Unity is strength... when there is teamwork and collaboration, wonderful things can be achieved.
Public Feed
deep changed a profile picture
R K changed a profile picture
Beginner
 
5 votes (50%)
Intermediate
 
0 votes (0%)
Expert
 
3 votes (30%)
I know the concept but never worked
 
1 votes (10%)
I don't know about cisco ACI
 
1 votes (10%)
Insights into Wireless
Insights into Wireless
New Terms to Learn
Advantages & Disadvantages
Types of Wi-Fi Networks
Wi-Fi Standards
Wi-Fi Authentication Modes
Chalking
Antenna Types
Summary
Encryption in Wireless
Encryption in Wireless
WEP Encryption
WPA & WPA2 Encryption
Breaking Encryption
Defending Against Cracking
Summary
Threats from Wireless
Threats from Wireless
Types of Attacks
Attack on the AP
Attack on the Client
Summary
The Methodology of Hacking Wireless
The Method of Hacking Wireless
Wi-Fi Discovery
GPS Mapping
Wireless Traffic Analysis
Launching Attacks
Let's Go Look-ng
Cracking Wi-Fi Encryption
Let's See How Much Damage We Can Do!
Summary
Hacking Bluetooth
Hacking Bluetooth
The Threats
New Terms
All About Bluetooth
Security
Summary
Countermeasures
Countermeasures
Bluetooth
Rogue APs
6 Layers of Wireless
Best Practices
Tools
Summary
[Fold]

Формат видео: MP4
Видео: AVC, 1280x720, 16:9, 30 fps, 220 Kbps
Аудио: AAC, 44.1 KHz, 96 Kbps, 2 channels

Contents:
Computer_Forensics_in_Today's_World:
0.0 - Overview (195645124)
1.0 - Computer Forensics in Todays World
2.0 - Computer Forensics in Todays World Part 2
3.0 - Computer Forensics in Todays World Part 3
Computer_Forensics_Investigation_Process:
20.0 - Investigative Process
21.0 - Investigative Process Part 2
22.0 - Investigative Process Part 3
23.0 - Investigative Process Part 4
Searching_and_Seizing_Computers:
30.0 - Search and Seizure of a Computer
31.0 - Search and Seizure of a Computer
32.0 - Search and Seizure of a Computer Part 3
33.0 - Search and Seizure of a Computer Part 4
Digital Evidence:
40.0 - Digital Evidence
41.0 - Digital Evidence Part 2
First Responder Procedures:
50.0 - First Responders
Computer_Forensics_Labs:
60.0 - Setting up Forensics Lab
Understanding_Hard_Disks_and_File_Systems:
70.0 - Hard Disks and File Systems
71.0 - Hard Disks and File Systems Part 2
72.0 - Hard Disks and File Systems Part 3
73.0 - Hard Disks and File Systems Part 4
Windows_Forensics:
80.0 - Windows Forensics
81.0 - Windows Forensics Part 2
82.0 - Windows Forensics Part 3
83.0 - Windows Forensics Part 4
84.0 - Windows Forensics Part 5
Data_Acquisition_and_Duplication:
90.0 - Data Acquisition, Duplication and Recovery
92.0 - Overview of The Sleuth Kit (TSK)
Recovering_Deleted_Files_and_Deleted_Partitions:
-empty folder-
Forensics_Investigation_Using_AccessData_FTK:
100.0 - AccessData FTK
Forensics_Investigation_Using_Encase:
101.0 - EnCase
Steganography_and_Image_File_Forensics:
110.0 - Steganography
111.0 - Steganography Part 2
Application _and_Password_Crackers:
120.0 - Password Crackers
121.0 - Password Crackers Part 2
Log_Capturing_and_Event_Correlation:
130.0 - Log Capturing and Network Forensics
131.0 - Log Capturing and Network Forensics Part 2
132.0 - Log Capturing and Network Forensics Part 3
133.0 - Log Capturing and Network Forensics Part 4
Network_Forensics:
-empty folder-
Investigating_Wireless_Attacks:
170.0 - Wireless
171.0 - Wireless Part 2
Investigating_Web_Attacks:
180.0 - Web Forensics
181.0 - Web Forensics Part 2
Tracking_Emails_and+Investigating_Email_Crines:
190.0 - Email Forensics
Mobile_Forensics:
200.0 - Mobile Forensics
Investigative_Reports:
210.0 - Reports and Testimony
Becoming_An_Expert_Witness:
-empty folder-

[Packt] CompTIA Advanced Security Practitioner (CASP) [2017, ENG]

