donandy2005

ENSA Training - EC-Council Network Security Administrator Tr

Mar 7th, 2012
471
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 35.88 KB | None | 0 0
  1. ENSA Training - EC-Council Network Security Administrator Training
  2.  
  3. This training goes into the network security in defensive view. The ENSA training program has been created to provide basic skills required to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization's data and information. Individuals will instructed on how to evaluate network and Internet security design and issues, and how to implement successful firewall strategies and security policies. Additionally, you will be instructed on how to expose system and network vulnerabilities along with defending against them. This course prepares you for EC-Council Network Security Administrator examination 312-38. This course is a prerequisite for the CEH program.
  4.  
  5. Logical Security has invited the best security trainers in the industry assisting us in developing the ultimate training and examination certification program which includes everything you will need to fully prepare for and pass your certification examinations.
  6.  
  7.  
  8.  
  9. Kenneth Mayer, CCSI, MCT, CCNT, CCNP, CCDA
  10. Ken started his career in computer technology in 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS. Ken is also a Microsoft Certified Trainer and a Certified Ethical Hacker (EC Council) certified trainer and consultant.
  11. Course Features
  12. Main Menu
  13. Move through hours of in-depth content, quickly and easily, due to the efficient and organized structure.
  14. PowerPoint
  15. Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts, definitions, graphs, and more.
  16. Exclusive Learning Zone
  17. Train around the clock, around the world. Our certified online instructors are located at global support centers in the U.S., U.K., Australia, and Singapore to provide real-time answers to technology and soft-skill-related questions 24x7. This means access to a live subject matter expert no matter where you are, day or night. This level of student/instructor interaction provides real-time training specific support and extends training beyond content and instructor-led solutions by providing flexibility to accommodate individual needs and schedules.
  18. Controls
  19. Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.
  20. Full-Motion Video
  21. All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.
  22. Study Guides
  23. Printable study guides for the entire course are available. This allows all material to be viewed, reviewed, and printed for viewing at a later date.
  24. Review Exercises
  25. Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.
  26. Resume
  27. All courses are resumed to where you left off last session, allowing you to learn when it is convenient for you without the hassle of remembering where you were.
  28. Live Demonstrations
  29. Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing it on screen in front of them. In this format it gives the user the power to see things done by a professional in the intended environment as many times as they would like.
  30.  
  31. Logical Security computer-based training is a cost-effective method that meets the critical demands of computer users. Experience our expert-led computer training courses in a comfortable and convenient environment. You get the feel of a computer training school delivered through flexible and familiar technology.
  32.  
  33. Training comes to life with our full-motion video, challenging labs, critical assessment and real-world insight from experts with vast experience in the subject matter. Engage in dynamic learning where multiple senses help reinforce learning concepts. See the steps, hear the explanations, then put your skills to work. Our proven methodology provides an unequaled training experience with exceptional results.
  34.  
  35. Choosing Logical Security's training with our expert-created study guides and interactive labs will result in an engaging learning experience. You will find that Logical Security's training is second to none. Logical Security alone is the best site to offer the equivalent to an actual Microsoft training. Distinguish your knowledge. Enhance your career.
  36.  
  37. Module 1 - Fundamentals of the Network
  38.  
  39. Key Elements of a Network
  40. Nodes
  41. The Network Backbone
  42. Segments
  43. Subnets
  44. Logical Elements of a Network
  45. IP Addresses
  46. IP Address Space
  47. Assignment of IP Addresses
  48. Prefix Based Addressing
  49. Pre Interface Based Assignment
  50. Virtual Addresses
  51. Dynamic Addressing
  52. Dynamically Assigning IP Addresses
  53. Static Addressing
  54. Assigning Static IP Addresses
  55. Demo - Configuring IP Addresses
  56. Domain Name System
  57. Domain Names
  58. Creating a New Domain Name
  59. Components of DNS
  60. Name Servers
  61. Resolver
  62. Securing DNS Services
  63. Demo - DNS
  64. Gateways
  65. Data Gateway
  66. Multimedia Gateway
  67. Home Control Gateway
  68. Types of Network Media
  69. Types of Network Media: Asynchronous vs. Synchronous
  70. Wired Media or Bounded Network Media
  71. Twisted Pair Cable
  72. Shielded Twisted Pair
  73. Unshielded Twisted Pair
  74. Coaxial Cable or Copper Cable
  75. Fiber-Optic Cable
  76. Plenum and PVC Cable
  77. Wireless Transmission
  78. Infrared Transmission
  79. Microwave Transmission
  80. Satellite Transmission
  81. Public Switched Network (PSN)
  82. Emanations Security and Line of Sight
  83. Radio Frequency
  84. Media Access Methods
  85. Multiplexed Media Access
  86. Time Domain Multiplexing (TDM)
  87. Frequency Division Multiplexing (FDM)
  88. Token-Based Media Access
  89. Carrier Sense Multiple Access/Collision Detection (CSMA/CD)
  90. Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)
  91. Contention Domains
  92. Automated Information Systems (AIS)
  93. Input, Output, Central Processing Unit (CPU)
  94. Memory
  95. Critical Information Characteristics
  96. Operations Security (OPSEC)
  97. INFOSEC and OPSEC Interdependency
  98. Object Reuse (Computer Security)
  99. Optical Remanence
  100. Magnetic Remanence
  101. Transmission Modes
  102. Simplex Transmission
  103. Half Duplex Transmission
  104. Full Duplex Transmission
  105. Types of Transmission
  106. Serial Data Transmission
  107. Parallel Data Transmission
  108. Unicast Transmission
  109. Multicast Transmission
  110. Logical Network Classification
  111. Client Server Networking
  112. Peer-to-Peer Networking
  113. Mixed Mode Networking
  114. Network Topology
  115. Network Topologies
  116. Sharing of Data
  117. Sharing of Devices
  118. File Servers
  119. Bus Topology
  120. Linear Bus
  121. Distributed Bus
  122. Star Topology
  123. Star Wired Ring Topology
  124. Mesh Topology
  125. Ring Topology
  126. Tree Topology
  127. Hybrid Topology
  128. Classifying the Networks
  129. Physical Network Classification
  130. Network Equipment
  131. Network Interface Cards (NICs)
  132. Access Points and Switches
  133. Concentrators/Hub
  134. Modem
  135. Network Equipment: Asynchronous vs. Synchronous
  136. Router
  137. Brouter
  138. Bridge
  139. ISDN Terminal Adapters
  140. Repeaters
  141. Multiplexer
  142. Gateway
  143. Other Network Devices
  144. Review
  145.  
