Develop your understanding of network administration by gaining a certifiable knowledge of Security+ by CompTIA. Learn how to secure and manage all facets of your network from CPU cycles to software used by individuals or across a network. Security+ is the next level to attain certification for every IT network administrator. This course will prepare you to pass the CompTIA� Security+ certification exam SY0-201.
Benefits
Implement and maintain an effective security strategy within your company�s network infrastructure
Our courses meet or exceed all CompTIA� certification objectives for exam SY0-201
Learn the knowledge of systems security, network infrastructure, access control, assessments and audits
Session 1
Section A: Introduction
� Prerequisites
� Knowledge Domains
� Security Importance
� Applications
Section B: Security Requirements
� Requirements
� Classification
� Due Care
� Due Diligence
� Due Process
� User Education
� HR Security
Section C: Security Threats
� Understanding Threats
� Viruses and Worms
� Trojans, Spyware, and Malware
� Rootkits
� Spam Filtering
� Botnets
Section D: Privilege Escalation
� Initial Entry
� Escalation Methods
� After Escalation
� Performing a Logic Bomb
Section E: Hardware Security Risks
� BIOS
� USB Devices
� Removable Storage
� Cell Phones
Section F: Network Vulnerabilities
� Vulnerable Devices
� Weak Passwords
� Backdoors
� Denial of Service
� Vampire Taps
Section G: Infrastructure Risks
� Old Protocols
� TCP/IP Issues
� Null Sessions
� Spoofing
� Man-in-the-Middle
� Replay Attacks
� DDoS
� DNS Vulnerabilities
� ARP Poisoning
Session 2
Section A: Wireless Vulnerabilities
� Wireless LANs
� Wi-Fi
� Data Emanation
� War Driving
� Default Behaviors
� Rogue APs
� Hijacking
Section B: Wireless Encryption
� Encryption Cracking
� WEP
� Authentication
� Understanding WEP
� WEP Key Problems
� Weak Initialization Vectors
Section C: Personal Device Security
� Portable Devices
� Bluejacking
� Bluesnarfing
� Blackjacking
� Laptops
Section D: Authentication Fundamentals
� Identification
� Authentication
� One Factor
� Multiple Factors
� Single Sign-On
Section E: Authentication Hardware
� Thumb Scanners
� FAR and FRR
� Smart Cards
� RFID
Section F: Authentication Protocols
� Understanding Protocols
� PAP and CHAP
� LAN Manager
� NTLM
� NTLMv2
Section G: Advanced Authentication Protocols
� Kerberos
� Kerberos Tickets
� Kerberos Access
� LDAP
� 802.1X/RADIUS
� TACACS
� RAS
Section H: Users, Groups, and Roles
� Active Directory
� Users
� Groups
� Group Strategy
� Guidelines
� Roles
Section I: Authorization Models
� Group Policy Editor
� Password Policies
� Lockout Policies
� Creating Accounts
� Account Parameters
Session 3
Section A: ACLs
� Managing Folder Access
� Network Resource Permissions
Section B: Access Control Methods
� MAC
� DAC
� RBAC
� Least Privilege
� Implicit Deny
� Duty Separation
Section C: Remote Access Security
� Remote Access
� RA Encryption
� RA Authentication
� Enabling RAS
� RAS Authentication Options
Section D: Physical Security
� Understanding Physical Security
� Affecting Factors
� Access Control
� Facility Access Checklist
� Internal Access Checklist
� Network Access Checklist
Section E: OS Hardening
� Patches
� Service Packs
� Patch Management
� Linux Hardening
� Windows Hardening
� Creating Security Templates
� Security Analysis
Section F: Application Security
� Buffer Overflows
� Dependencies
� Stack-Based Overflows
� Heap-Based Overflows
� After the Attack
� Countermeasures
� Instant Messaging
� P2P Networks
Section G: Web Application Security
� Web Servers
� Communications
� Common Attacks
� Web Applications
� ActiveX and Java
� XSS
� Browser Options
� Cookies
� Input Validation
Section H: E-mail Security
� E-mail Protocols
� E-mail Threats
� E-mail Authentication
� Confidentiality
� SMTP Relay
� Spam Solutions
Session 4
Section A: Client Security Solutions
� avast Software
� Spam Filtering
� Pop-Up Blocking
� Personal Firewalls