Contents:
01 - Course Introduction
02 - Business Influences and Associated Security Risks
03 - Risk Management
04 - Business Model Strategies
05 - Integrating Diverse Industries
06 - Third Party Information Security and Providers
07 - Internal and External Influences
08 - Impact of De-Perimeterization
09 - Risk Mitigation Planning - Strategies and Controls
100 - Secure Storage Management Techniques
101 - LUN Masking_Mapping and HBA Allocation
102 - Replication and Encryption Methods
103 - Network and Security Components-Concepts-Security Architectures
104 - Remote Access Protocols
105 - IPv6 and Transport Encryption
106 - Network Authentication Methods
107 - 802.1x and Mesh Networks
108 - Security Devices
109 - Network Devices
10 - CIA Triad
110 - Firewalls
111 - Wireless Controllers
112 - Router Security and Port Numbers
113 - Network Security Solutions
114 - Availability Controls-Terms and Techniques
115 - Advanced Router and Switch Configuration
116 - Data Flow Enforcement of Applications and Networks
117 - Network Device Accessibility and Security
118 - Security Controls for Hosts
119 - Trusted Operation Systems
11 - Business Classifications
120 - Endpoint Security Software and Data Loss Prevention
121 - Host Based Firewalls
122 - Log Monitoring and Host Hardening
123 - Standard Operating Environment and Group Policy Security
124 - Command Shell Restrictions
125 - Configuring and Managing Interface Security
126 - USB-Bluetooth-Firewire Restrictions and Security
127 - Full Disk Encryption
128 - Virtualization Security
129 - Cloud Security Services
12 - Information Life Cycle and Steak-Holder Input
130 - Boot Loader Protections
131 - Virtual Host Vulnerabilities
132 - Virtual Desktop Infrastructure
133 - Terminal Services
134 - Virtual TPM
135 - Application Vulnerabilities and Security Controls
136 - Web Application Security Design
137 - Specific Application Issues
138 - Session Management
139 - Input Validation
13 - Implementing Technical Controls
140 - Web Vulnerabilities and Input Mitigation Issues
141 - Buffer Overflow and other Application Issues
142 - Application Security Framework
143 - Web Service Security and Secure Coding Standards
144 - Software Development Methods
145 - Monitoring Mechanisms and Client-Server Side Processing
146 - Browser Extensions and Other Web Development Techniques
147 - Host-Storage-Network and Application Integration
148 - Securing Data Flows
149 - Standards Concepts
14 - Determine Aggregate CIA Score
150 - Interoperability Issues
151 - In House Commercial and Customized Applications
152 - Cloud and Virtualization Models
153 - Logical and Physical Deployment Diagrams
154 - Secure Infrastructure Design
155 - Storage Integration Security
156 - Enterprise Application Integration Enablers
157 - Authentication and Authorization Technologies
158 - Authentication and Identity Management
159 - Password Types-Management and Policies
15 - Worst Case Scenario Planning
160 - Authentication Factors
161 - Biometrics
162 - Dual-Multi Factor and Certificate Authentication
163 - Single Sign On Issues
164 - Access Control Models and Open Authorization
165 - Extensible Access Control Markup Language (XACML)
166 - Service Provisioning Markup Language (SPML)
167 - Attestation and Identity Propagation
168 - Federation and Security Assertion Markup Language (SAML)
169 - OpenID-Shibboleth and WAYF
16 - Calculation Tools and Attacker Motivation
170 - Advanced Trust Models
171 - Business Unit Collaboration
172 - Identifying and Communicating Security Requirements
173 - Security Controls Recommendations
174 - Secure Solutions Collaboration
175 - Secure Communication and Collaboration
176 - Web-Video Conferencing-Instant Messaging
177 - Desktop Sharing
178 - Presence Guidelines
179 - Email Messaging Protocol
17 - Return Of Investment
180 - Telephony-VoIP and Social Media
181 - Cloud Based Collaboration
182 - Remote Access and IPsec
183 - Mobile and Personal Device Management
184 - Over Air Technology Concerns
185 - WLAN Concepts-Terms-Standards
186 - WLAN Security and Attacks
187 - Security Across the Technology Life Cycle
188 - End to End Solution Ownership
189 - System Development Life Cycle
18 - Total Cost of Ownership and Risk Strategies
190 - Security Implications of Software Development Methodologies
191 - Asset Management
192 - Course End
19 - Risk Management Process
20 - Identifying Vulnerabilities and Threats
21 - Security Architecture Frameworks
22 - Business Continuity Planning
23 - IT Governance
24 - Security Policies
25 - Security-Privacy Policies and Procedures Part1
26 - Security-Privacy Policies and Procedures Part2
27 - Policy Development Updates
28 - Developing Processes and Procedures
29 - Legal Compliance Part1
30 - Legal Compliance Part2
31 - Security Policy Business Documents
32 - Outage Impact and Estimating Downtime Terms
33 - Sensitive Information-Internal Security Policies
34 - Incident Response Process
35 - Forensic Tasks
36 - Employment and Termination Procedures
37 - Network Auditing
38 - Incident Response and Recovery Procedures
39 - E-Discovery and Data Retention Policies
40 - Data Recovery-Storage and Backup Schemes
41 - Data Owner and Data Handling
42 - Disposal Terms and Concepts
43 - Data Breach and Data Analysis
44 - Incident Response Guidelines
45 - Incident and Emergency Response
46 - Media-Software and Network Analysis
47 - Order of Volatility
48 - Industry Trends Overview
49 - Performing Ongoing Research
50 - Security Practices
51 - Evolution of Technology
52 - Situational Awareness and Vulnerability Assessments
53 - Researching Security Implications
54 - Global Industry Security Response
55 - Threat Actors
56 - Contract Security Requirements
57 - Contract Documents
58 - Securing the Enterprise Overview
59 - Benchmarks and Baselines
60 - Prototyping and Testing Multiple Solutions
61 - Cost_Benefit Analysis
62 - Metrics Collection and Trend Data
63 - Security Controls-Reverse Engineering and Deconstructing
64 - Security Solutions Business Needs
65 - Lesson Learned- After Action Report
66 - Assessment Tools and Methods
67 - Port Scanners and Vulnerability Scanners
68 - Protocol Analyzer- Network Enumerator-Password Cracker
69 - Fuzzers and HTTP Interceptors
70 - Exploitation Tools
71 - Passive Reconnaissance Tools
72 - Vulnerability Assessments and Malware Sandboxing
73 - Memory Dumping and Penetration Testing
74 - Reconnaissance and Fingerprinting
75 - Code Review
76 - Social Engineering
77 - Social Cryptographic Concepts and Techniques
78 - Cryptographic Benefits and Techniques
79 - Hashing Algorithms
80 - Message Authentication Code
81 - Cryptographic Concepts
82 - Transport Encryption Protocol
83 - Symmetric Algorithms
84 - Asymmetric Algorithms
85 - Hybrid Encryption and Digital Signatures
86 - Public Key Infrastructure
87 - Digital Certificate Classes and Cypher Types
88 - Des Modes
89 - Cryptographic Attacks
90 - Strength vs Performance and Cryptographic Implementations
91 - Enterprise Storage
92 - Virtual Storage Types and Challenges
93 - Cloud Storage
94 - Data Warehousing
95 - Data Archiving
96 - Storage Area Networks (SANs) and (VSANs)
97 - Network Attached Storage (NAS)
98 - Storage Protocols and Fiber Channel over Ethernet (FCoE)
99 - Storage Network File Systems