  146. Module 2 - Network Protocols
  147.  
  148. Introduction to Network Protocols
  149. Common Protocol Numbers
  150. Internet Protocol (IP)
  151. Internet Protocol: Attacks and Countermeasures
  152. Implementing Network Protocols
  153. Network Classes
  154. Application Layer: TELNET
  155. Implementing Application Layer Protocols
  156. BOOT Strap Protocol (BOOTP)
  157. Dynamic Host Configuration Protocol (DHCP)
  158. Data Link Switching Client Access Protocol (DCAP)
  159. DCAP Client/Server Model
  160. Domain Name System (Service) Protocol (DNS)
  161. File Transfer Protocol (FTP)
  162. Trivial File Transfer Protocol (TFTP)
  163. FTP, TFTP Vulnerabilities
  164. Network Time Protocol (NTP)
  165. Network News Transfer Protocol (NNTP)
  166. Simple Network Management Protocol (SNMP)
  167. Internet Relay Chat Protocol (IRCP)
  168. Service Location Protocol (SLP)
  169. Types of Messages
  170. Hyper Text Transfer Protocol (HTTP)
  171. Hyper Text Transfer Protocol Secure (HTTPS)
  172. Demo - Network Protocols
  173. Implementing Presentation Layer Protocols
  174. Implementing Session Layer Protocol
  175. Implementing Transport Layer Protocols
  176. Transmission Control Protocol (TCP)
  177. User Datagram Protocol (UDP)
  178. TCP, UDP: Attacks and Countermeasures
  179. Reliable Data Protocol (RDP)
  180. Implementing Network Layer Protocols
  181. Routing Protocols
  182. Border Gateway Protocol (BGP)
  183. Internet Control Message Protocol (ICMP)
  184. ICMP Message Structure
  185. TYPES Defined
  186. Internet Group Management Protocol (IGMP)
  187. IGMP
  188. ICMP Router Discovery Protocol (IRDP)
  189. Mobile Support Protocol for IP
  190. Next Hop Resolution Protocol (NHRP)
  191. Open Shortest Path First (OSPF) Protocol
  192. Demo - OSPF
  193. Routing Information Protocol (RIP)
  194. Multicasting Protocols
  195. The NetBEUI Protocol
  196. Remote Authentication Dial-In User Service Protocol (RADIUS)
  197. Voice Over Internet Protocol (VoIP)
  198. VoIP Implementation Types
  199. Implementing Data Link Layer Protocols
  200. Address Resolution Protocol (ARP)
  201. Reverse Address Resolution Protocol (RARP)
  202. Network Address Resolution Protocol (NARP)
  203. Review
  204.  
  205. Module 3 - Protocol Analysis
  206.  
  207. TCP/IP Protocol Suite
  208. TCP/IP: Network Interface Layer
  209. TCP/IP: Internet Layer
  210. TCP/IP: Transport Layer
  211. TCP/IP: Application Layer
  212. Acknowledgement
  213. Windowing
  214. Positive Acknowledgement and Retransmission
  215. Demo - Protocol Analyzer
  216. TCP Header Format
  217. Algorithms in TCP
  218. TCP Checksum Calculation
  219. Performance Estimation in TCP
  220. Problems Related to TCP
  221. Internet Protocol (IP)
  222. IP Header Format
  223. IP Datagram
  224. Encapsulating Security Payload (ESP)
  225. Modes in ESP
  226. eNotes: Modes in ESP
  227. Demo - Headers
  228. IPv6
  229. IPv6 Header Format
  230. Internet Protocol v4 Addressing
  231. eNotes: Internet Protocol v4 Addressing
  232. Packet Tunneling
  233. IP Multicasting
  234. Hop By Hop Option
  235. Review
  236.  
