If you’ve been waiting impatiently for the arrival of Windows Server 2008, wait no more! It’s here, and so is Windows Server 2008 All-In-One Desk Reference For Dummies to help you install it, configure it, network with it, secure it, command it with Windows PowerShell, and more. Services best practices and the cool IIS Web server are covered too.
The eight powerful quick-reference manuals in this one-stop guide cover all the information you need to perform common administrative tasks with Windows Server 2008. You’ll find sure-handed guidance and considerable detail on everything from installation to figuring out why a user can’t gain access to resources on the server. You also see procedures for all common tasks — everything from setting up Internet Connection Sharing (ICS) to promoting your server to a domain controller. Discover how to:
* Use Windows Server virtualization * Perform a complete PC restore * Configure server roles and features * Measure system performance * Add network clients and protocols * Keep your server operating at peak performance * Monitor network interactions with others * Work with Active Directory RMS * Use best practices for implementing security * Implement scripts and cmdlets with PowerShell * Uncloak viruses masquerading as services
Windows Server 2008 contains so many features that it’s sometimes hard to know which one to install. No problem! Just flip open Windows Server 2008 All-In-One Desk Reference For Dummies and find your answer in a flash!
In as Little as 13 Hours, You'll Learn How To Identify, Lockdown, & Secure Vulnerabilities in a Small to Medium Enterprise Branch Network...And Have the Knowledge Necessary to Pass the Cisco CCNA Security/IINS 640-553 Exam...Guaranteed!
A Letter From Chris Bryant CCIE #12933, CCNA, CCNP
You cannot be a Cisco Network Administrator without knowing Cisco Security. Today, security knowledge is no longer a luxury, it is a necessity in nearly any IT position.
Any job applicant, from the most experienced network admin to the entry level junior admin will be required to demonstrate a substantial amount of knowledge concerning security elements.
Passing the CCNA Security exam and proving your security knowledge is difficult. That's why I have created this comprehensive course that shows you how to tackle the diverse security issues that you will face on the exam and in the real world.
As with all Train Signal courses, this CCNA Security course presents the same combination of clearly explained theory and an abundance of "real world" lab examples using the new Security Device Manager (SDM) and the Command Line. This exciting course contains over 13 hours of video instruction where I break down network security theory as you work hands on with real Cisco routers & switches... and secure your own network! Cisco CCNA Security Training Course FAQs "Am I qualified to take this course?"
YES! If you are a network administrator, an aspiring network administrator, or have on-the-job security experience, this course will build a stronger foundation of advanced security concepts.
YES! If you have Cisco CCNA Certification or a basic understanding of Cisco Routers and Switches (without certification), this course is for you.
Note: The prerequisite to take the Cisco CCNA Security exam is Cisco CCNA certification.
Note: If you plan to continue on to the CCSP certification, the Cisco CCNA Security certification is the prerequisite. "Do I need Cisco equipment to complete this training course?"
NO You do not need any Cisco equipment to watch the videos or to pass the Cisco CCNA Security/IINS 640-553 exam; however, working hands-on with Cisco equipment may enhance your training experience. "I already have my CCNA. Do I need my Cisco CCNA Security certification?"
YES! The ability to secure a Cisco network is one of the most marketable skills for any Cisco professional and network security has never been more important.
Cisco CCNA Security Course Outline "Everyone has a different method/style of learning best. If learning via self-paced method, then I would highly recommend Train Signal’s Cisco CCNA materials..." - Marlon Deerr, Train Signal Student
Introduction - Welcome to Your CCNA Security Video Course!
Meet your instructor Chris Bryant and get started right way with exam preparation tips.
* About Your Instructor * Exam Prep Tips Video 1 Hackers – Their Motives and Methods
Learn about Hacker Roles and why they hack. Discover what your Network Security Goals should be, and how to implement Network Security Best Practices to achieve those goals to keep from suffering the consequences of ineffective network security.
* Why Do Hackers Hack? * General Network Security Goals * The Consequences of Ineffective Network Security * Where Network Attacks Originate From * Social Engineering Attacks * Trojan Horses and Privilege Escalation Attacks * Using Ping Sweeps and Port Scans on Your Own Network * Best Practices Video 2 Introduction to SDM (Security Device Manager)
Improve productivity, simplify router deployments, and troubleshoot complex connectivity issues using the Security Device Manager. Plus, launch, login, and tour SDM and discover some Real World SDM issues as you learn to manage your router away from the Command Line.
* Cisco's Security Device Manager (SDM) * Pre-installation Configuration * Installing SDM * Launching and Loading SDM * SDM Settings - User Preferences * SDM Configure Window * Additional Tasks Tab * SDM Monitor Window * SDM in Internet Explorer Problem Video 3 Authentication, Authorization, and Accounting (AAA)
Learn how Authentication works in AAA, what happens when you specify different devices used for Authentication, and discover commands used in Authentication, Authorization, and Accounting that will be useful in the real world and on the exam. Plus, configure TACAS+ and RADIUS security protocols.
* What is AAA? * TACAS+ vs. RADIUS * TACAS+ and RADIUS Configuration * Authentication Configuration * No Authentication Option * Telnet Login Problem * Real World Not About AAA Lists * Using AAA for Privileged EXEC Mode and PPP * Accounting * Authorization * Configuring AAA with SDM Video 4 Layer 2 Security
Learn how to prevent security threats like CAM Overflow attacks by configuring and implementing Port Security, Sticky Addresses, Lightweight Extensible Authentication Protocol (LEAP), and SPAN. Plus, discover the relationship between DHCP Snooping, Dynamic ARP Inspection, and IP Source Guard and learn to configure and operate Root Guard and BPDU Guard.