[Packt] CompTIA Advanced Security Practitioner (CASP) [2017, ENG]

Contents:
01 - Course Introduction
02 - Business Influences and Associated Security Risks
03 - Risk Management
04 - Business Model Strategies
05 - Integrating Diverse Industries
06 - Third Party Information Security and Providers
07 - Internal and External Influences
08 - Impact of De-Perimeterization
09 - Risk Mitigation Planning - Strategies and Controls
100 - Secure Storage Management Techniques
101 - LUN Masking_Mapping and HBA Allocation
102 - Replication and Encryption Methods
103 - Network and Security Components-Concepts-Security Architectures
104 - Remote Access Protocols
105 - IPv6 and Transport Encryption
106 - Network Authentication Methods
107 - 802.1x and Mesh Networks
108 - Security Devices
109 - Network Devices
10 - CIA Triad
110 - Firewalls
111 - Wireless Controllers
112 - Router Security and Port Numbers
113 - Network Security Solutions
114 - Availability Controls-Terms and Techniques
115 - Advanced Router and Switch Configuration
116 - Data Flow Enforcement of Applications and Networks
117 - Network Device Accessibility and Security
118 - Security Controls for Hosts
119 - Trusted Operation Systems
11 - Business Classifications
120 - Endpoint Security Software and Data Loss Prevention
121 - Host Based Firewalls
122 - Log Monitoring and Host Hardening
123 - Standard Operating Environment and Group Policy Security
124 - Command Shell Restrictions
125 - Configuring and Managing Interface Security
126 - USB-Bluetooth-Firewire Restrictions and Security
127 - Full Disk Encryption
128 - Virtualization Security
129 - Cloud Security Services
12 - Information Life Cycle and Steak-Holder Input
130 - Boot Loader Protections
131 - Virtual Host Vulnerabilities
132 - Virtual Desktop Infrastructure
133 - Terminal Services
134 - Virtual TPM
135 - Application Vulnerabilities and Security Controls
136 - Web Application Security Design
137 - Specific Application Issues
138 - Session Management
139 - Input Validation
13 - Implementing Technical Controls
140 - Web Vulnerabilities and Input Mitigation Issues
141 - Buffer Overflow and other Application Issues
142 - Application Security Framework
143 - Web Service Security and Secure Coding Standards
144 - Software Development Methods
145 - Monitoring Mechanisms and Client-Server Side Processing
146 - Browser Extensions and Other Web Development Techniques
147 - Host-Storage-Network and Application Integration
148 - Securing Data Flows
149 - Standards Concepts
14 - Determine Aggregate CIA Score
150 - Interoperability Issues
151 - In House Commercial and Customized Applications
152 - Cloud and Virtualization Models
153 - Logical and Physical Deployment Diagrams
154 - Secure Infrastructure Design
155 - Storage Integration Security
156 - Enterprise Application Integration Enablers
157 - Authentication and Authorization Technologies
158 - Authentication and Identity Management
159 - Password Types-Management and Policies
15 - Worst Case Scenario Planning
160 - Authentication Factors
161 - Biometrics
162 - Dual-Multi Factor and Certificate Authentication
163 - Single Sign On Issues
164 - Access Control Models and Open Authorization
165 - Extensible Access Control Markup Language (XACML)
166 - Service Provisioning Markup Language (SPML)
167 - Attestation and Identity Propagation
168 - Federation and Security Assertion Markup Language (SAML)
169 - OpenID-Shibboleth and WAYF
16 - Calculation Tools and Attacker Motivation
170 - Advanced Trust Models
171 - Business Unit Collaboration
172 - Identifying and Communicating Security Requirements
173 - Security Controls Recommendations
174 - Secure Solutions Collaboration
175 - Secure Communication and Collaboration
176 - Web-Video Conferencing-Instant Messaging
177 - Desktop Sharing
178 - Presence Guidelines
179 - Email Messaging Protocol
17 - Return Of Investment
180 - Telephony-VoIP and Social Media
181 - Cloud Based Collaboration
182 - Remote Access and IPsec
183 - Mobile and Personal Device Management
184 - Over Air Technology Concerns
185 - WLAN Concepts-Terms-Standards
186 - WLAN Security and Attacks
187 - Security Across the Technology Life Cycle
188 - End to End Solution Ownership
189 - System Development Life Cycle
18 - Total Cost of Ownership and Risk Strategies
190 - Security Implications of Software Development Methodologies
191 - Asset Management
192 - Course End
19 - Risk Management Process
20 - Identifying Vulnerabilities and Threats
21 - Security Architecture Frameworks
22 - Business Continuity Planning
23 - IT Governance
24 - Security Policies
25 - Security-Privacy Policies and Procedures Part1
26 - Security-Privacy Policies and Procedures Part2
27 - Policy Development Updates
28 - Developing Processes and Procedures
29 - Legal Compliance Part1
30 - Legal Compliance Part2
31 - Security Policy Business Documents
32 - Outage Impact and Estimating Downtime Terms
33 - Sensitive Information-Internal Security Policies
34 - Incident Response Process
35 - Forensic Tasks
36 - Employment and Termination Procedures
37 - Network Auditing
38 - Incident Response and Recovery Procedures
39 - E-Discovery and Data Retention Policies
40 - Data Recovery-Storage and Backup Schemes
41 - Data Owner and Data Handling
42 - Disposal Terms and Concepts
43 - Data Breach and Data Analysis
44 - Incident Response Guidelines
45 - Incident and Emergency Response
46 - Media-Software and Network Analysis
47 - Order of Volatility
48 - Industry Trends Overview
49 - Performing Ongoing Research
50 - Security Practices
51 - Evolution of Technology
52 - Situational Awareness and Vulnerability Assessments
53 - Researching Security Implications
54 - Global Industry Security Response
55 - Threat Actors
56 - Contract Security Requirements
57 - Contract Documents
58 - Securing the Enterprise Overview
59 - Benchmarks and Baselines
60 - Prototyping and Testing Multiple Solutions
61 - Cost_Benefit Analysis
62 - Metrics Collection and Trend Data
63 - Security Controls-Reverse Engineering and Deconstructing
64 - Security Solutions Business Needs
65 - Lesson Learned- After Action Report
66 - Assessment Tools and Methods
67 - Port Scanners and Vulnerability Scanners
68 - Protocol Analyzer- Network Enumerator-Password Cracker
69 - Fuzzers and HTTP Interceptors
70 - Exploitation Tools
71 - Passive Reconnaissance Tools
72 - Vulnerability Assessments and Malware Sandboxing
73 - Memory Dumping and Penetration Testing
74 - Reconnaissance and Fingerprinting
75 - Code Review
76 - Social Engineering
77 - Social Cryptographic Concepts and Techniques
78 - Cryptographic Benefits and Techniques
79 - Hashing Algorithms
80 - Message Authentication Code
81 - Cryptographic Concepts
82 - Transport Encryption Protocol
83 - Symmetric Algorithms
84 - Asymmetric Algorithms
85 - Hybrid Encryption and Digital Signatures
86 - Public Key Infrastructure
87 - Digital Certificate Classes and Cypher Types
88 - Des Modes
89 - Cryptographic Attacks
90 - Strength vs Performance and Cryptographic Implementations
91 - Enterprise Storage
92 - Virtual Storage Types and Challenges
93 - Cloud Storage
94 - Data Warehousing
95 - Data Archiving
96 - Storage Area Networks (SANs) and (VSANs)
97 - Network Attached Storage (NAS)
98 - Storage Protocols and Fiber Channel over Ethernet (FCoE)
99 - Storage Network File Systems