  237. Module 4 - Hardening Physical Security
  238.  
  239. Physical Security
  240. Need for Physical Security
  241. Internet Security
  242. Factors Affecting Physical Security
  243. Types of Attackers
  244. Physical Security Threats
  245. Nature / Environment Threats
  246. Man-Made Threats
  247. Dumpster Diving
  248. Premise Security
  249. Office Security
  250. Reception Area
  251. Authenticating Individuals
  252. Smart Cards
  253. Physical Security Checklist: Proximity Card
  254. Biometrics
  255. Fingerprint Verification
  256. Hand Geometric
  257. Voice Recognition
  258. Retina Scanning
  259. Iris Scanning
  260. Facial Recognition
  261. Workplace Security
  262. Access Authorization
  263. System Maintenance Personnel
  264. Contractors
  265. Desktop Security
  266. Laptop Theft: Countermeasures
  267. Laptop Security: Information Security Countermeasures
  268. Server Security
  269. Securing Backup Devices
  270. Challenges in Ensuring Physical Security
  271. Physical Security Countermeasures
  272. Locks and Keys
  273. Uninterruptible Power Supplies
  274. Mantrap
  275. Physical Security Checklist
  276. Review
  277.  
  278. Module 5 - Network Security
  279.  
  280. Overview of Network Security
  281. The Security, Functionality, and Ease of Use Triangle
  282. The Need for Security
  283. Goals of Network Security
  284. Security Awareness
  285. Functions of Network Security Administrator
  286. Demo - Threat Assessment
  287. Administrative Security Procedural Controls
  288. Demo - Sanitizing Media
  289. Demo - Strong Passwords
  290. Documentation, Logs and Journals
  291. Functions of Information Security (INFOSEC) Officer
  292. Security Office and Senior Management
  293. System Manager and System Staff
  294. Functions of the Audit Office
  295. Network Security: Public vs. Private and Dial-up vs. Dedicated
  296. Network Security
  297. Transmission Security
  298. Legal Elements
  299. Countermeasures: Cover and Deception
  300. Reporting Security Violations
  301. Review
  302.  
  303. Module 6 - Security Policy
  304.  
  305. Overview of Security Policy
  306. Concept of Security Policy
  307. Key Elements of Security Policy
  308. Conducting Security Awareness Programs
  309. Defining the Purpose and Goals of Security Policy
  310. Classification Systems
  311. Security Framework
  312. Role of Security Policy
  313. Classification of Security Policy
  314. Design of Security Policy
  315. Contents of Security Policy
  316. Privacy and Confidentiality
  317. Security Levels
  318. Separation of Duties, Dual Controls, Job Rotation
  319. Least Privilege
  320. Security Organization and Policy Development
  321. Configuring of Security Policy
  322. Implementing Security Policies
  323. Incident Handling and Escalation Procedures
  324. Understanding Assets
  325. Development
  326. Demonstration and Validation
  327. Implementation
  328. Security (e.g. Certification and Accreditation)
  329. Operations and Maintenance (e.g., Configuration Management)
  330. Presenting and Reviewing the Process
  331. Points to Remember While Writing a Security Policy
  332. Review
  333.  
  334. Module 7 - IEEE Standards
  335.  
  336. 802 - Overview and Architecture
  337. 802.1 - Bridging and Management
  338. eNotes: Bridging and Management
  339. Demo - Switch Operation
  340. 802.2 - Logical Link Control (LLC)
  341. 802.3 - CSMA/CD (Ethernet)
  342. eNotes: 802.3 - CSMA/CD (Ethernet)
  343. IEEE 802.5 - Token Ring Passing
  344. IEEE 802.11 - Wireless LAN (WLAN)
  345. Wireless Networking Standards
  346. 802.1X
  347. 802.11 (Wi-Fi Standard)
  348. 802.11 Architecture
  349. 802.11a
  350. 802.11b
  351. 802.11g
  352. 802.11i
  353. 802.11n
  354. IEEE 802.15 Wireless Personal Area Network: Bluetooth
  355. 802.16
  356. Wi-MAX
  357. Review
  358.  
  359. Module 8 - Network Security Threats
  360.  