* Basic L2 Security Features * Cisco Password Rules Review * Preventing CAM Overflow Attacks with Port Security * Port Security * Configuring Port Security * Misconfiguring Port Security * Aging Time for Secure Addresses * Sticky Addresses * Configuring MAC Table Event Notification * Dot1x Port-Based Authentication * Cisco Lightweight Extensible Authentication Protocol (LEAP) * Extensible Authentiaction Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) * Local SPAN Configuration * Remote SPAN Configuration * Filtering Intra-VLAN Traffic * VLAN Access List (VACL) * Private VLAN * DHCP Snooping * Dynamic ARP Inspection * IP Source Guard * MAC Address Flooding Attacks * VLAN Hopping * Root Guard * BPDU Guard Video 5 Layer 3 Security
This is one of the most important videos in the course because of the volume of detailed information that you will use on the exam and in the real world. Learn about "Salting" your MD5 to make an encrypted password even stronger and discover how Network Time Protocol (NTP) will be important in your security deployment. Plus, learn to configure and use Superviews, Autosecure, Security Audits, and One-Step Lockdown via SDM to thwart ICMP based attacks, IP Spoofing, and Recon Attacks.
* Configuring Enable Password * Privileged Level Password vs. Privleged Level Secret * Encrypting Passwords * Strong Passwords vs. Weak Passwords * Creating and Testing Minimum Length Password Policy * ”Salting” your MD5 * Network Time Protocol (NTP) * Configuring NTP Master Time Source * Synchronizing System Clocks * Configuring Peering with NTP Peers Command * Other Clock Commands * Telnet and SSH * Creating Banners * Different Types of Network Attacks * Denial of Services (DoS) Attack and SYN Flooding Attack * TCP Intercept Defense * ICMP (Ping) Sweep, Port Scan and Port Sweep * Ping of Death vs. Invite of Death and Ping Floods * Smurf Attacks * Availability Attacks: Don't Forget the Physical Layer! * IP Spoofing * IP Source Routing * Packet Sniffers and Queries * Other Confidentiality Attacks * Password Attacks * Salami Attack * Other Network Attacks Types - Trust Exploitation * Superviews - Role-Based CLI Views * AutoSecure * One-Step Lockdown * Security Audit * NTP and SSH in SDM * Differences Between SDM and AutoSecure * SNMP * Logging * Viruses and Worms * Cisco IOS Logging Enhancements * Buffer Overflow * Cisco IOS Resilient Conofiguration and Login Enhancements * exec-timeout Command Video 6 The Intrusion Prevention System (IPS)
Learn the differences between Intrusion Detection (IDS) and Intrusion Prevention (IPS) and how they operate. Plus, discover the different approaches to identifying malicious traffic and learn to use NIPS, HIPS and Honeypots to stop it. We'll also configure your Intrusion Prevention System using the Security Device Manager (SDM) and we'll use the Command Line to verify this IPS configuration.
* Intrusion Detection (IDS) vs. Intrusion Prevention (IPS) * Signatures and Signature Types * NIPS and HIPS * Honeypots * Configuring IPS in SDM * Editing IPS Rules * Editing Global Settings * SDEE Message Logs * Viewing Signatures * Editing and Deleting Signatures * Verifying Your IPS Configuration Video 7 Firewalls
Learn to enable a Cisco router to act as a firewall using the Cisco IOS Firewall Set. Plus, discover concepts relatively new to Cisco like Zone-based Firewalls that are meant to phase out CBAC and the “ip inspect” command. We'll also configure and edit a firewall using the Security Device Manager's (SDM) Basic Firewall Wizard and we'll draw distinctions between the Basic Firewall Wizard and SDM's Advanced Firewall Wizard.
* Firewall Basics * Stateless and Stateful Firewalls * Application Layer Gateway (ALG) * The Cisco IOS Firewall Feature Set Components * Authentication Proxy * Plan for Firewall Success Then Succeed! * ACL Review * Extended ACL Review * Extended Access Control Lists * Real-World ACL Success Tips * Introduction to Turbo ACLs * CBAC and “ip inspect” command * Real-World Tips and Best Practices * TCP and UDP Generic Inspection * Deep Pocket Inspection (DPI) * Zone-Based Firewall Configuration * Class Maps and Policy Maps * Basic Zone Commands * Configuring Zone Pairs * Configuring Firewall with SDM's Basic Firewall Wizard * Editing Firewall with SDM * SDM's Advanced Firewall Wizard * Watch Your Directions - More Tips * ICMP Inspection * Final Note Video 8 Cryptography and Virtual Private Networks (VPNs)
Learn how Asymetric and Symetric Algorithms can be used to implement Cryptography Techniques that help encrypt clear text passwords. Plus, configure your own IKE policy using the Command Line and get your hands dirty by using the Security Device Manager (SDM) to configure Site-to-Site VPN and Generic Routing Encapsulation (GRE) over IPsec.
* Cryptography Techniques * Asymmetric and Symmetric Algorithms * RSA Algorithm * Diffie-Hellman (DH) * A Word or Two About SHA * What is VPN? * VPN Terminology and Theory * Introduction to PKI and the Certificate of Authority * Public Key Cryptography Standards (PKCS) * Internet Key Exchange (IKE) * Steps to Configure Site-to-Site VPN * Configuring IKE Policy Using Command Line * Policy Match Criteria * Crypto ACLs * Mirror Configuration * Creating Crypto Map * Using SDM to Configure Site-to-Site VPN * Generating Mirror in SDM * Testing Our Configuration * Verifying SDM Configuration Using Command Line * The Return of Generic Routing Encapsulation (GRE) Over IPSec * Using SDM to Configure GRE over IPSec Video 9 Introduction to Voice and SAN Security
You do not need to be an expert in Voice Networking or Storage Area Networking (SAN) to learn how to keep these types of networks secure. Learn the differences between FCAP and FCPAP, discover the details of LUN and LUN Masking, and delve deeper into VoIP (Voice Over IP). Whatever your experience level may be, this detailed overview of Voice and SAN Networking will provide you the insight you need to get into one of the fastest growing areas in the IT field.
