Thursday, 21 January 2010

Cheap Latest TESTKING papers

Free Rapidshare Accounts

You can find latest TESTKING test papers for different certifications like CISCO, Checkpoint, Citrix, Cognos, CompTIA, Intel , ISEB, Juniper, Microsoft, Oracle, Red Hat, SAS, Sun, etc., and many more just here which includes all levels.

All the above papers are available for only 10£ each, and if paying in INR it is only 250 Rs each….I guess you wouldn’t want to pay more than this to get them….

So what r u waiting for…. the paper is just a mail apart.

Want to order a test paper ??? just mail me with your required test paper name and exam number to the mail address at the bottom of the page and I’ll get in touch with you personally to meet your requirements and to assure you that we are trustworthy and genuine….All payments are made by Pay pal only

Trainings are provided in UK for CCNA, CCNP, CCSP, CCVP, CCIE at competitive rates by well experienced tutors. for further information please contact us..


Contact Details:

networkingwithcisco@googlemail.com

Saturday, 7 March 2009

CompTIA A+ Training by Trainsignal



It covers all four A+ exams, including the Essentials Exam (220-601) and all three Technician Exams (220-602, 220-603, 220-604)


TCP/IP Essentials - A Lab Based Approach


Table of Contents

Preface;

Note to instructors;

Acknowledgements;

General conventions;

List of abbreviations;

TCP/IP overview;

1. Linux and TCP/IP networking;

2. A single segment network;

3. Bridges, LANs and the Cisco IOS;

4. Static and dynamic routing;

5. UDP and its applications;

6. TCP study;

7. Multicast and realtime service;

8. The web, DHCP, NTP and NAT;

9. Network management and security;

References and further reading; Appendix

A: instructor’s guide; Appendix

B: initial configuration of the routers; Appendix

C: source code; Appendix

D: list of key requests for comments (RFC); Index.


Windows Server 2008 All-In-One Desk Reference For Dummies

If you’ve been waiting impatiently for the arrival of Windows Server 2008, wait no more! It’s here, and so is Windows Server 2008 All-In-One Desk Reference For Dummies to help you install it, configure it, network with it, secure it, command it with Windows PowerShell, and more. Services best practices and the cool IIS Web server are covered too.

The eight powerful quick-reference manuals in this one-stop guide cover all the information you need to perform common administrative tasks with Windows Server 2008. You’ll find sure-handed guidance and considerable detail on everything from installation to figuring out why a user can’t gain access to resources on the server. You also see procedures for all common tasks — everything from setting up Internet Connection Sharing (ICS) to promoting your server to a domain controller. Discover how to:

* Use Windows Server virtualization
* Perform a complete PC restore
* Configure server roles and features
* Measure system performance
* Add network clients and protocols
* Keep your server operating at peak performance
* Monitor network interactions with others
* Work with Active Directory RMS
* Use best practices for implementing security
* Implement scripts and cmdlets with PowerShell
* Uncloak viruses masquerading as services

Windows Server 2008 contains so many features that it’s sometimes hard to know which one to install. No problem! Just flip open Windows Server 2008 All-In-One Desk Reference For Dummies and find your answer in a flash!

Cisco CCNA Security 640-553 Training by TrainSignal


In as Little as 13 Hours, You'll Learn How To Identify, Lockdown, & Secure Vulnerabilities in a Small to Medium Enterprise Branch Network...And Have the Knowledge Necessary to Pass the Cisco CCNA Security/IINS 640-553 Exam...Guaranteed!

A Letter From Chris Bryant
CCIE #12933, CCNA, CCNP

You cannot be a Cisco Network Administrator without knowing Cisco Security. Today, security knowledge is no longer a luxury, it is a necessity in nearly any IT position.

Any job applicant, from the most experienced network admin to the entry level junior admin will be required to demonstrate a substantial amount of knowledge concerning security elements.

Passing the CCNA Security exam and proving your security knowledge is difficult. That's why I have created this comprehensive course that shows you how to tackle the diverse security issues that you will face on the exam and in the real world.

As with all Train Signal courses, this CCNA Security course presents the same combination of clearly explained theory and an abundance of "real world" lab examples using the new Security Device Manager (SDM) and the Command Line. This exciting course contains over 13 hours of video instruction where I break down network security theory as you work hands on with real Cisco routers & switches... and secure your own network!
Cisco CCNA Security Training Course FAQs
"Am I qualified to take this course?"

YES! If you are a network administrator, an aspiring network administrator, or have on-the-job security experience, this course will build a stronger foundation of advanced security concepts.