  361. Defining Terms: Vulnerability, Threats and Attacks
  362. Types of Attacks
  363. Classification of Hackers
  364. Network Attack Techniques: Spamming
  365. Network Attack Techniques: Revealing Hidden Passwords
  366. Network Attack Techniques: War Driving, War Chalking and War Flying
  367. Network Attack Techniques: Wiretapping
  368. Network Attack Techniques: Scanning
  369. Types of Scanning
  370. Demo - Network Scanning
  371. Network Attack Techniques: Sniffing
  372. Types of Sniffing
  373. Demo - Sniffing
  374. Network Attack Techniques: Reconnaissance
  375. Network Attack Techniques: Social Engineering
  376. Common Vulnerabilities and Exposures (CVE)
  377. Threat: Trojan
  378. Threat: Virus
  379. Threat: Worm
  380. Logic Bomb
  381. Threat: Eavesdropping
  382. Threat: Phishing
  383. Attack: Smurfing
  384. Attack: Rootkit
  385. Man in the Middle Attack
  386. eNotes: Man in the Middle Attack
  387. Demo - Man-in-the-Middle
  388. Denial of Service (DoS) Attack
  389. Distributed Denial of Service Attack (DDoS)
  390. Buffer Overflow Attack
  391. Zero-Day Attack
  392. Password Attacks
  393. Spoofing Attack
  394. Session Hijacking
  395. Attack: Web Page Defacement
  396. Recording Keystrokes or Keystroke Loggers
  397. Attack: Cracking Encrypted Passwords
  398. Cain and Abel Tool
  399. Attack: SQL Injection
  400. Hiding Evidence of an Attack
  401. Network Scanning Tools
  402. Netstat Tool
  403. Nmap Scanning Tool
  404. Review
  405.  
  406. Module 9 - Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
  407.  
  408. Understanding Intrusion Detection Concepts
  409. Intrusion Detection Concept
  410. IDS Concept: Architecture
  411. IDS Concept: Monitoring Strategies
  412. IDS Concept: Analysis Type
  413. IDS Concept: Timing Analysis
  414. IDS Concept: Goals of IDS
  415. Choosing an IDS for an Organization
  416. Characteristics of IDS
  417. Identifying the Importance of IDS
  418. Understanding the Types of IDS
  419. Network-Based IDS (NIDS)
  420. NIDS Architecture
  421. Traditional Sensor-Based Architecture
  422. Distributed Network Node
  423. Network-Based Detection
  424. Host-Based IDS (HIDS)
  425. HIDS Architecture
  426. HIDS Operational Concept
  427. Host-Based Detection
  428. Network-Based IDS Vs Host-Based IDS
  429. Distributed IDS: Introduction and Advantages
  430. Components of Distributed IDS
  431. Protocol Intrusion Detection System
  432. Network Behavior Analysis (NBA)
  433. Unified Threat Management (UTM)
  434. Deployment IDS
  435. Types of Signatures: Network Signatures
  436. Types of Signatures: Host-Based Signatures
  437. Types of Signatures: Compound Signatures
  438. True/False-Positive/Negative
  439. Major Methods of Operation
  440. Intrusion Prevention System
  441. Intrusion Prevention Strategies
  442. IPS Deployment Risks
  443. Information Flow in IDS and IPS
  444. eNotes: Information Flow in IDS and IPS
  445. IDS and IPS
  446. Review
  447.  
  448. Module 10 - Firewalls
  449.  
  450. Firewalls: Introduction
  451. Security Features
  452. Multiple Components of a Firewall
  453. Firewall Operations
  454. Software Firewall
  455. Demo - Software Firewall
  456. Hardware Firewall
  457. Types of Firewalls: IP Packet Filter Firewall
  458. Types of Firewall: Circuit Level Gateway
  459. Types of Firewall: Application Level Firewall
  460. Types of Firewalls: Network Level Firewalls
  461. Firewall Features
  462. Establishing Rules and Restrictions for Your Firewall
  463. Firewall Configuration Strategies
  464. Scalability
  465. Firewall Architecture: Dual Homed Host Architecture
  466. Firewall Architecture: Screened Host Architecture
  467. Firewall Architecture: Screened Subnet Architecture
  468. Handling Threats and Security Tasks
  469. Centralization and Documentation
  470. Multi-Layer Firewall Protection
  471. Firewall Deployment Strategies: Screened Host
  472. Two Routers with One Firewall
  473. DMZ Screened Subnet
  474. Figure: DMZ Screened Subnet
  475. Multi Firewall DMZ
  476. Multi Firewall DMZ: Two Firewalls, One DMZ
  477. Multiple Firewall DMZs: Two Firewalls, Two DMZs
  478. Screening Router
  479. Dual Homed Host
  480. Specialty Firewalls and Reverse Firewalls
  481. Advantages of Using Firewalls
  482. Disadvantages of Using Firewalls
  483. Threats: Firewalking
  484. Threats: Banner Grabbing
  485. Limitations of Firewalls
  486. Firewall Log Analysis
  487. Firewall Tester: Firewalk
  488. Review
  489.  
  490. Module 11 - Packet Filtering and Proxy Server
  491.  
  492. Application Layer Gateway
  493. Network Address Translation
  494. Demo - NAT
  495. Packet Filtering
  496. Approaches to Packet Filtering
  497. Packet Sequencing
  498. Packet Prioritization
  499. Packet Fragmentation
  500. Analyzing Packet Fragmentation
  501. Signature Analysis
  502. Stateful Packet Filtering
  503. Stateless Packet Filtering
  504. Demo - Packet Filters
  505. Dynamic Packet Filtering
  506. Advantages of Filtering
  507. Disadvantages of Filtering
  508. Transmission Control Protocol (TCP)
  509. TCP: URG Flag
  510. TCP: ACK Flag
  511. TCP: PSH Flag
  512. TCP: RST Flag
  513. TCP: SYN Flag
  514. TCP: FIN Flag
  515. eNotes: TCP Three Way Handshake
  516. User Datagram Protocol (UDP)
  517. Review
  518.  