* Voice Over IP Overview * Gateways and Gatekeepers * VoIP Protocols * Typical VoIP Attacks and Precautions * Introduction to Storage Area Networking (SAN) * SAN Transport Technologies and Protocols * SAN Security - LUNS and LUN Masking * SAN Zones * Virtual SANs (VSANs) * FCAP and FCPAP Video 10 Introduction to Cisco Network Solutions
This video will introduce you to Cisco Network Solutions including: ASA 5500, Cisco Self-Defending Network, Cisco Security Management Suite, and Cisco Security Agent. Plus, learn about the five phases of the Cisco SDLC (System Development Life Cycle) and discover the differences between Quantitative Risk Analysis and Qualitative Risk Analysis.
* System Development Life Cycle * Cisco SDLC Phase 1 - Initiation * Cisco SDLC Phase 2 - Acquisition and Development * Cisco SDLC Phase 3 - Implementation * Cisco SDLC Phase 4 - Operation and Maintenance * Cisco SDLC Final Phase - Disposition * Disaster Recover - Hot, Warm and Cold Sites * Risk Analysis - Quantitative and Qualitative * Cisco Self-Defending Network * Cisco Security Management Suite * IronPort * Cisco Security Agent * Cisco Security Agent Interceptors * Cisco ACS * “in-band” and “out of band”
Introduction Most networking professionals will never have to write custom TCP/IP code, but they will have to understand the key issues associated with planning, operating, evolving, and troubleshooting IP networks. Gilbert Held's TCP/IP Professional Reference focuses on precisely these issues. Held, who's authored dozens of networking books over the years, maintains a reputation for clarity (witness the online reviews of his recent work, such as Voice and Data Internetworking). In this book, he presents concise, useful introductions to the entire TCP/IP protocol suite and each component protocol, including ICMP, TCP, UDP, and others. Held identifies the key issues associated with network addressing, subnetting, and routing; then introduces key TCP/IP applications such as DNS, and diagnostic tools such as ping, traceroute, NSLOOKUP, and finger. There's also to-the-point coverage of securing TCP/IP hosts via access lists and firewalls.
Table Of Contents: Ch. 1 Overview 1 Ch. 2 The Protocol Suite 15 Ch. 3 Internet Governing Bodies and the Standards Process 25 Ch. 4 The Internet Protocol and Related Protocols 37 Ch. 5 The Transport Layer 81 Ch. 6 Applications and Built-in Diagnostic Tools 101 Ch. 7 Routing and Routing Protocols 121 Ch. 8 Security 141 Ch. 9 Emerging Technologies 163 App TCP/IP Protocol Reference Numbers 185 Index 231
Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. They allow for the precise routing of data across very complex worldwide internetworks. The rules for their format and use are governed by the Internet Engineering Task Force (IETF) of the The Internet SOCiety (ISOC). In response to the exponential increase in demand for new IP addresses, the IETF has finalized its revision on IP addressing as IP Version 6, also know as IPng (ng = Next Generation). Key hardware vendors such as Cisco and major Internet Service Providers such as America Online have already announced plans to migrate to IP Version 6. IP address allocation within an organization requires a lot of long-term planning. This timely publication addresses the administrator and engineer's need to know how IP 6 impacts their enterprise networks
* Ideal for companies planning a phased migration from IP 4 to IP 6 * Timely publication: The IETF standard was finalized in early 1999 and will begin to be implemented in late 1999/2000. The current IP Version 4 address set will be exhausted by 2003 * The book will focus on planning and configuring networks and devices for IP 6. Specifically, it will cover how to: * Increase the IP address size from 32 bits to 128 bits * Support more levels of addressing hierarchy * Support an increased number of addressable nodes * Support simpler auto-configuration of addresses * Improve the scalability of multicast routing by adding a "scope" field to multicast addresses * Use a new "anycast address" to send a packet to any one of a group of nodes
Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816), 3rd Edition
Interconnecting Cisco Network Devices, Part 2 (ICND2), is a Cisco®-authorized, self-paced learning tool for CCNA® foundation learning. This book provides you with the knowledge needed to install, operate, and troubleshoot a small to medium-size branch office enterprise network, including configuring several switches and routers, connecting to a WAN, and implementing network security.
In Interconnecting Cisco Network Devices, Part 2 (ICND2), you will study actual router and switch output to aid your understanding of how to configure these devices. Many notes, tips, and cautions are also spread throughout the book. Specific topics include constructing medium-size routed and switched networks, OSPF and EIGRP implementation, access control lists (ACL), address space management, and LAN extensions into a WAN. Chapter-ending review questions illustrate and help solidify the concepts presented in the book.
Interconnecting Cisco Network Devices, Part 1 (ICND1): CCNA Exam 640-802 and ICND1 Exam 640-822, 2nd Edition
Interconnecting Cisco Network Devices, Part 1 (ICND1), Second Edition, is a Cisco®-authorized, self-paced learning tool for CCENT™ and CCNA® foundation learning. This book provides you with the knowledge needed to configure Cisco switches and routers to operate in corporate internetworks. By reading this book, you will gain a thorough understanding of concepts and configuration procedures required to build a multiswitch, multirouter, and multigroup internetwork that uses LAN and WAN interfaces for the most commonly used routing and routed protocols.