CompTIA Advanced Security Practitioner (CASP)

Contents:
01 - Course Introduction
02 - Business Influences and Associated Security Risks
03 - Risk Management
04 - Business Model Strategies
05 - Integrating Diverse Industries
06 - Third Party Information Security and Providers
07 - Internal and External Influences
08 - Impact of De-Perimeterization
09 - Risk Mitigation Planning - Strategies and Controls
100 - Secure Storage Management Techniques
101 - LUN Masking_Mapping and HBA Allocation
102 - Replication and Encryption Methods
103 - Network and Security Components-Concepts-Security Architectures
104 - Remote Access Protocols
105 - IPv6 and Transport Encryption
106 - Network Authentication Methods
107 - 802.1x and Mesh Networks
108 - Security Devices
109 - Network Devices
10 - CIA Triad
110 - Firewalls
111 - Wireless Controllers
112 - Router Security and Port Numbers
113 - Network Security Solutions
114 - Availability Controls-Terms and Techniques
115 - Advanced Router and Switch Configuration
116 - Data Flow Enforcement of Applications and Networks
117 - Network Device Accessibility and Security
118 - Security Controls for Hosts
119 - Trusted Operation Systems
11 - Business Classifications
120 - Endpoint Security Software and Data Loss Prevention
121 - Host Based Firewalls
122 - Log Monitoring and Host Hardening
123 - Standard Operating Environment and Group Policy Security
124 - Command Shell Restrictions
125 - Configuring and Managing Interface Security
126 - USB-Bluetooth-Firewire Restrictions and Security
127 - Full Disk Encryption
128 - Virtualization Security
129 - Cloud Security Services
12 - Information Life Cycle and Steak-Holder Input
130 - Boot Loader Protections
131 - Virtual Host Vulnerabilities
132 - Virtual Desktop Infrastructure
133 - Terminal Services
134 - Virtual TPM
135 - Application Vulnerabilities and Security Controls
136 - Web Application Security Design
137 - Specific Application Issues
138 - Session Management
139 - Input Validation
13 - Implementing Technical Controls
140 - Web Vulnerabilities and Input Mitigation Issues
141 - Buffer Overflow and other Application Issues
142 - Application Security Framework
143 - Web Service Security and Secure Coding Standards
144 - Software Development Methods
145 - Monitoring Mechanisms and Client-Server Side Processing
146 - Browser Extensions and Other Web Development Techniques
147 - Host-Storage-Network and Application Integration
148 - Securing Data Flows
149 - Standards Concepts
14 - Determine Aggregate CIA Score
150 - Interoperability Issues
151 - In House Commercial and Customized Applications
152 - Cloud and Virtualization Models
153 - Logical and Physical Deployment Diagrams
154 - Secure Infrastructure Design
155 - Storage Integration Security
156 - Enterprise Application Integration Enablers
157 - Authentication and Authorization Technologies
158 - Authentication and Identity Management
159 - Password Types-Management and Policies
15 - Worst Case Scenario Planning
160 - Authentication Factors
161 - Biometrics
162 - Dual-Multi Factor and Certificate Authentication
163 - Single Sign On Issues
164 - Access Control Models and Open Authorization
165 - Extensible Access Control Markup Language (XACML)
166 - Service Provisioning Markup Language (SPML)
167 - Attestation and Identity Propagation
168 - Federation and Security Assertion Markup Language (SAML)
169 - OpenID-Shibboleth and WAYF
16 - Calculation Tools and Attacker Motivation
170 - Advanced Trust Models
171 - Business Unit Collaboration
172 - Identifying and Communicating Security Requirements
173 - Security Controls Recommendations
174 - Secure Solutions Collaboration
175 - Secure Communication and Collaboration
176 - Web-Video Conferencing-Instant Messaging
177 - Desktop Sharing
178 - Presence Guidelines
179 - Email Messaging Protocol
17 - Return Of Investment
180 - Telephony-VoIP and Social Media