  519. Module 12 - Bastion Host and Honeypots
  520.  
  521. Bastion Host and Honeypots
  522. Building Honeypots
  523. Value of Honeypot
  524. Production Honeypot
  525. Research Honeypot
  526. Categorizing the Honeypots Based on Levels of Interaction
  527. Low-Interaction Honeypot
  528. Medium-Interaction Honeypot
  529. High-Interaction Honeypot
  530. Uses of Honeypot
  531. Uses of Honeypot: Preventing Attacks
  532. Uses of Honeypot: Detecting Attacks
  533. Uses of Honeypot: Responding to Attacks
  534. How to Create a Homemade Honeypot
  535. Port-Monitoring Homemade Honeypots
  536. Demo - Honeypots
  537. Jailed Environment Homemade Honeypots
  538. Mantrap
  539. Advantages and Disadvantages of Honeypots
  540. Legal Issues Related to Honeypots
  541. Building a Honeynet
  542. Architecture of Honeynet
  543. Review
  544.  
  545.  
  546.  
  547.  
  548.  
  549. Module 13 - Troubleshooting Network
  550.  
  551. Introduction to Troubleshooting
  552. Troubleshooting Strategy
  553. Recognizing Symptoms
  554. Analyzing Symptoms
  555. Understanding the Problem
  556. System Monitoring Tools
  557. Network Monitor
  558. Demo - Monitoring Network Traffic
  559. Testing the Cause of the Problem
  560. Solving the Problem
  561. Troubleshooting Network Devices
  562. Windows PC Network Interface Card
  563. Demo - Network Troubleshooting
  564. Troubleshooting RF
  565. Diagnosing Gateway
  566. Troubleshooting Hubs and Switches
  567. Troubleshooting Network Slowdowns
  568. IP Conflicts
  569. Bad NICs
  570. DNS Errors
  571. Insufficient Bandwidth
  572. Troubleshooting Wireless Devices
  573. Checking the LED Indicators
  574. Checking Basic Setting
  575. Device Manager
  576. Demo - Device Manager
  577. Troubleshooting Network Communication
  578. Identifying Communication Problems
  579. Using Ping
  580. Variations in the PING Utility
  581. Using TraceRT
  582. eNotes: TraceRT
  583. Network Adapter Troubleshooting
  584. How to Isolate Networking Problems (Windows XP): Network Adapter
  585. Network Adapter is Unplugged
  586. Network Adapter Has Limited or No Connectivity
  587. Network Adapter is Connected, But You Can't Reach the Internet
  588. How to Overcome the Connectivity Problem
  589. Causes of Connectivity Problems
  590. Troubleshooting Physical Problems
  591. Troubleshooting Link Status
  592. Performance Measurement Tool
  593. TCP/IP Troubleshooting Utilities
  594. Troubleshooting with Ping
  595. Troubleshooting with ARP
  596. Troubleshooting with Netstat
  597. Troubleshooting with Nslookup
  598. Demo - Troubleshooting Tools
  599. eNotes: Life of a Packet
  600. Troubleshooting Tools
  601. Hardware Based Troubleshooting Tools
  602. Hardware Loopback Plugs
  603. Review
  604.  
  605. Module 14 - Hardening Router
  606.  
  607. Introduction to Routers
  608. Routing Metrics
  609. Multiple Routing
  610. Types of Routes
  611. Routing Algorithms
  612. Demo - Dynamic Routes
  613. Routing Principles
  614. IP Routing
  615. Demo - Static Routes
  616. IP Source Routing
  617. Router Configuration
  618. External Configuration Sources
  619. Internal Configuration Sources
  620. Router Initiation
  621. Setup Configuration Mode
  622. Finger Tool
  623. Disabling the Auxiliary Services and Closing Extra Interfaces
  624. Demo - Router Configuration
  625. Bootstrap Service (BOOTP Service)
  626. TCP and UDP Small Servers
  627. Disabling Proxy ARP
  628. Disabling Simple Network Management Protocol (SNMP)
  629. Disabling Network Time Protocol (NTP)
  630. Hardening a Router
  631. Display Notifications on Banners
  632. Passwords and Secrets
  633. Setting Session Timeout Periods
  634. Cisco Discovery Protocol
  635. Logging Concept
  636. Timestamping
  637. Console Logging
  638. Buffered Logging
  639. Terminal Logging
  640. Filtering Network Traffic
  641. Access Control List (ACL)
  642. Creating a Standard ACL
  643. Demo - Hardening Router
  644. Logging System Error Messages
  645. Enabling System Error Message Logging
  646. How to Secure the Routers
  647. Committed Access Rate
  648. SSH: Securing Routers
  649. SSH: Authentication Methods
  650. Router Commands
  651. Configuring Router Interface Settings
  652. How to Troubleshoot a Router
  653. Troubleshooting Tools
  654. Troubleshooting IP Connectivity in Routers
  655. Components of Router Security
  656. Review
  657.  
