May 15, 2009

Learnkey Security+ 4cd's 1.60 GB






Develop your understanding of network administration by gaining a certifiable knowledge of Security+ by CompTIA. Learn how to secure and manage all facets of your network from CPU cycles to software used by individuals or across a network. Security+ is the next level to attain certification for every IT network administrator. This course will prepare you to pass the CompTIA� Security+ certification exam SY0-201.

Benefits

Implement and maintain an effective security strategy within your company�s network infrastructure
Our courses meet or exceed all CompTIA� certification objectives for exam SY0-201
Learn the knowledge of systems security, network infrastructure, access control, assessments and audits

Session 1
Section A: Introduction
� Prerequisites
� Knowledge Domains
� Security Importance
� Applications

Section B: Security Requirements
� Requirements
� Classification
� Due Care
� Due Diligence
� Due Process
� User Education
� HR Security

Section C: Security Threats
� Understanding Threats
� Viruses and Worms
� Trojans, Spyware, and Malware
� Rootkits
� Spam Filtering
� Botnets

Section D: Privilege Escalation
� Initial Entry
� Escalation Methods
� After Escalation
� Performing a Logic Bomb

Section E: Hardware Security Risks
� BIOS
� USB Devices
� Removable Storage
� Cell Phones

Section F: Network Vulnerabilities
� Vulnerable Devices
� Weak Passwords
� Backdoors
� Denial of Service
� Vampire Taps

Section G: Infrastructure Risks
� Old Protocols
� TCP/IP Issues
� Null Sessions
� Spoofing
� Man-in-the-Middle
� Replay Attacks
� DDoS
� DNS Vulnerabilities
� ARP Poisoning
Session 2
Section A: Wireless Vulnerabilities
� Wireless LANs
� Wi-Fi
� Data Emanation
� War Driving
� Default Behaviors
� Rogue APs
� Hijacking

Section B: Wireless Encryption
� Encryption Cracking
� WEP
� Authentication
� Understanding WEP
� WEP Key Problems
� Weak Initialization Vectors

Section C: Personal Device Security
� Portable Devices
� Bluejacking
� Bluesnarfing
� Blackjacking
� Laptops

Section D: Authentication Fundamentals
� Identification
� Authentication
� One Factor
� Multiple Factors
� Single Sign-On

Section E: Authentication Hardware
� Thumb Scanners
� FAR and FRR
� Smart Cards
� RFID

Section F: Authentication Protocols
� Understanding Protocols
� PAP and CHAP
� LAN Manager
� NTLM
� NTLMv2

Section G: Advanced Authentication Protocols
� Kerberos
� Kerberos Tickets
� Kerberos Access
� LDAP
� 802.1X/RADIUS
� TACACS
� RAS

Section H: Users, Groups, and Roles
� Active Directory
� Users
� Groups
� Group Strategy
� Guidelines
� Roles

Section I: Authorization Models
� Group Policy Editor
� Password Policies
� Lockout Policies
� Creating Accounts
� Account Parameters
Session 3
Section A: ACLs
� Managing Folder Access
� Network Resource Permissions

Section B: Access Control Methods
� MAC
� DAC
� RBAC
� Least Privilege
� Implicit Deny
� Duty Separation

Section C: Remote Access Security
� Remote Access
� RA Encryption
� RA Authentication
� Enabling RAS
� RAS Authentication Options

Section D: Physical Security
� Understanding Physical Security
� Affecting Factors
� Access Control
� Facility Access Checklist
� Internal Access Checklist
� Network Access Checklist

Section E: OS Hardening
� Patches
� Service Packs
� Patch Management
� Linux Hardening
� Windows Hardening
� Creating Security Templates
� Security Analysis

Section F: Application Security
� Buffer Overflows
� Dependencies
� Stack-Based Overflows
� Heap-Based Overflows
� After the Attack
� Countermeasures
� Instant Messaging
� P2P Networks

Section G: Web Application Security
� Web Servers
� Communications
� Common Attacks
� Web Applications
� ActiveX and Java
� XSS
� Browser Options
� Cookies
� Input Validation

Section H: E-mail Security
� E-mail Protocols
� E-mail Threats
� E-mail Authentication
� Confidentiality
� SMTP Relay
� Spam Solutions


Session 4
Section A: Client Security Solutions
� avast Software
� Spam Filtering
� Pop-Up Blocking
� Personal Firewalls
� HIDS

Section B: Virtualization and Security
� Virtualization Defined
� Benefits
� Scenarios
� Virtual PC
� Hyper-V
� VMware
� Planning
� Security Issues

Section C: Network Firewalls
� Understanding Firewalls
� Firewall Types
� Firewall Installation
� Well Known Ports
� Port Blocking