In Interconnecting Cisco Network Devices, Part 1 (ICND1), you will study installation and configuration information that network administrators need to install and configure Cisco products. Specific topics include building a simple network, Ethernet LANs, wireless LANs (WLANs), LAN and WAN connections, and network management. Chapter-ending review questions illustrate and help solidify the concepts presented in the book.
Linux is the most important operating system on the Internet. It’s recognized everywhere as the cost-effective way to operate all kinds of servers. With the support of powerhouses like IBM, Dell, HP, and Sun, demand for Linux servers is growing. Ubuntu has quickly become one of the most popular distribution among Linux users, and the Ubuntu Certified Professional is the credential for administrators who want to prove their skills with this distribution. This “how to” course by VTC author Mike Jang, uses practical examples to demonstrate the skills tested by the UCP exam. To begin learning, simply click the links.
Welcome (02:24) T Ubuntu Certified Professional Curriculum (03:52) T System Requirements (03:47) T Ubuntu Community Ubuntu Releases & Derivatives (04:01) T The Ubuntu Support Infrastructure (02:34) T The Structure of Ubuntu Repositories (04:39) T Seeds & Architectures (04:55) T The Launchpad Platform (03:19) T Ubuntu Community Support (03:14) T Bugs & Solutions (03:39) T Review of Terms (04:21) T Installing Ubuntu Linux Prepare to Install (04:24) T The Graphical Installer (04:22) T The Text Installer (03:13) T Text Installation Partitioning (04:43) T Additional Installation Highlights (04:03) T Server Installation Highlights (03:12) T Hardware & Power Management Hardware Detection (04:59) SATA Disk Management (06:48) USB & Other Devices (02:40) Wireless Management (04:58) Modern Power Management (03:17) ACPI Files in the /proc/acpi Directory (04:19) More on ACPI Configuration (04:31) udev & Driver Manager (04:57) Package & Repository Management The Repository Configuration File (06:53) Use the dpkg & alien Commands (05:32) Understand the apt- Commands (06:09) More on the apt- Commands (07:00) When to Use Security Updates (03:00) Update with Graphical Tools (05:24) Manage with Synaptic & More (06:24) The GNOME Application Manager (02:41) Create a Local Repository Mirror (04:30) Printer Management Install CUPS - Add a Printer (06:44) Printer Management & Administrators (05:34) Printer Management Commands (04:57) An Overview of CUPS Configuration Files (07:04) Accepting & Rejecting Jobs (02:23) Manage Print Queues (05:13) Printer Logs (02:35) Localization & User Privileges Set Up a Locale (05:02) Add Language Packs (03:44) The Administrative Sudo (03:49) Custom /etc/sudoers (05:21) Add More Users from the Command Line (04:14) Add More Users with users-admin (05:41) Upstart & Landscape Management The Upstart Configuration Files pt. 1 (05:06) The Upstart Configuration Files pt. 2 (07:04) Upstart Control with initctl (03:54) Configure & Register on Landscape (05:53) What Landscape Sees (02:50) Network Interfaces Current Network Interface Config pt. 1 (03:16) Current Network Interface Config pt. 2 (05:13) Configure a DHCP Client (03:35) Network Configuration Files (04:41) Network Management from the Command Line (06:10) Network Shares & File Systems The NFS Kernel Server (02:57) Make Sure the NFS Server Works (04:03) Mount an NFS Share (02:54) Basic Samba Shares (07:44) The shares-admin Tool & NFS (04:40) The shares-admin Tool & Samba (04:36) The GNOME Desktop Environment The GNOME gconf Configuration Tool (03:52) GNOME Configuration Files (03:08) GNOME Configuration Commands (04:49) Custom Panels/Menus/Icons & More (07:13) X Server Concepts & Configuration Files (05:00) X Server Configuration Commands (04:11) Manage Screen Resolution & Refresh Rates (05:47) Font Configuration Files & Commands (05:06) The GNOME Display Manager (02:48) Custom GNOME Login Options (03:06) Evolution & Desktop Searches Review Email Protocols (03:50) Configure an Evolution Account (05:53) Integrate Evolution Exchange (02:49) Set Up an Evolution Email Filter (03:25) Configure the Tracker for Searches (05:24) More on the Tracker (03:38)
* Covering the most popular Linux shells (such as bash, ash, tcsh, ksh, korn, and zsh), this reference shows how to use commands to create scripts within each shell and demonstrates practical applications for shell scripts (including retrieving information from Web sites and sending automated reports via e-mail) * For each shell, the author discusses the commands available and explains how to use these commands to create scripts that can automate common functions and reports * Guides administrators through advanced projects for using shell scripts in real-world applications and features advanced topics such as using a database and Web programming
There's a lot to be said for going back to basics. Not only does this Bible give you a quick refresher on the structure of open-source Linux software, it also shows you how to bypass the hefty graphical user interface on Linux systems and start interacting the fast and efficient way—with command lines and automated scripts. You'll learn how to manage files on the filesystem, start and stop programs, use databases, even do Web programming—without a GUI—with this one-stop resource.