  658. Module 15 - Hardening Operating System
  659.  
  660. BIOS Security
  661. Windows Registry
  662. Configuring Windows Services
  663. Process
  664. Need to Know Controls
  665. Malicious Logic Protection
  666. Assurance
  667. Discretionary Access Control List (DACL)
  668. Objects and Permissions
  669. Rights vs. Permission
  670. NTFS File System Permissions
  671. Encryption File System (EFS)
  672. Demo - File Security
  673. Windows Infrastructure Features
  674. Kerberos Authentication and Domain Security
  675. Trust Relationships Between Domains
  676. IPSecurity
  677. Windows 2003 Security Configuration Tools
  678. Demo - SCW
  679. Windows 2003 Resource Security
  680. Windows 2003 Network Security
  681. User and File System Security Administration
  682. Security: Data Security and Network Security
  683. OS Security Measures: Linux Update Agent
  684. User Management
  685. Account Security
  686. File System and Navigation
  687. File and Directory Permissions
  688. Demo - Linux
  689. Pluggable Authentication Module (PAM)
  690. PAM Framework
  691. Security with PAM
  692. Network Information Services (NIS)
  693. Group Management Utilities
  694. Permission Management Tools
  695. System Logger Utility
  696. UNIX Security Checklist
  697. Using Kerberos Authentication
  698. eNotes: Kerberos
  699. Restricting User Capabilities
  700. Review
  701.  
  702. Module 16 - Patch Management
  703.  
  704. Introduction to Patch Management
  705. Change Management Rules
  706. Types of Patches Defined by Microsoft
  707. The Patch Concept
  708. Patch Testing
  709. Understanding Patch Monitoring and Management
  710. Understanding the Process of Patch Management
  711. Microsoft Patch Management Process: Identification
  712. Microsoft Patch Management Process: Assessment
  713. Microsoft Patch Management Process: Obtainment
  714. Demo - MBSA
  715. Microsoft Patch Management Process: Testing
  716. Microsoft Patch Management Process: Deployment
  717. Microsoft Patch Management Process: Confirmation
  718. Implementing the Windows Update Services
  719. Demo - Windows Update
  720. Windows Server Update Services (WSUS)
  721. Features: WSUS Client Side, Server Side Components
  722. Working with Patch Management Tools
  723. Selecting a Tool
  724. Patch Management Tool: Microsoft Baseline Security Analyzer (MBSA)
  725. Review
  726.  
  727. Module 17 - Application Security
  728.  
  729. Importance of Application Security
  730. Why Web Security is So Difficult?
  731. Application Threats
  732. Application Dependant Guidance
  733. Cookies
  734. Working of Cookies
  735. Persistent vs. Non-Persistent Cookie
  736. Session Tokens
  737. Authentication Tokens
  738. Encrypting Private Data
  739. Demo - Drive Encryption
  740. Countermeasures to Threats
  741. Securing Voice Communications
  742. Demo - Securing Voice Communication
  743. Securing Data Communication
  744. Securing of Keying Material
  745. IPSec and SSL Security
  746. Writing Secure Coding Practice
  747. Secure Coding - Common Errors
  748. Common Error: Buffer Overflow
  749. Demo - Metasploit
  750. Common Error: Format String Vulnerabilities
  751. Common Error: Authentication
  752. Common Error: Authorization
  753. Common Error: Cryptography
  754. Best Practices for Secure Coding
  755. Remote Administration Security
  756. Programming Standards and Controls
  757. Threat Modeling
  758. Input and Output of Threat Modeling
  759. Review
  760.  
  761. Module 18 - Web Security
  762.  
  763. Understanding the Various Types of Network Threats
  764. Common Threats on Web
  765. Demo - Web Security Evaluation
  766. Identity Theft
  767. Email Security Risks: Spam
  768. FTP Bounce
  769. DNS Attack
  770. Content Spoofing
  771. Logical Attacks
  772. Restrictive Access
  773. Network Addresses
  774. Altering the Network Address
  775. Client Authorization
  776. Client Side Data
  777. Overview of Server Side Data
  778. Client Authentication
  779. Client Authentication: User's Approach
  780. Client Authentication: Authentication Techniques
  781. Input Data Validation
  782. Demo - Application Security
  783. Browser Hijacking
  784. Common Gateway Interface (CGI)
  785. CGI Script
  786. CGI Script: Mechanisms and Variables
  787. CGI Operations
  788. Review
  789.  
  790. Module 19 - Email Security
  791.  
  792. Analyzing the Key Concepts of Electronic Mail
  793. Basics of Email
  794. Types of Email
  795. Components of Email
  796. Components of Email: Headers
  797. Examining an Email Header
  798. Reading Email Header
  799. Opening Attachments
  800. Components of an Email: Recipients and Senders
  801. Components of an Email: Response Targets
  802. Demo - Email Information
  803. Analyzing the Core Elements of Email Encryption
  804. Secure Email
  805. Email Authentication
  806. Email Protocols
  807. Email Security Risks
  808. Email Security Risks: Gateway Virus Scanners
  809. Email Spamming: Protection Against Spam
  810. Email Spamming: Spam Filters
  811. How to Defend Against Email Security Risks?
  812. Tracking Emails
  813. Tracking Emails: ReadNotify
  814. Demo - ReadNotify
  815. Review
  816.  