YES! If you have Cisco CCNA Certification or a basic understanding of Cisco Routers and Switches (without certification), this course is for you.

Note: The prerequisite to take the Cisco CCNA Security exam is Cisco CCNA certification.

Note: If you plan to continue on to the CCSP certification, the Cisco CCNA Security certification is the prerequisite.
"Do I need Cisco equipment to complete this training course?"

NO You do not need any Cisco equipment to watch the videos or to pass the Cisco CCNA Security/IINS 640-553 exam; however, working hands-on with Cisco equipment may enhance your training experience.
"I already have my CCNA. Do I need my Cisco CCNA Security certification?"

YES! The ability to secure a Cisco network is one of the most marketable skills for any Cisco professional and network security has never been more important.

Cisco CCNA Security Course Outline
"Everyone has a different method/style of learning best.
If learning via self-paced method, then I would highly recommend Train Signal’s Cisco CCNA materials..."
- Marlon Deerr, Train Signal Student


Introduction - Welcome to Your CCNA Security Video Course!

Meet your instructor Chris Bryant and get started right way with exam preparation tips.

* About Your Instructor
* Exam Prep Tips
Video 1
Hackers – Their Motives and Methods

Learn about Hacker Roles and why they hack. Discover what your Network Security Goals should be, and how to implement Network Security Best Practices to achieve those goals to keep from suffering the consequences of ineffective network security.

* Why Do Hackers Hack?
* General Network Security Goals
* The Consequences of Ineffective Network Security
* Where Network Attacks Originate From
* Social Engineering Attacks
* Trojan Horses and Privilege Escalation Attacks
* Using Ping Sweeps and Port Scans on Your Own Network
* Best Practices
Video 2
Introduction to SDM (Security Device Manager)

Improve productivity, simplify router deployments, and troubleshoot complex connectivity issues using the Security Device Manager. Plus, launch, login, and tour SDM and discover some Real World SDM issues as you learn to manage your router away from the Command Line.

* Cisco's Security Device Manager (SDM)
* Pre-installation Configuration
* Installing SDM
* Launching and Loading SDM
* SDM Settings - User Preferences
* SDM Configure Window
* Additional Tasks Tab
* SDM Monitor Window
* SDM in Internet Explorer Problem
Video 3
Authentication, Authorization, and Accounting (AAA)

Learn how Authentication works in AAA, what happens when you specify different devices used for Authentication, and discover commands used in Authentication, Authorization, and Accounting that will be useful in the real world and on the exam. Plus, configure TACAS+ and RADIUS security protocols.

* What is AAA?
* TACAS+ vs. RADIUS
* TACAS+ and RADIUS Configuration
* Authentication Configuration
* No Authentication Option
* Telnet Login Problem
* Real World Not About AAA Lists
* Using AAA for Privileged EXEC Mode and PPP
* Accounting
* Authorization
* Configuring AAA with SDM
Video 4
Layer 2 Security

Learn how to prevent security threats like CAM Overflow attacks by configuring and implementing Port Security, Sticky Addresses, Lightweight Extensible Authentication Protocol (LEAP), and SPAN. Plus, discover the relationship between DHCP Snooping, Dynamic ARP Inspection, and IP Source Guard and learn to configure and operate Root Guard and BPDU Guard.

* Basic L2 Security Features
* Cisco Password Rules Review
* Preventing CAM Overflow Attacks with Port Security
* Port Security
* Configuring Port Security
* Misconfiguring Port Security
* Aging Time for Secure Addresses
* Sticky Addresses
* Configuring MAC Table Event Notification
* Dot1x Port-Based Authentication
* Cisco Lightweight Extensible Authentication Protocol (LEAP)
* Extensible Authentiaction Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
* Local SPAN Configuration
* Remote SPAN Configuration
* Filtering Intra-VLAN Traffic
* VLAN Access List (VACL)
* Private VLAN
* DHCP Snooping
* Dynamic ARP Inspection
* IP Source Guard
* MAC Address Flooding Attacks
* VLAN Hopping
* Root Guard
* BPDU Guard
Video 5
Layer 3 Security

This is one of the most important videos in the course because of the volume of detailed information that you will use on the exam and in the real world. Learn about "Salting" your MD5 to make an encrypted password even stronger and discover how Network Time Protocol (NTP) will be important in your security deployment. Plus, learn to configure and use Superviews, Autosecure, Security Audits, and One-Step Lockdown via SDM to thwart ICMP based attacks, IP Spoofing, and Recon Attacks.