*Understand the Linux desktop and various command-line parameters *Learn filesystem navigation, file handling, and the basics of bash shell commands *Write shell scripts to automate routine functions and reports *Harness nesting loops and structured commands *Monitor programs, master file permissions, and make queries *Run scripts in background mode and schedule jobs *Use sed, gawk, and regular expressions *Explore all alternate shells, including ash, tcsh, ksh, korn, and zsh
What an amazing world we live in! Almost anything you can imagine can be researched, compared, admired, studied, and in many cases, bought, with the click of a mouse. The Internet has changed our lives, putting a world of opportunity before us. Unfortunately, it has also put a world of opportunity into the hands of those whose motives are less than honorable. A firewall, a piece of software or hardware that erects a barrier between your computer and those who might like to invade it, is one solution.
By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50 certification provides a vendor-neutral perspective for security officers, auditors, security professionals, site admistrators, and others concerned with the integrity of network infrastructures. Complete coverage of footprinting, trojans and backdoors, sniffers, viruses and worms, and hacking Novell and Linux exposes common vulnerabilities and reveals the tools and methods used by security professionals when implementing countermeasures.
If you are reading this courseware, it is quite possible that you realize the importance of information systems security. However, we would like to put forth our motive behind compiling a resource such as this one, and what you can gain from this course.
You might find yourself asking, why choose this course, when there are several out there. The truth is that there cannot be any single courseware that can address all the issues in a detailed manner. Moreover, the rate at which exploits/tools/methods are being discovered by the security community makes it difficult for anybody to cover it at one go.
This doesn’t mean that this course is inadequate in any way.
We have tried to cover all major domains in such a manner that the reader will be able to appreciate the way security has evolved over time; as well as gain insight into the fundamental workings relevant to each domain. It is a blend of academic and practical wisdom, supplemented with tools that the reader can readily access and obtain a hands-on experience. The emphasis is on gaining the know-how, and this explains the leaning towards free and accessible tools. You will read about some of the most widespread attacks seen; the popular tools used by attackers and how attacks have been carried out from ordinary resources.
You may also want to know “After this course, what?” This courseware is a resource material. Any penetration tester can tell you that there is no one straight methodology or sequence of steps that you can follow while auditing a client site. There is no ONE template that will meet all your needs. Your testing strategy will vary with client, basic information enumeration, firewall penetration or other domains, you will find something in this courseware that you can definitely use.
Finally, this is not the end! This courseware is to be considered as a ‘work-in-progress’, because we will be adding value to this courseware over time. You may find some aspects detailed, while others may find it brief. The yardstick that we have used in this respect is simple - “does the content help explain the point at hand?” This doesn’t mean that we would not love to hear from you regarding your viewpoints and suggestions. Do send us your feedback so that we can make this course a more useful one.
TABLE OF CONTENT: Module 01 - Introduction to Ethical Hacking Module 02 - Footprinting Module 03 - Scanning Module 04 - Enumeration Module 05 - System Hacking Module 06 - Trojans and Backdoors Module 07 - Sniffers Module 08 - Denial of Service Module 09 - Social Engineering Module 10 - Session Hijacking Module 11 - Hacking Web Servers Module 12 - Web Application Vulnerabilities Module 13 - Web Based Password Cracking Techniques Module 14 - SQL Injection Module 15 - Hacking Wireless Networks Module 16 - Viruses Module 17 - Novell Hacking Module 18 - Linux Hacking Module 19 - Evading IDS, Firewalls and Honeypots Module 20 - Buffer Overflows Module 21 - Cryptography
Exam 312-50 The EC-Council’s Certified Ethical Hacker has emerged as one of today’s most sought-after certifications. * This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks. * Written industry expert Kimberly Graves, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review.
The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you’ll need to score higher on the exam.
Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. The book also features MeasureUp’s innovative testing software, to help you drill and practice your way to higher scores.
The Cisco CCNA network associate certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN. This new curriculum includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. This new curriculum also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),VLANs, Ethernet, access control lists (ACLs)
The much-anticipated second edition of the bestselling book that details network security through the hacker's eye Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material. In this fascinating new edition, you'll discover: * The hacker's perspective on security holes in UNIX, Linux, and Windows networks * Over 170 new vulnerabilities and exploits * Advanced discovery techniques * A crash course in C for compiling hacker tools and vulnerability scanners * The top seventy-five hack attacks for UNIX and Windows * Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more * TigerSuite Professional 3.5 (full suite single license)
Master IUWNE 640-721 exam topics with the official study guide Assess your knowledge with chapter-opening quizzes Review key concepts with Exam Preparation Tasks Practice with realistic exam questions on the CD-ROM
CCNA Wireless Official Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the CCNA® Wireless IUWNE exam. Senior instructor Brandon Carroll shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
CCNA Wireless Official Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks sections help you drill on key concepts you must know thoroughly.
The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text and laying out a complete study plan for review.
Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.
CCNA Wireless Official Exam Certification Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.
Brandon James Carroll is one of the country’s leading instructors for Cisco security technologies, teaching classes that include the CCNA, CCNP®, CCSP® courses, a number of the CCVP® courses, as well as custom-developed courseware. In his eight years with Ascolta, Brandon has developed and taught many private Cisco courses for companies such as Boeing, Intel, and Cisco. He is a CCNA, CCNP, CCSP, and a certified Cisco instructor. Brandon is the author of Cisco Access Control Security.