181 - Cloud Based Collaboration
182 - Remote Access and IPsec
183 - Mobile and Personal Device Management
184 - Over Air Technology Concerns
185 - WLAN Concepts-Terms-Standards
186 - WLAN Security and Attacks
187 - Security Across the Technology Life Cycle
188 - End to End Solution Ownership
189 - System Development Life Cycle
18 - Total Cost of Ownership and Risk Strategies
190 - Security Implications of Software Development Methodologies
191 - Asset Management
192 - Course End
19 - Risk Management Process
20 - Identifying Vulnerabilities and Threats
21 - Security Architecture Frameworks
22 - Business Continuity Planning
23 - IT Governance
24 - Security Policies
25 - Security-Privacy Policies and Procedures Part1
26 - Security-Privacy Policies and Procedures Part2
27 - Policy Development Updates
28 - Developing Processes and Procedures
29 - Legal Compliance Part1
30 - Legal Compliance Part2
31 - Security Policy Business Documents
32 - Outage Impact and Estimating Downtime Terms
33 - Sensitive Information-Internal Security Policies
34 - Incident Response Process
35 - Forensic Tasks
36 - Employment and Termination Procedures
37 - Network Auditing
38 - Incident Response and Recovery Procedures
39 - E-Discovery and Data Retention Policies
40 - Data Recovery-Storage and Backup Schemes
41 - Data Owner and Data Handling
42 - Disposal Terms and Concepts
43 - Data Breach and Data Analysis
44 - Incident Response Guidelines
45 - Incident and Emergency Response
46 - Media-Software and Network Analysis
47 - Order of Volatility
48 - Industry Trends Overview
49 - Performing Ongoing Research
50 - Security Practices
51 - Evolution of Technology
52 - Situational Awareness and Vulnerability Assessments
53 - Researching Security Implications
54 - Global Industry Security Response
55 - Threat Actors
56 - Contract Security Requirements
57 - Contract Documents
58 - Securing the Enterprise Overview
59 - Benchmarks and Baselines
60 - Prototyping and Testing Multiple Solutions
61 - Cost_Benefit Analysis
62 - Metrics Collection and Trend Data
63 - Security Controls-Reverse Engineering and Deconstructing
64 - Security Solutions Business Needs
65 - Lesson Learned- After Action Report
66 - Assessment Tools and Methods
67 - Port Scanners and Vulnerability Scanners
68 - Protocol Analyzer- Network Enumerator-Password Cracker
69 - Fuzzers and HTTP Interceptors
70 - Exploitation Tools
71 - Passive Reconnaissance Tools
72 - Vulnerability Assessments and Malware Sandboxing
73 - Memory Dumping and Penetration Testing
74 - Reconnaissance and Fingerprinting
75 - Code Review
76 - Social Engineering
77 - Social Cryptographic Concepts and Techniques
78 - Cryptographic Benefits and Techniques
79 - Hashing Algorithms
80 - Message Authentication Code
81 - Cryptographic Concepts
82 - Transport Encryption Protocol
83 - Symmetric Algorithms
84 - Asymmetric Algorithms
85 - Hybrid Encryption and Digital Signatures
86 - Public Key Infrastructure
87 - Digital Certificate Classes and Cypher Types
88 - Des Modes
89 - Cryptographic Attacks
90 - Strength vs Performance and Cryptographic Implementations
91 - Enterprise Storage
92 - Virtual Storage Types and Challenges
93 - Cloud Storage
94 - Data Warehousing
95 - Data Archiving
96 - Storage Area Networks (SANs) and (VSANs)
97 - Network Attached Storage (NAS)
98 - Storage Protocols and Fiber Channel over Ethernet (FCoE)
99 - Storage Network File Systems

Cisco Firepower and Advanced Malware Protection LiveLessons

Lesson 1: Fundamentals of Cisco Next-Generation Network Security
Lesson 2: Introduction and Design of Cisco ASA with FirePOWER Services
Lesson 3: Configuring Cisco ASA with FirePOWER Services
Lesson 4: Cisco AMP for Networks
Lesson 5: Cisco AMP for Endpoints
Lesson 6: Cisco AMP for Content Security
Lesson 7: Configuring and Troubleshooting the Cisco Next-Generation IPS Appliances
Lesson 8: Firepower Management Center

 