* Configuring Enable Password
* Privileged Level Password vs. Privleged Level Secret
* Encrypting Passwords
* Strong Passwords vs. Weak Passwords
* Creating and Testing Minimum Length Password Policy
* ”Salting” your MD5
* Network Time Protocol (NTP)
* Configuring NTP Master Time Source
* Synchronizing System Clocks
* Configuring Peering with NTP Peers Command
* Other Clock Commands
* Telnet and SSH
* Creating Banners
* Different Types of Network Attacks
* Denial of Services (DoS) Attack and SYN Flooding Attack
* TCP Intercept Defense
* ICMP (Ping) Sweep, Port Scan and Port Sweep
* Ping of Death vs. Invite of Death and Ping Floods
* Smurf Attacks
* Availability Attacks: Don't Forget the Physical Layer!
* IP Spoofing
* IP Source Routing
* Packet Sniffers and Queries
* Other Confidentiality Attacks
* Password Attacks
* Salami Attack
* Other Network Attacks Types - Trust Exploitation
* Superviews - Role-Based CLI Views
* AutoSecure
* One-Step Lockdown
* Security Audit
* NTP and SSH in SDM
* Differences Between SDM and AutoSecure
* SNMP
* Logging
* Viruses and Worms
* Cisco IOS Logging Enhancements
* Buffer Overflow
* Cisco IOS Resilient Conofiguration and Login Enhancements
* exec-timeout Command
Video 6
The Intrusion Prevention System (IPS)

Learn the differences between Intrusion Detection (IDS) and Intrusion Prevention (IPS) and how they operate. Plus, discover the different approaches to identifying malicious traffic and learn to use NIPS, HIPS and Honeypots to stop it. We'll also configure your Intrusion Prevention System using the Security Device Manager (SDM) and we'll use the Command Line to verify this IPS configuration.

* Intrusion Detection (IDS) vs. Intrusion Prevention (IPS)
* Signatures and Signature Types
* NIPS and HIPS
* Honeypots
* Configuring IPS in SDM
* Editing IPS Rules
* Editing Global Settings
* SDEE Message Logs
* Viewing Signatures
* Editing and Deleting Signatures
* Verifying Your IPS Configuration
Video 7
Firewalls

Learn to enable a Cisco router to act as a firewall using the Cisco IOS Firewall Set. Plus, discover concepts relatively new to Cisco like Zone-based Firewalls that are meant to phase out CBAC and the “ip inspect” command. We'll also configure and edit a firewall using the Security Device Manager's (SDM) Basic Firewall Wizard and we'll draw distinctions between the Basic Firewall Wizard and SDM's Advanced Firewall Wizard.

* Firewall Basics
* Stateless and Stateful Firewalls
* Application Layer Gateway (ALG)
* The Cisco IOS Firewall Feature Set Components
* Authentication Proxy
* Plan for Firewall Success Then Succeed!
* ACL Review
* Extended ACL Review
* Extended Access Control Lists
* Real-World ACL Success Tips
* Introduction to Turbo ACLs
* CBAC and “ip inspect” command
* Real-World Tips and Best Practices
* TCP and UDP Generic Inspection
* Deep Pocket Inspection (DPI)
* Zone-Based Firewall Configuration
* Class Maps and Policy Maps
* Basic Zone Commands
* Configuring Zone Pairs
* Configuring Firewall with SDM's Basic Firewall Wizard
* Editing Firewall with SDM
* SDM's Advanced Firewall Wizard
* Watch Your Directions - More Tips
* ICMP Inspection
* Final Note
Video 8
Cryptography and Virtual Private Networks (VPNs)

Learn how Asymetric and Symetric Algorithms can be used to implement Cryptography Techniques that help encrypt clear text passwords. Plus, configure your own IKE policy using the Command Line and get your hands dirty by using the Security Device Manager (SDM) to configure Site-to-Site VPN and Generic Routing Encapsulation (GRE) over IPsec.

* Cryptography Techniques
* Asymmetric and Symmetric Algorithms
* RSA Algorithm
* Diffie-Hellman (DH)
* A Word or Two About SHA
* What is VPN?
* VPN Terminology and Theory
* Introduction to PKI and the Certificate of Authority
* Public Key Cryptography Standards (PKCS)
* Internet Key Exchange (IKE)
* Steps to Configure Site-to-Site VPN
* Configuring IKE Policy Using Command Line
* Policy Match Criteria
* Crypto ACLs
* Mirror Configuration
* Creating Crypto Map
* Using SDM to Configure Site-to-Site VPN
* Generating Mirror in SDM
* Testing Our Configuration
* Verifying SDM Configuration Using Command Line
* The Return of Generic Routing Encapsulation (GRE) Over IPSec
* Using SDM to Configure GRE over IPSec
Video 9
Introduction to Voice and SAN Security

You do not need to be an expert in Voice Networking or Storage Area Networking (SAN) to learn how to keep these types of networks secure. Learn the differences between FCAP and FCPAP, discover the details of LUN and LUN Masking, and delve deeper into VoIP (Voice Over IP). Whatever your experience level may be, this detailed overview of Voice and SAN Networking will provide you the insight you need to get into one of the fastest growing areas in the IT field.

