data is encrypted and assume other standards work in different ways at different levels of encryption.

Can anyone recommend maybe some good online interactive demos on these topics or even online courses to help me understand the concept of security.  I am more of a visual learner but in this case don;t have access at that level.
Matthew EmeryAsked:
Who is Participating?
 
btanExec ConsultantCommented:
Similar to FTP example, the most common is HTTP (80) vs HTTPS (443). The more secure port is normally the firewall will allow as compared to the plain version. However that said that doesnt mean 443 allowed by firewall will be safe, it is encrypted but does not mean content is scanned free of malware or even it is scanned, it is only at that instance of scan declared clean. You need defence in depth to have check on the endpoint equipped with Host intrusion prevention software to augment the delivered content hygiene & integrity.

For video, some basic sample below as well as also watching what "adversary" will do to penetrate pass the control. Firewall is not the a panacea to all attack and threats.

Basic Network security
https://www.lynda.com/Data-Science-tutorials/Network-security/475941/517473-4.html
https://www.lynda.com/Windows-Server-tutorials/IT-Security-Foundations-Network-Security/410326-2.html

(securing network)
https://www.lynda.com/Security-tutorials/Securing-your-network/415404/440352-4.html

(Device Management)
https://www.cbtnuggets.com/it-training/network-administration-engineering/network-security

Basic Awareness
https://www.lynda.com/search?q=security+awareness
http://info.phishme.com/l/46382/2017-03-10/
https://www.sans.org/security-awareness-training/video-month

(Penetration tester view)
https://www.sans.org/webcasts/top-methods-pen-testers-socially-engineer-101940
0
 
Justin EvansCommented:
I recommend you get the CCNP Security SISAS 300-208 official Cert guide.  

https://www.amazon.co.uk/s/ref=nb_sb_ss_i_2_4?url=search-alias%3Dstripbooks&field-keywords=ccnp+security&sprefix=ccnp%2Caps%2C131&crid=18TOSMYWQ9HXD&rh=n%3A266239%2Ck%3Accnp+security


This is going to give you everything you need,  good luck.  

Kind Regards

Justin
0
 
David Johnson, CD, MVPOwnerCommented:
There is nothing inherent in an address/port that makes it secure or not secure.  The address is the highway, and the port is the lane on the highway. Then there is the protocol which allows the receiver to handle the traffic with a specific application.
1
 
masnrockCommented:
The protocols in use matter more than the ports. It's just that protocols generally by default use a particular port. A system administrator can change a port number if they so desire.

Example: I have a system that runs Telnet rather than SSH, I could decide to have the server listen on port 2323 instead of port 23. It doesn't change the fact that Telnet is an insecure protocol, it just shows that I'm not running it on the default port.
Second example: If I was running SSH (normally on port 22) on port 23 (which is the default port for Telnet), it doesn't suddenly mean that things are suddenly insecure.

As far as the previous responses, I would apply David Johnson's response with the videos that btan has provided.

I would like to understand this more so I can ask suppliers about the flow of data at an earlier point in time to reduce delays.
You're definitely thinking in the right direction here. One of the big issues with suppliers is that you're usually dealing with salespeople, who aren't going to care about the technology aspect as long as their things work. They might give you a script of what's needed to work, but it ends at that. The only way you're going to get the information you need is to force them to have an engineer of some sort involved who can answer the technical stuff. But another thing that you can always do is see if the network and security group would be open to having someone on some of the calls early on, so that issues can get addressed and delays get minimized.
0
 
Matthew EmeryAuthor Commented:
Well, what can I say other than thank you for all the fantastic responses.  This is the best response i've ever had with all of the responses understanding exactly what I need to understand.

Have a great weekend and I have some learning to do :-)
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.