Understanding the Cisco ASA Firewall Training Video

01. Introduction
0101Welcome To The Course
0102 About The Author
0103 How To Access Your Working Files
02. Introduction To The Firewall
0201 ASA Hardware Models
0202 CLI Basics Part - 1
0203 CLI Basics Part - 2
03. Basic Configuration
0301 Interface Configuration
0302 5505 Switchports
0303 Security Levels
0304 Same Security Level
0305 The Course Lab Environment
0306 Implementing Access Lists Part - 1
0307 Implementing Access Lists Part - 2
0308 Introduction To NAT
0309 Fixup Protocol ICMP
0310 Management Access Part - 1
0311 Management Access Part - 2
0312 Firewall Local DHCP Server
0313 A Basic Firewall Configuration Part - 1
0314 A Basic Firewall Configuration Part - 2
0315 An Introduction To ASDM Part - 1
0316 An Introduction To ASDM Part - 2
04. Network Address Translation In Depth
0401 Network Address Translation Part - 1
0402 Network Address Translation Part - 2
0403 Network Address Translation Part - 3
0404 Network Address Translation Part - 4
0405 NAT And Access Lists
05. Anyconnect Client VPN Setup
0501 Two Types Of VPN Connections
0502 Two Types Of VPN Clients
0503 SSL Certificates Part - 1
0504 SSL Certificates Part - 2
0505 Download Anyconnect Files From Cisco
0506 Upload .Pkg Files To ASA
0507 Default Licenses In ASA
0508 Configuring The .Pkg-Files To Use
0509 Activating Anyconnect (Enabling)
0510 Logging And Debugging Anyconnect
0511 Connecting But No Traffic Flow
0512 Fix NAT To Make It Work
0513 Internet Access Via The Tunnel
0514 Split Tunneling
0515 Making The User Select Connection Profile
0516 VPN Filter
0517 Client Profile Editor
0518 LDAP Authentication Of Users
0519 Dynamic Access Policies Part - 1
0520 Dynamic Access Policies Part - 2
06. IPSEC VPN
0601 The Life Of An IPSEC-Tunnel
0602 Information Needed
0603 Configuring Phase 1 Parameters
0604 Configuring Phase 2 Parameters
0605 Proxy ACL And Crypto Map Configuration
0606 Finalising The VPN Configuration
0607 Testing The Tunnel
0608 Modifying NAT To Make The Tunnel Work
07. Troubleshooting Tools
0701 Logging And Debugging
0702 Packet Tracer
0703 Packet Capture
08. Advanced Topics
0801 Transparent Mode
0802 Multi Context
0803 Failover
0804 Trunks And Etherchannels
09. Conclusion
0901 Wrap Up And Thank You

Cisco CCNP Security 300-207 SITCS

1. SITCS Welcome (3 min)
2. WSA Overview (10 min)
3. Bootstrapping the WSA (12 min)
4. Deploy and License a WSA VM (10 min)
5. WSA Identities (6 min)
6. WSA Access Policy (13 min)
7. WSA User Authentication (10 min)
8. Directing Traffic to the WSA (6 min)
9. WCCP Router Configuration (12 min)
10. WCCP ASA Configuration (12 min)
11. Cisco Legacy IPS and IDS Concepts (9 min)
12. IDM Interface (13 min)
13. ESA Overview (9 min)
14. Email Terminology (7 min)
15. ESA VM Install (6 min)
16. Licensing the ESA (2 min)
17. ESA HATs, RATs, and Listeners (9 min)
18. Verifying HATs and RATs (5 min)
19. E-Mail Policies (6 min)
20. ESA Message Tracking (5 min)
21. ESA Trace Tool (1 min)
22. Cloud Web Security Overview (7 min)
23. ASA to CWS Connector (9 min)
24. IOS to CWS Connector (4 min)
25. ASA to CX Module Policy (7 min)

Introduction
3m 37s
Introduction 3m 37s
Create and Configure VMware Clusters
1h 14m
What This Module Covers 2m 35s
vSphere HA and DRS Overview 14m 40s
Determine How DRS and HA are Applicable to an Environment 2m 17s
Create/Delete a DRS/HA Cluster 7m 41s
Add/Remove ESXi Hosts from a DRS/HA Cluster 4m 13s
Add/Remove Virtual Machines from a DRS/HA Cluster 2m 28s
Configure Storage DRS 4m 8s
Configure Enhanced vMotion Compatibility 3m 23s
Monitor a DRS/HA Cluster 13m 25s
Configure Migration Thresholds for DRS and Virtual Machines 4m 30s
Configure Automation Levels for DRS and Virtual Machines 1m 55s
Enable/Configure/Disable Host Power Management and DPM 5m 33s
Enable/Disable Host Monitoring 2m 2s
Enable/Configure/Disable Virtual Machine and App Monitoring 4m 29s
What This Module Covered 1m 8s
Plan and Implement VMware Fault Tolerance
25m 57s
What This Module Covers 1m 15s
VMware Fault Tolerance Overview 4m 26s
Configure VMware Fault Tolerance Networking 3m 25s
Given a Scenario, Determine VMware Fault Tolerance Config 3m 14s
Enable/Disable VMware Fault Tolerance on a Virtual Machine 8m 1s
Test a Fault Tolerant Configuration 2m 29s
Determine Use Case for VMware Fault Tolerance on a VM 1m 26s
What This Module Covered 1m 37s
Create and Administer Resource Pools
28m 15s
What This Module Covers 1m 19s
Explain vFlash Architecture 2m 36s
Explain use Cases for Resource Pools 3m 14s
Create/Remove a Resource Pool 1m 59s
Configure Resource Pool Attributes 5m 28s
Add/Remove Virtual Machines from a Resource Pool 1m 15s
Create/Delete vFlash Resource Pool 2m 20s
Assign vFlash Resources to VMDKs 2m 52s
Determine Resource Pool Requirements 6m 12s
What This Module Covered 0m 56s
Migrating Virtual Machines
21m 21s
What This Module Covers 1m 40s
Explain Enhanced vMotion Compatibility (EVC) 1m 56s
Explain Long Distance vMotion 1m 46s
Explain Process for vMotion/Storage vMotion Migrations 2m 52s
Configure Virtual Machine Swap File Location 2m 41s
Migrate a Powered-off or Suspended Virtual Machine 2m 41s
Migrate Virtual Machines Using vMotion/Storage vMotion 6m 9s
What This Module Covered 1m 31s
Backup and Restore Virtual Machines
32m 0s
What This Module Covers 1m 19s
VMware Data Protection Overview 1m 42s
Explain VMware Data Protection Sizing Guidelines 2m 30s
Describe vSphere Replication Architecture 0m 58s
Install and Configure VMware Data Protection 7m 6s
Create a Backup Job with VMware Data Protection 2m 46s
Perform a Live File-level Restore with VMware Data Protection 3m 12s
Create/Delete/Consolidate Virtual Machine Snapshots 6m 18s
Perform a Failback Operation Using vSphere Replication 2m 10s
Determine Backup Solution for a Given vSphere Implementation 2m 2s
What This Module Covered 1m 52s
Update ESXi and Virtual Machines
33m 9s
What This Module Covers 1m 40s
Create/Edit/Remove a Host Profile from an ESXi Host 3m 34s
Attach/Apply a Host Profile to an ESXi Host or Cluster 2m 10s
Perform Compliance Scanning/Remediation Using Host Profiles 4m 45s
Install and Configure vSphere Update Manager 7m 10s
Configure Patch Download Options 4m 30s
Create/Edit/Delete an Update Manager Baseline 2m 48s
Attach an Update Manager Baseline to an ESXi Host or Cluster 1m 19s
Scan and Remediate ESXi Hosts and VMs Using Update Manager 3m 41s
What This Module Covered 1m 28s