* Voice Over IP Overview
* Gateways and Gatekeepers
* VoIP Protocols
* Typical VoIP Attacks and Precautions
* Introduction to Storage Area Networking (SAN)
* SAN Transport Technologies and Protocols
* SAN Security - LUNS and LUN Masking
* SAN Zones
* Virtual SANs (VSANs)
* FCAP and FCPAP
Video 10
Introduction to Cisco Network Solutions

This video will introduce you to Cisco Network Solutions including: ASA 5500, Cisco Self-Defending Network, Cisco Security Management Suite, and Cisco Security Agent. Plus, learn about the five phases of the Cisco SDLC (System Development Life Cycle) and discover the differences between Quantitative Risk Analysis and Qualitative Risk Analysis.

* System Development Life Cycle
* Cisco SDLC Phase 1 - Initiation
* Cisco SDLC Phase 2 - Acquisition and Development
* Cisco SDLC Phase 3 - Implementation
* Cisco SDLC Phase 4 - Operation and Maintenance
* Cisco SDLC Final Phase - Disposition
* Disaster Recover - Hot, Warm and Cold Sites
* Risk Analysis - Quantitative and Qualitative
* Cisco Self-Defending Network
* Cisco Security Management Suite
* IronPort
* Cisco Security Agent
* Cisco Security Agent Interceptors
* Cisco ACS
* “in-band” and “out of band”

Monday, 2 March 2009

TCP IP Professional Reference Guide


Introduction
Most networking professionals will never have to write custom TCP/IP code, but they will have to understand the key issues associated with planning, operating, evolving, and troubleshooting IP networks. Gilbert Held's TCP/IP Professional Reference focuses on precisely these issues. Held, who's authored dozens of networking books over the years, maintains a reputation for clarity (witness the online reviews of his recent work, such as Voice and Data Internetworking). In this book, he presents concise, useful introductions to the entire TCP/IP protocol suite and each component protocol, including ICMP, TCP, UDP, and others. Held identifies the key issues associated with network addressing, subnetting, and routing; then introduces key TCP/IP applications such as DNS, and diagnostic tools such as ping, traceroute, NSLOOKUP, and finger. There's also to-the-point coverage of securing TCP/IP hosts via access lists and firewalls.

Table Of Contents:
Ch. 1 Overview 1
Ch. 2 The Protocol Suite 15
Ch. 3 Internet Governing Bodies and the Standards Process 25
Ch. 4 The Internet Protocol and Related Protocols 37
Ch. 5 The Transport Layer 81
Ch. 6 Applications and Built-in Diagnostic Tools 101
Ch. 7 Routing and Routing Protocols 121
Ch. 8 Security 141
Ch. 9 Emerging Technologies 163
App TCP/IP Protocol Reference Numbers 185
Index 231

Saturday, 21 February 2009

IP Addressing and Subnetting, Including IPv6

Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. They allow for the precise routing of data across very complex worldwide internetworks. The rules for their format and use are governed by the Internet Engineering Task Force (IETF) of the The Internet SOCiety (ISOC). In response to the exponential increase in demand for new IP addresses, the IETF has finalized its revision on IP addressing as IP Version 6, also know as IPng (ng = Next Generation). Key hardware vendors such as Cisco and major Internet Service Providers such as America Online have already announced plans to migrate to IP Version 6.
IP address allocation within an organization requires a lot of long-term planning. This timely publication addresses the administrator and engineer's need to know how IP 6 impacts their enterprise networks

* Ideal for companies planning a phased migration from IP 4 to IP 6
* Timely publication: The IETF standard was finalized in early 1999 and will begin to be implemented in late 1999/2000. The current IP Version 4 address set will be exhausted by 2003
* The book will focus on planning and configuring networks and devices for IP 6. Specifically, it will cover how to:
* Increase the IP address size from 32 bits to 128 bits
* Support more levels of addressing hierarchy
* Support an increased number of addressable nodes
* Support simpler auto-configuration of addresses
* Improve the scalability of multicast routing by adding a "scope" field to multicast addresses
* Use a new "anycast address" to send a packet to any one of a group of nodes