Trainsignal 70-640 Windows Server 2008 Active Directory DVD1 , DVD2, DVD3
DVD1
Video 1 Introduction to the Course
Learn what's in the course, who you're instructor is, and what you can expect in the course. Key Topics: * About the Instructor and Train Signal * Overall Scope of the Course * What's Covered in this Course * The Globomantics Scenario * What We'll Build in this Course
Video 2 Basic Active Directory Terms
Get a foundation of what Active Directory is, what it can do, and why you want to use it in your network to make your life easier! Key Topics: * What is Active Directory? * AD Objects * What is DNS? * Forests, Domains, and OU’s
Video 3 The First Two Domain Controllers
Learn how to install Server 2008 from "bare metal", create a domain using Server 2008 by installing Active Directory Domain Services, and set up a second Domain Controller for redundancy. Key Topics: * Server 2008 Hardware Requirements & Editions * A Bare Metal Installation of Windows Server 2008 * Installation of Active Directory Domain Services (AD DS) and DNS * DCPromo * Can the servers talk? Setting up Replication on your Windows Servers
Video 4 Setting up Remote Desktop on Your Personal Vista Client
Real administrators manage a network sitting down. It's so much easier to play World of Warcraft and Halo that way. Learn how to set up Remote Desktop shortcuts on a Vista client so you don't have to pause your game to trek into the server room every time somebody needs a password reset. Key Topics: * The DC's Are Up and Running...Now What? * Why Remote Desktop is Just Great!
Video 5 Creating OU's, Users, Computers and Groups in Active Directory
Create Organizational Units to keep your Active Directory organized, making your IT life easier in the long term. Learn the secrets of creating a lot of users quickly and easily using scripts. *Bonus* Coach's Active Directory Toolbox File: Coach's Mass User Creation Script Builder!!!! Plus, a simple batch script to create single users all day long! Key Topics: * The DC's Are Up and Running...Now What? -- Part 2 * What's an OU again? * How About Some Users! - Create Domain Users in Windows Server 2008 * Give Me Some Computer Accounts! * The Difference Between OU's and Groups
Video 6 Setting Up Shared Folders, Drives and Printers
Create Shared Folders so users can easily get to stuff on your network. Share Network printers. Learn the arcane secrets of NTFS and Share level Permissions, and Delegation Security Filtering! Become a wizard at giving only the people you want to have access to stuff! Rule your IT Kingdom with an iron fist and fear or with a soft heart and love--you decide! * Setting Up a Member Server * Creating Shared Folders * NTFS and Share Level Permissions * Files and Folders Permissions * Mapping as Shared Network Drive * Creating and Sharing Printers
Video 7 Get Your Control Freak On: Group Policy Objects
Learn how to lock down your desktop machines with Group Policy. Keep users from screwing stuff up, installing World of Warcraft, and from stealing data by using USB drives! The power is yours! * What GPO's are and how they work * How you can set them- what objects do you set them on * How they get affected * Computer Vs. User * Locking down the Desktops
Video 8 How to Make Your Boss Mad and then Fix it Really Fast
When Group Policy Attacks! Does your boss insist on having absolute control over a personal laptop? Then buy our product and learn how to allow your boss absolute freedom over his/her personal machine so you can continually fix it, and keep your job forever! (Or until something higher-paying comes along!) Key Topics: * Reorganizing OUs * Enforce and Block Inheritance * Security Filtering
Video 9 Computer Policies and Preferences
Learn the magic of Loopback processing, what "hoteling" means, and how you can lockdown machines no matter who's using them! Key Topics: * The Computer Side of Group Policy * Setting Up Mapped Drives and other GP Preferences
Video 10 How to Install Software on a lot of Machines Without Getting Up From Your Desk
Do you want to be able to sit at your desk all day long and install software by just clicking your mouse? Then pick up this course and learn how to install, upgrade, and uninstall software and not even have to get your butt out of your nice cushy office chair! Key Topics: * Software Installation GPOs * GP Refresh Intervals
Video 11 What's My P@ssw0rd Again?
Are you kidding? You forgot your password again? Learn how to provide multiple password policies using Server 2008's brand new Fine Grained Password Policy Objects! That's right, you too can lessen the security of your network so your boss can use the name of his or her favorite horse as his/her password and not have to worry about all that security stuff! Key Topics: * Domain Level Policy * Create Fine Grained Password Policies with ADSI Edit * When to Reset Passwords and when not to
Video 12 Passing the Buck: Delegating Control of a Group
Feeling tired and overworked? Are you ready to let someone else do the busy work of resetting passwords and the like? Then you need Video 12! Pass off some of your responsibility to some other unsuspecting IT staffer and make them take the calls from your users! You'll have much more time to play Halo! Key Topics: * Delegation of Control Wizard - Pass the Buck on Resetting Passwords * Task Pad View - Creating a TaskPad for Easy Password Resets * Other Built-In Groups - Account Operators, Server Operators, Back Up Operators
Video 13 Creating Backup Solutions Before Stuff Blows Up
If you don't know how to create basic backups, there's a chance your network will go down in flames and there will be nothing you'll be able to do about it. Millions of dollars of lost data! Just think of the chaos that will reign if your boss can't find the annual TPS report! You need to watch this video and you never know; you might even become the hero, save the princess, and get a parade thrown in your honor! Key Topics: * Windows Server Backup * Wbadmin * Full Back up * System State Data * NTDSUTIL and IFM Creation
DVD2
Video 14 Preventing Problems: Changing up the FSMO's Give your network some flexibility by learning the secret of multiple Domain Controllers having different FSMO's! Key Topics: * Adding another Domain Controller using Install-From-Media (IFM) * Changing the FSMO PDC Emulator to a non-Global Catalog Domain Controller
Video 15 Defragging, Auditing and Monitoring Nobody likes doing maintenance, but Active Directory is like a car: if you don't change the oil in your car every 3000 or so miles, it will eventually blow up. But if you do, you can get a long life out of it. The same goes for Active Directory--if you do your maintenance and monitoring, it will live a long happy life, providing access for your users and keeping your network cruising right along! Key Topics: * Watching Your Active Directory Stuff * Your Monitoring Toolbox * Watch Who’s Doing What To Your Active Directory * Defragging Your Active Directory Database