Section D: Network Security Design
� Subnetting
� Virtual LANs
� Connecting Networks
� DMZ
� NAT
� NAC

Section E: Telephony Security
� Traditional PBX
� VoIP
� SIP Security
� H.323 Security

Section F: Intrusion Detection and Prevention
� Intrusion Monitoring
� IDS Solutions
� Detection Methods
� IPS Solutions
� IPS Detection States
� Intrusion Indications
� IDS Implementations
� Intrusion Responses
� Honeypots

Section G: Controlling Internet Access
� Proxy Servers
� Internet Filters
� Creating a Firewall Rule

Section H: Protocol Analyzers
� Installing Wireshark
� Capturing E-mail Logon
� Creating HTTP Filter
� Viewing Passwords
Session 5
Section A: Wireless Network Security
� War Driving
� SSID Issues
� Rogue APs
� Weak Encryption
� Configuring WPA

Section B: Monitoring Systems
� Performance Tools
� Task Manager
� Performance Snap-In
� Baselines
� Creating a Baseline
� Creating a Second Baseline
� Comparing Baselines with Excel

Section C: Scanning the Network
� Port Scanning
� Angry IP Scanner
� Scanning Devices
� Service Enumeration
� Configuring Zenmap GUI
� Nmap Scanning

Section D: Vulnerability Scanning
� Sectools.org
� OVAL
� National Vulnerability Database
� Password Cracker
� Pen Testing

Section E: Logging and Auditing
� Importance of Logs
� DNS Logs
� System Logs
� Performance Logs
� Access Logs
� Firewall Logs
� Antivirus Logs
� Auditing

Section F: Cryptography 101
� Encryption
� Simple Encryption
� CIA
� Non-Repudiation
� Whole Disk
� Key Management
� Steganography
� Encryption Testing
� TPM

Section G: Encryption Algorithms
� Encryption Types
� Key Factors
� DES
� 3DES
� RSA
� ECC
� PGP
� AES
� RC4
� Secure Transfer
� One-Time Pad
Session 6
Section A: Encryption Protocols and Hashing
� Hashing
� Hashing Protocols
� Digital Signatures
� SSL/TLS
� TLS Goals
� SSL Operations
� PPTP
� L2TP
� IPSec
� HTTP Solutions
� SSH

Section B: Public Key Cryptography
� Certificates
� PK Cryptography
� PKI Components
� PKI Processes

Section C: Risk Assessments
� Risk Management
� Asset Identification
� Threat Identification
� Risk Assessment
� Risk Tracking

Section D: Redundancy Planning
� Failure Points
� RAID
� Spare Parts
� Redundant Servers
� Redundant ISP
� Power Supply
� Spare Sites

Section E: Incident Response
� Incident Defined
� IR Process
� First Responders
� Computer Forensics
� Chain of Custody
� Reporting
� Damage Control

Section F: Disaster Recovery
� Planning
� Backup Practices
� Backup Methods
� Backup Types
� Media Rotation
� Restoration
� DR Exercises

Section G: Social Engineering
� Definition
� Example Attacks
� Dumpster Diving
� Passive Attacks
� Inside/Outside Attacks
� Reverse
� Phishing Attacks

Section H: Security Policies
� Importance
� General Policies
� Functional Policies
� sans.org

Download
http://rapidshare.com/files/231974764/BM_Learnkey_Security_CD1_UDS.part1.rar
http://rapidshare.com/files/231974592/BM_Learnkey_Security_CD1_UDS.part2.rar
http://rapidshare.com/files/231974467/BM_Learnkey_Security_CD1_UDS.part3.rar

http://rapidshare.com/files/231974748/BM_Learnkey_Security_CD2_UDS.part1.rar
http://rapidshare.com/files/231974600/BM_Learnkey_Security_CD2_UDS.part2.rar
http://rapidshare.com/files/231974507/BM_Learnkey_Security_CD2_UDS.part3.rar

http://rapidshare.com/files/231974657/BM_Learnkey_Security_CD3_UDS.part1.rar
http://rapidshare.com/files/231974706/BM_Learnkey_Security_CD3_UDS.part2.rar
http://rapidshare.com/files/231974398/BM_Learnkey_Security_CD3_UDS.part3.rar

http://rapidshare.com/files/231974601/BM_Learnkey_Security_CD4_UDS.part1.rar
http://rapidshare.com/files/231974695/BM_Learnkey_Security_CD4_UDS.part2.rar

http://rapidshare.com/files/231974364/BM_Learnkey_Security_Upgrade_Patch_UDS.rar

Readme
Password : ut@updatesofts.com

No comments:

Post a Comment

This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us at youzhny197@gmail.com, we will immediately respond to you.