  817. Module 20 - Authentication: Encryption, Cryptography and Digital Signatures
  818.  
  819. Authentication
  820. Encryption
  821. Encryption Systems
  822. Hashing Algorithm: HMAC
  823. Demo - Hashing
  824. eNotes: Hash
  825. eNotes: HMAC
  826. Hashing Algorithm: MD5
  827. Encryption Algorithms: RSA
  828. Performing RSA Encryption and Decryption
  829. Demo - Encryption
  830. Diffie Hellman Algorithm
  831. Analyzing Popular Encryption Schemes
  832. Symmetric vs. Asymmetric Encryption
  833. Symmetric Key Encryption
  834. Asymmetric Encryption
  835. PGP (Pretty Good Privacy)
  836. X.509
  837. SSL
  838. eNotes: SSL
  839. Understanding IPSec and IPSec Encryption
  840. Choosing Best IPSec Mode for Organizations
  841. The IPSec Process
  842. IPSec Protocol: AH
  843. IPSec Protocol: ESP
  844. Cryptography
  845. Math and Algorithm
  846. Message Authentication
  847. Strength (e.g., Complexity, Secrecy, Characteristics of the Key)
  848. Digital Certificates
  849. X.509 as Authentication Standard
  850. Digital Signature
  851. Features of Digital Signature
  852. Public Key Infrastructure (PKI)
  853. Review
  854.  
  855. Module 21 - Virtual Private Network
  856.  
  857. Virtual Private Network (VPN)
  858. Types of VPN
  859. Tunneling
  860. Types of Tunneling
  861. VPN Tunneling Protocols
  862. PPTP: Introduction
  863. PPTP Security and Disadvantages
  864. Layer Two Tunneling Protocol (L2TP)
  865. Characteristics of L2TP
  866. L2TP Compulsory Tunnel
  867. L2TP Voluntary Tunnel
  868. VPN Security: Encryption
  869. VPN Security: IPSec Server
  870. Demo - IPSec Server
  871. VPN Security: AAA Server
  872. Connection to VPN: SSH & PPP
  873. Connection to VPN: Concentrator
  874. eNotes: VPN
  875. Demo - VPN Concentrator
  876. Pre-Implementation Review-Auditing
  877. Implementation Review-Auditing
  878. Post-Implementation Review and Reporting
  879. Common VPN Flaws
  880. Insecure Storage of Authentication Credentials by VPN Clients
  881. Username Enumeration Vulnerabilities
  882. Review
  883.  
  884. Module 22 - Wireless Network Security
  885.  
  886. Introduction to Wireless Networks
  887. Wireless Network Types
  888. Wired vs. Wireless Networks
  889. Types of Wireless Networks: Based on Connection
  890. WLAN (Wireless Local Area Network)
  891. WWAN (Wireless Wide Area Network)
  892. WPAN (Wireless Personal Area Network)
  893. WMAN (Wireless Metropolitan Area Network)
  894. Antennas
  895. Antenna Types
  896. Access Points
  897. Operating Modes of Access Points
  898. Wireless Router
  899. Wireless Range Extender
  900. Wireless Technologies
  901. Personal Communication Services (PCS)
  902. TDMA (Time Division Multiple Access)
  903. CDMA (Code Division Multiple Access)
  904. Bluetooth
  905. Wireless Communications: Satellite Communication Network
  906. Wireless Communications: Cellular Phone Network
  907. Types of Wireless Attacks
  908. Man-in-the-Middle Attacks
  909. Denial-of-Service Attacks
  910. Rogue Access Points
  911. MAC Sniffing and ARP Spoofing
  912. Security Vulnerabilities with Public-Access Wireless Networks
  913. Wired Equivalent Privacy (WEP)
  914. WPA (Wi-Fi Protected Access)
  915. RADIUS Authentication
  916. RADIUS: Security
  917. Troubleshooting Wireless Network
  918. Multipath and Hidden Node
  919. eNotes: Multipath and Hidden Node
  920. Review
  921.  
  922. Module 23 - Creating Fault Tolerance
  923.  
  924. Network Security: Fault Tolerance
  925. Why Create Fault Tolerance
  926. Planning for Fault Tolerance
  927. Network Security
  928. Fault Tolerant Network
  929. Reasons for Network Failure
  930. Reasons of System Failure
  931. Reasons of System Failure: Crime
  932. Reasons of System Failure: User Error
  933. Reasons of System Failure: Environmental
  934. Reasons of System Failure: Routine Events
  935. Preventive Measure: Physical Security
  936. Preventive Measure: Backup
  937. Demo - Backups
  938. Preventive Measure: Access Rights
  939. Preventive Measure: Partitions
  940. Preventive Measure: UPS and Power Generators
  941. Preventive Measure: RAID
  942. eNotes: Preventive Measure RAID
  943. Demo - RAID
  944. Preventive Measure: Clustered Servers
  945. Simple Server Redundancy
  946. Preventive Measure: Auditing
  947. Anatomy of Auditing
  948. Auditing Mechanism
  949. Investigation of Security Breaches
  950. Review of Audit Files and Logs
  951. Privacy
  952. Review
  953.  