Video 16 Adding a Child Domain by Creating a New Domain ControllerHey, it's time to expand! Learn how to create a new Child Domain for a new location so you can eventually pass off the responsibility for it to another victim--I mean administrator! Key Topics: • Adding a Site and Subnet • Creating the Child Domain • Making Sure Servers Can Talk to Servers in Other Locations
Video 17 Giving People Access to Stuff that's 790 Miles Away: Introducing Universal Groups and AGUDLP Users in Chicago need access to stuff in New York! What are we going to do? Using Universal Groups and a strategy called AGUDLP, we can provide access to stuff that's 790 miles away over the network! Key Topics: * Time For Some More Users! * The Types of Groups * Setting Up Your Groups for Access Between Domains * Making Sure Your Users Can Log In Anywhere in Your Enterprise
Video 18 Creating an RODC and DNS Server in Server Core Do you need a full Domain Controller for a branch office of 5 people? No, you really don't. Using Windows Server Core and the Read-Only Domain Controller feature in Windows Server 2008, you can create an great experience for your remote users that's more secure and cheaper to implement! Key Topics: * The Dallas OU and Site Structure * What is a Read Only Domain Controller? * Building a Read-Only Domain Controller (RODC)
Video 19 Recovering Lost OU's That new third shift IT guy we just hired deleted the entire New York Ops dept! What do we do? Since we were smart and created backups in Video 13, we can get back only the stuff we want using NTDSUTIL. There will be no need to recreate User Accounts -- but tell the boss that it'll take hours and hours to fix the problem, and then you can spend the time that you were going to take up recreating those OU's and Accounts to play a little Bejeweled. Key Topics: * Okay, Who Killed Off The Ops Department? * The Two Types of Restorations * Use Windows Server Backup to do a Non-Authoritative Restoration * Use NTDSUTIL and WBADMIN to do an Authoritative Restoration * How to Put Resurrected Users Back Into Groups Using Backlinks
Video 20 What Do You Do When Your Domain Controllers Crash?!? It is inevitable. You will eventually face a cataclysmic meltdown of a Domain Controller. If you've applied the principles in the previous videos, restoring and recreated DC's doesn't have to be tough. Coach will show you how! Key Topics: * Seizing Operations Masters for Quick Restoration of Functionality * Possible Solutions for Restoring Domain Controllers
Video 21 Getting Your Windows Server 2003 Domain Controllers Upgraded to Windows Server 2008 So what about all those Server 2003 machines out there? In this video you'll learn a little secret to upgrading your DC's to Server 2008, and it won't take much time at all. Key Topics: * Advantages of the Server 2008 Domain Functional Level * Upgrade Windows Server 2003 to Windows Server 2008
Video 22 Auditing and Monitoring AD In this video you'll learn how to connect two Active Directory Forests together. There's two options: Active Directory Federation Services or Trusts? Which one will it be? Which option is easiest? You have to watch to find out! Key Topics: * Tokyo is now a Server 2008 network--so now what? * Our Two Options To Connect Tokyo and New York * What You Need for Active Directory Federation Services * What You Need for a Trust * The Globomantics/Verde Petra Solution: Trusts
Video 23 Certification: It's Really Not That Scary Are you thinking about taking the 70-640, Configuring Windows Server 2008 Active Directory Exam so you too can get a shiny new Microsoft Certified Technology Specialist (MCTS) in Active Directory, Configuring? If so, you'll want to watch this video to know how to prepare for the big day. PLUS: Coach shares his secrets to passing the exams! Key Topics: * The New Generation of Certifications for Server 2008 * The Upgrade Paths for MCSA’s/MCSE’s * How to Sign Up for a Microsoft Exam * 70-640 Exam Prep Tips
Video 24 Additional DNS Training Without DNS, your Domain Controllers are really expensive paperweights. In this exam prep video, you'll pick up some additional vocabulary and core concepts of DNS.
Video 25 Active Directory Certificate Services 101 Now that Certificate Services has stronger integration with Active Directory, it's now on the 70-640 exam. This exam prep video will give you a quick foundation and the important jargon for Certificate Services.
Video 26 Lightweight Directory Services 101 In this exam prep video, you'll learn about the AD LDS Role, and why you might need it if you have network applications that require LDAP.
Video 27 Rights Management Services 101 In our final exam prep video for this series, you'll learn about a new Role in Server 2008 that allows you to lock down the data in your network in an easy to implement fashion. Make the users do the work!
DVD3
Extras/Additional Content DVD DISK - Transcender Video, iPod files, MP3 files, WMV files, course outline.
27 iPod video files to watch Train Signal on the go! A popular request amongst our students who wish to study while they commute (i.e. train, plane, bus). These 320x240 M4V files are compressed versions of the original course, and play on any iPod that supports video. Also great for reviewing and refreshing your mind "on the job."
27 MP3 audio files to listen to Train Signal anytime, anywhere. Some of our students have requested this option. Now, you can listen in the car or while working out. Our MP3 files can be burnt to a CD or copied to a portable device.
Instructor Notes – This PDF document, which can be printed out, contains the slides used by the instructor throughout the videos. This document allows the user a quick easy reference to the instructor's notes on the slides, and provides a place to make additional notes.
Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
Dameon Welch-Abernathy earned fame among administrators of FireWall-1 for his thorough and highly detailed Web site about Check Point’s flagship security product. The site should remain on those administrators’ hot lists, but they’ll want to absorb the copious knowledge in Welch-Abernathy’s Essential Check Point FireWall-1 before delving into his late-breaking online material. This book is fantastic. It’s by far the best book about FireWall-1, exceeding in quality even Check Point’s own manuals for administrators of its product. This is the book you need to have on hand as you learn to use what’s widely regarded as the best firewall software on the market. The author, known on his site as PhoneBoy, explains FireWall-1 with clarity, depth, and eminent practicality.