1. CISA Overview (7 min)
2. The Process of Auditing Information Systems (11 min)
3. IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics (9 min)
4. Audit Risk Assessment (15 min)
5. Business Processes (5 min)
6. Control Objectives (8 min)
7. Audit Planning and Management (9 min)
8. Laws and Regulations (3 min)
9. Evidence (11 min)
10. Sampling Methodologies (9 min)
11. Reporting and Communications (5 min)
12. Audit Quality Assurance (3 min)
13. Types of Audits (5 min)
14. Governance and Management of IT (8 min)
15. Information Systems Strategy (10 min)
16. Standards, Governance and Frameworks (9 min)
17. IT Organization (6 min)
18. Legal Compliance (8 min)
19. Enterprise Architecture (4 min)
20. Maintenance of Policies and Procedures (2 min)
21. Maturity Models (5 min)
22. Process Optimization (3 min)
23. IT Investment Strategies (5 min)
24. IT Vendor Selection and Management (8 min)
25. IT Risk Management (8 min)
26. Control Processes (4 min)
27. Quality Management Systems (4 min)
28. IT Performance Monitoring and Reporting (6 min)
29. BCP - Business Impact Analysis (8 min)
30. BCP – Maintenance and Testing (3 min)
31. BCP - Invoke and Return to Normal (7 min)
32. Information Systems Acquisition, Development and Implementation (9 min)
33. Benefits Realization (5 min)
34. Vendor Management (7 min)
35. Project Governance (9 min)
36. Project Management (17 min)
37. Risk Management (5 min)
38. Requirements Management (7 min)
39. Application Architecture (5 min)
40. Methodologies (12 min)
41. Control Objectives and Techniques (11 min)
42. Testing (10 min)
43. Configuration and Change Management (6 min)
44. System Migration and Deployment (10 min)
45. Project Success Criteria (5 min)
46. Post-Implementation Reviews (4 min)
47. Information Systems Operations, Maintenance & Support (8 min)
48. Service Level Frameworks (6 min)
49. Service Level Management (7 min)
50. Monitor 3rd Party Compliance (4 min)
51. Architecture (11 min)
52. Computer Hardware, Software and Networks (22 min)
53. Software Resiliency Tools and Techniques (4 min)
54. Software Licensing and Inventory Interfaces (3 min)
55. Managing Schedules (6 min)
56. System Interface Integrity (10 min)
57. Capacity Planning (4 min)
58. Performance Monitoring (3 min)
59. Data Backup (5 min)
60. Database Administration Practices (9 min)
61. Data Quality and Retention (6 min)
62. Problem and Incident Management (5 min)
63. Managing Change to Production Environments (3 min)
64. Risks and Controls for End User Computing (6 min)
65. Disaster Recovery – Legal and Contractual Issues (7 min)
66. Business Impact of Disaster Recovery (2 min)
67. Disaster Recovery Plan Maintenance (5 min)
68. Alternate Processing Sites (9 min)
69. Disaster Recovery Testing (4 min)
70. Invoking Disaster Recovery (6 min)
71. Protection of Information Assets (8 min)
72. Information Asset Protection (4 min)
73. Privacy Principles (6 min)
74. Security Controls (5 min)
75. Environmental Protection (6 min)
76. Physical Access Controls (5 min)
77. Logical Access Controls (3 min)
78. Identification and Authentication (3 min)
79. Virtual Systems (5 min)
80. Mobile Devices (3 min)
81. Voice Communication (4 min)
82. Internet Security, Protocols and Techniques (9 min)
83. Network Security Concerns (4 min)
84. Data Encryption (3 min)
85. Public Key Infrastructure (5 min)
86. Peer to Peer Computing (5 min)
87. Data Classification Standards (4 min)
88. Handling Confidential Data (4 min)
89. Data Leakage (4 min)
90. End-User Computing Security (5 min)
91. Security Awareness Program (4 min)
92. Cyber Attacks (7 min)
93. Detection Tools (4 min)
94. Security Testing Techniques (6 min)
95. Security Incidents (3 min)
96. Handling of Evidence (4 min)
97. Fraud Risk Factors (6 min)
98. Passing the Exam (7 min)