  954. Module 24 - Incident Response
  955.  
  956. What is an Incident?
  957. Category of Incidents
  958. Types of Incidents
  959. To Whom Should I Report an Incident?
  960. Managing Incidents
  961. What is an Incident Response?
  962. Six Step Approach for Incident Handling
  963. Incident Handling Process: Preparation
  964. Incident Handling Process: Detection
  965. Incident Handling Process: Containment
  966. Incident Handling Process: Eradication
  967. Incident Handling Process: Recovery
  968. Incident Handling Process: Follow-Up
  969. Incident Response Team
  970. Incident Response Team: Functional Requirements
  971. Incident Response Team: Ways of Communication
  972. Incident Response Team: Staffing Issues
  973. Obstacles in Building a Successful Incident Response Team
  974. Computer Security Incident Response Team
  975. Proactive Services
  976. Security Quality Management Services
  977. Review
  978.  
  979. Module 25 - Disaster Recovery and Planning
  980.  
  981. Overview of Disaster and Types
  982. What is Disaster Recovery?
  983. Principles of Disaster Recovery
  984. Types of Disaster Recovery Systems: Asynchronous Systems
  985. Types of Disaster Recovery Systems: Synchronous Systems
  986. Backup Sites
  987. Recovery of Small/Large Recovery Systems
  988. Emergency Management
  989. Disaster Recovery Plan
  990. Security Planning
  991. Program Budget
  992. Disaster Recovery Plan: Organizing
  993. Disaster Recovery Plan: Training
  994. Disaster Recovery Plan: Implementing
  995. Disaster Recovery Planning: Process
  996. Disaster Recovery Testing
  997. Testing Steps
  998. Testing Scenarios
  999. Contingency Planning/Disaster Recovery
  1000. Contingency Plan Components, Agency Response Procedures, and Continuity of Operations
  1001. Team Member Responsibilities in Responding to an Emergency Situation
  1002. Development of Plans for Recovery Actions After a Disruptive Event
  1003. Disaster Recovery Planning Team
  1004. Training the Disaster Recovery Team
  1005. Risk Analysis
  1006. Cost/Benefit Analysis of Controls
  1007. Implementation of Cost-Effective Controls
  1008. Risk Management
  1009. Information Identification
  1010. Roles and Responsibilities of all the Players in the Risk Analysis Process
  1011. Risk Analysis and/or Vulnerability Assessment Components
  1012. Risk Analysis Results Evaluation
  1013. Corrective Actions
  1014. Business Continuity Planning Process (BCP)
  1015. BCP: Business Impact Analysis (BIA)
  1016. BCP: Risk Assessment
  1017. BCP: Monitoring
  1018. BCP: Other Policies, Standards and Processes
  1019. Business Continuity Management
  1020. Emergency Destruction Procedures
  1021. Six Myths About Business Continuity Management and Disaster Recovery
  1022. Review
  1023.  
  1024. Module 26 - Network Vulnerability Assessment
  1025.  
  1026. Network Vulnerability Assessment
  1027. Vulnerability Assessment
  1028. Goals of Vulnerability Assessment
  1029. Features of a Good Vulnerability Assessment
  1030. Network Vulnerability Assessment Timeline
  1031. Vulnerability Classes
  1032. Source of Vulnerabilities
  1033. Choice of Personnel for Network Vulnerability Assessment Team (NVAT)
  1034. Network Vulnerability Assessment Methodology
  1035. Phase I: Acquisition
  1036. Phase II: Identification
  1037. Phase III: Analyzing
  1038. Phase IV: Evaluation
  1039. Phase V: Generating Reports
  1040. How to Detect Vulnerability
  1041. Selecting Vulnerability Assessment Tools
  1042. Demo - Nessus Part 1
  1043. Demo - Nessus Part 2
  1044. Demo - Nessus Part 3
  1045. NVA-Team Checklist
  1046. Review
  1047.  
  1048.  
  1049. Just download the included files, extract, and install using the ISO files.
  1050.  
  1051. Download Link:
  1052. http://bitshare.com/files/bxf4cc4x/download.part1.rar.html
  1053. http://bitshare.com/files/ll9eu66y/download.part2.rar.html
  1054. http://bitshare.com/files/o9d6vdsb/download.part3.rar.html
  1055. http://bitshare.com/files/nzyg6kqe/download.part4.rar.html
  1056. http://bitshare.com/files/2vqktvxu/download.part5.rar.html
  1057. http://bitshare.com/files/mhh1jee8/download.part6.rar.html
  1058. http://bitshare.com/files/8anzcwv1/download.part7.rar.html
  1059. http://bitshare.com/files/j3yq8l19/download.part8.rar.html
  1060. http://bitshare.com/files/0x4vghyr/download.part9.rar.html
Advertisement
Add Comment
Please, Sign In to add comment