Welch-Abernathy’s presentation style is characterized by conciseness; practically every word and illustration he’s included advances his goal of explaining how to administer the software. Once in a while, he’ll go so far as to declare something self-explanatory and therefore not document it. This is risky–it’s hard to predict what a given reader will find intuitive–but he’s done this sparingly. The author’s coverage of virtual private networks (VPNs) is particularly praiseworthy. By following his lead, you’ll be able to bring up secure links among sites, and understand why the system works. Whether you’re reading cover-to-cover in order to learn as much as possible, or using the index to locate the problem-solving trick you need, this book ranks among the best. –David Wall
Topics covered: Check Point FireWall-1 for administrators, including those administrators with responsibility for designing and installing a firewall system. Rule design and implementation, logging, and authentication get attention, and coverage of network address translation (NAT) and virtual private networks (VPNs) is outstanding. There’s coverage of SecuRemote and Secure Client, too.
Book Info Covers the essentials of Check Point FireWall-1. Each chapter discusses a major feature of the product or a specific topic that will help you to plan for your FireWall-1 installation. Softcover.
CCSE NG: Check Point Certified Security Expert Study Guide
Product Description Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management II NG exam, 156-310. Written by two Check Point security experts who know exactly what it takes to pass the test, this Study Guide provides: * Assessment testing to focus and direct your studies * In-depth coverage of official exam objectives * Hundreds of challenging practice questions, in the book and on the CD Authoritative coverage of all exam objectives, including: * Installing and configuring VPN-1/FireWall-1 Gateway * Administering post-installation procedures * Configuring user tracking * Using the VPN-1 SecureClient packaging tool * Configuring an HTTP, CVP, and TCP security server * Setting up a logical server for load balancing of HTTP traffic * Configuring and testing VPN-1 SecuRemote and VPN-1 SecureClient * Setting up VPN desktop policies and use Security Configuration Verification * Enabling Java blocking, URL filtering and anti-virus checking * Establishing trust relationships with digital certificates
From the Back Cover Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management II NG exam, 156-310. Written by two Check Point security experts who know exactly what it takes to pass the test, this Study Guide provides:
Assessment testing to focus and direct your studies
In-depth coverage of official exam objectives
Hundreds of challenging practice questions, in the book and on the CD
Authoritative coverage of all exam objectives, including:
Installing and configuring VPN-1/FireWall-1 Gateway
Administering post-installation procedures
Configuring user tracking
Using the VPN-1 SecureClient packaging tool
Configuring an HTTP, CVP, and TCP security server
Setting up a logical server for load balancing of HTTP traffic
Configuring and testing VPN-1 SecuRemote and VPN-1 SecureClient
Setting up VPN desktop policies and use Security Configuration Verification
Enabling Java blocking, URL filtering and anti-virus checking
Establishing trust relationships with digital certificates
CCSA NG: Check Point Certified Security Administrator Study Guide: Exam 156-210 (VPN-1/FireWall-1, Management I NG)
Product Description Heres the book you need to prepare for Check Points VPN1/FireWall1 Management II NG exam, 156310. Written by two Check Point security experts who know exactly what it takes to pass the test, this Study Guide provides:
Assessment testing to focus and direct your studies
Indepth coverage of official exam objectives
Hundreds of challenging practice questions, in the book and on the CD
Authoritative coverage of all exam objectives, including:
Installing and configuring VPN1/FireWall1 Gateway
Administering postinstallation procedures
Configuring user tracking
Using the VPN1 SecureClient packaging tool
Configuring an HTTP, CVP, and TCP security server
Setting up a logical server for load balancing of HTTP traffic
Configuring and testing VPN1 SecuRemote and VPN1 SecureClient
Setting up VPN desktop policies and use Security Configuration Verification
Enabling Java blocking, URL filtering and antivirus checking
Establishing trust relationships with digital certificates
Note: CDROM/DVD and other supplementary materials are not included as part of eBook file.
Synopsis Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management II NG exam, 156-310. Written by two Check Point security experts who know exactly what it takes to pass the test, this Study Guide provides: assessment testing to focus and direct your studies; in-depth coverage of official exam objectives; and hundreds of challenging practice questions, in the book and on the CD. This book presents an authoritative coverage of all exam objectives, including: installing and configuring VPN-1/FireWall-1 Gateway; administering post-installation procedures; configuring user tracking; using the VPN-1 SecureClient packaging tool; configuring an HTTP, CVP, and TCP security server; setting up a logical server for load balancing of HTTP traffic; configuring and testing VPN-1 SecuRemote and VPN-1 SecureClient; setting up VPN desktop policies and use Security Configuration Verification; enabling Java blocking, URL filtering and anti-virus checking; and establishing trust relationships with digital certificates
Systems administrators, Security Managers, Network Engineers, people who want to obtain the Check Point Certified Security Administrator NGX certification
Prerequisites
Basic networking knowledge, knowledge of Windows Server and/or UNIX, experience with TCP/IP and the Internet
Course aim
To recognize basic security policy components and their functions, rule types and rule bases, and use SmartDashboard to create a basic security policy
Course incorporates Test, hands-on exercise
Learning Objectives
To recognize the function and components of basic security policies, and to configure objects, anti-spoofing, and multicasting as part of a basic security policy To recognize rule types and how Check Point NGX enforces rule bases, and create the rule base of a basic security policy