Insights into Wireless
Insights into Wireless
New Terms to Learn
Advantages & Disadvantages
Types of Wi-Fi Networks
Wi-Fi Standards
Wi-Fi Authentication Modes
Chalking
Antenna Types
Summary
Encryption in Wireless
Encryption in Wireless
WEP Encryption
WPA & WPA2 Encryption
Breaking Encryption
Defending Against Cracking
Summary
Threats from Wireless
Threats from Wireless
Types of Attacks
Attack on the AP
Attack on the Client
Summary
The Methodology of Hacking Wireless
The Method of Hacking Wireless
Wi-Fi Discovery
GPS Mapping
Wireless Traffic Analysis
Launching Attacks
Let's Go Look-ng
Cracking Wi-Fi Encryption
Let's See How Much Damage We Can Do!
Summary
Hacking Bluetooth
Hacking Bluetooth
The Threats
New Terms
All About Bluetooth
Security
Summary
Countermeasures
Countermeasures
Bluetooth
Rogue APs
6 Layers of Wireless
Best Practices
Tools
Summary

Section 1: Basics practice examples
Lecture 1
Introduction
09:01
Lecture 2
Necessary software
04:21
Lecture 3
APK1 # 2
08:05
Lecture 4
1 - # PART3
07:28
Lecture 5
1 - # part4
06:13
Lecture 6
2 - # part1
06:54
Lecture 7
2 - # part2
05:28
Lecture 8
2 - # part3
02:59
Lecture 9
2 - # part4
01:40
Lecture 10
3 - # part1
04:37
Lecture 11
3 - # part2
12:42
Lecture 12
3 - # part3
01:48
Lecture 13
3 - # part4
11:59
Lecture 14
4 - # part1
04:03
Lecture 15
4 - # part2
06:13
Lecture 16
4 - # part3
07:59
Lecture 17
4 - # part4
09:57
Lecture 18
4 - # part5
06:46
Lecture 19
5 - # part1
01:47
Lecture 20
5 - # part2
04:02
Lecture 21
5 - # part3
12:13
Lecture 22
5 - # part4
06:00
Lecture 23
5 - # part5
02:29
Lecture 24
5 - # part6
02:53
Section 2: Python Networking Basics
Lecture 25
Arguments
07:59
Lecture 26
Dictionaries introduction
03:49
Lecture 27
Dictionary methods
06:01
Light th 28
Dictionary methods 2
06:01
Lecture 29
Data Types
03:46
Lecture 30
dir and help
02:41
Lecture 31
Break, Continue, Pass
07:12
Lecture 32
Booleans and logical operators
06:45
Lecture 33
Classes and Inheritance
06:50
lecture 34
Classes and Objects
13:06
lecture 35
Exceptions
02:52
Section 3: Loops
lecture 36
If Elif Else conditionals
13:52
lecture 37
If Elif Else conditionals 2
13:52
lecture 38
If For While nesting
07:27
lecture 39
Functions
10 28
Lecture 40
Lambda functions
07:00
Lecture 41
List Set Dictionary comprehensions
05:47
Lecture 42
Lists introduction
04:03
Lecture 43
List methods
09:14
Lecture 44
List slices
06:13
Lecture 45
Try Except Else Finally
10:59
Lecture 46
Map, Filter, Reduce
06:24
Lecture 47
Modules and importing
16:03
Section 4: Files
Lecture 48
Python scripts
04:02
Lecture 49
File writing and appending
10:11
Lecture 50
File opening and read ing
08:43
Lecture 51
File closing The method with
03:08
Lecture 52
Namespaces
12:32
Lecture 53
Numbers and math operators
08:04
Lecture 54
Planning the application
01:30
Lecture 55
Planning the applications # 1
01:30
Lecture 56
Python passing argument
06:13
Lecture 57
Python interacting with MySQL
09:59
Lecture 58
Python interpreter
07:17
Lecture 59
Python networking with Scapy. Creating your own packets.
11:50
Lecture 60
Python networking with SNMP
17:32
Lecture 61
Python networking with SSH
13:38
Lecture 62
Python networking with Telnet
16:40
Lecture 63
Some advice on coding
06:21
Lecture 64
Linking VirtualBox to the GNS3 network
08:10
lecture 65
GNS3 Setup
08:25
lecture 66
python-programming-for-real- life-networking-use- 2336402
01:52
lecture 67
python-programming-for-real- life-networking-use- 2678380
01:52
lecture 68
python -programming-for-real-life- networking-use- 2713592
04:36
Lecture 69
python-programming-for-real- life-networking-use- 2727964
05:22
Lecture 70
python-programming-for-real- life-networking -use-2754060
04:38
Lecture 71
python-programming-for-real- life-networking-use- 2754706
05:26
Lecture 72
Sets introduction
04:45
Lecture 73
Set methods
03:33
Lecture 74
Short introduction
03:21
Lecture 75
up the MySQL Setting database
11:44
Section 5: Strings
lecture 76
introduction
07:26
lecture 77
String slices
09:23
Lecture 78
String operators and formatting
05:00
Lecture 79
String methods
08:26
Section 6: testing
Lecture 80
Testing the application 2
03:41
Lecture 81
Testing the application
03:11
Lecture 82
The re.findall and methods re.sub
06:38
Lecture 83
The re.match and re.search methods
19:48
Lecture 84
Threading basics
06:54
Section 7: Working with GNS3 software
Lecture 85
Tuples introduction
05:54
Lecture 86
Tuple methods
04:24
Lecture 87
User input
03:51
Lecture 88
Variables
07:18
Lecture 89
While While-Else loops
05:27

... or jump to: 2017
New People
  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends

J

  • 0 friends

J

  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends
  • 0 friends