� HIDS
Section B: Virtualization and Security
� Virtualization Defined
� Benefits
� Scenarios
� Virtual PC
� Hyper-V
� VMware
� Planning
� Security Issues
Section C: Network Firewalls
� Understanding Firewalls
� Firewall Types
� Firewall Installation
� Well Known Ports
� Port Blocking
Section D: Network Security Design
� Subnetting
� Virtual LANs
� Connecting Networks
� DMZ
� NAT
� NAC
Section E: Telephony Security
� Traditional PBX
� VoIP
� SIP Security
� H.323 Security
Section F: Intrusion Detection and Prevention
� Intrusion Monitoring
� IDS Solutions
� Detection Methods
� IPS Solutions
� IPS Detection States
� Intrusion Indications
� IDS Implementations
� Intrusion Responses
� Honeypots
Section G: Controlling Internet Access
� Proxy Servers
� Internet Filters
� Creating a Firewall Rule
Section H: Protocol Analyzers
� Installing Wireshark
� Capturing E-mail Logon
� Creating HTTP Filter
� Viewing Passwords
Session 5
Section A: Wireless Network Security
� War Driving
� SSID Issues
� Rogue APs
� Weak Encryption
� Configuring WPA
Section B: Monitoring Systems
� Performance Tools
� Task Manager
� Performance Snap-In
� Baselines
� Creating a Baseline
� Creating a Second Baseline
� Comparing Baselines with Excel
Section C: Scanning the Network
� Port Scanning
� Angry IP Scanner
� Scanning Devices
� Service Enumeration
� Configuring Zenmap GUI
� Nmap Scanning
Section D: Vulnerability Scanning
� Sectools.org
� OVAL
� National Vulnerability Database
� Password Cracker
� Pen Testing
Section E: Logging and Auditing
� Importance of Logs
� DNS Logs
� System Logs
� Performance Logs
� Access Logs
� Firewall Logs
� Antivirus Logs
� Auditing
Section F: Cryptography 101
� Encryption
� Simple Encryption
� CIA
� Non-Repudiation
� Whole Disk
� Key Management
� Steganography
� Encryption Testing
� TPM
Section G: Encryption Algorithms
� Encryption Types
� Key Factors
� DES
� 3DES
� RSA
� ECC
� PGP
� AES
� RC4
� Secure Transfer
� One-Time Pad
Session 6
Section A: Encryption Protocols and Hashing
� Hashing
� Hashing Protocols
� Digital Signatures
� SSL/TLS
� TLS Goals
� SSL Operations
� PPTP
� L2TP
� IPSec
� HTTP Solutions
� SSH
Section B: Public Key Cryptography
� Certificates
� PK Cryptography
� PKI Components
� PKI Processes
Section C: Risk Assessments
� Risk Management
� Asset Identification
� Threat Identification
� Risk Assessment
� Risk Tracking
Section D: Redundancy Planning
� Failure Points
� RAID
� Spare Parts
� Redundant Servers
� Redundant ISP
� Power Supply
� Spare Sites
Section E: Incident Response
� Incident Defined
� IR Process
� First Responders
� Computer Forensics
� Chain of Custody
� Reporting
� Damage Control
Section F: Disaster Recovery
� Planning
� Backup Practices
� Backup Methods
� Backup Types
� Media Rotation
� Restoration
� DR Exercises
Section G: Social Engineering
� Definition
� Example Attacks
� Dumpster Diving
� Passive Attacks
� Inside/Outside Attacks
� Reverse
� Phishing Attacks
Section H: Security Policies
� Importance
� General Policies
� Functional Policies
� sans.org
Download
http://rapidshare.com/files/231974764/BM_Learnkey_Security_CD1_UDS.part1.rar
http://rapidshare.com/files/231974592/BM_Learnkey_Security_CD1_UDS.part2.rar
http://rapidshare.com/files/231974467/BM_Learnkey_Security_CD1_UDS.part3.rar
http://rapidshare.com/files/231974748/BM_Learnkey_Security_CD2_UDS.part1.rar
http://rapidshare.com/files/231974600/BM_Learnkey_Security_CD2_UDS.part2.rar
http://rapidshare.com/files/231974507/BM_Learnkey_Security_CD2_UDS.part3.rar
http://rapidshare.com/files/231974657/BM_Learnkey_Security_CD3_UDS.part1.rar
http://rapidshare.com/files/231974706/BM_Learnkey_Security_CD3_UDS.part2.rar
http://rapidshare.com/files/231974398/BM_Learnkey_Security_CD3_UDS.part3.rar
http://rapidshare.com/files/231974601/BM_Learnkey_Security_CD4_UDS.part1.rar
http://rapidshare.com/files/231974695/BM_Learnkey_Security_CD4_UDS.part2.rar
http://rapidshare.com/files/231974364/BM_Learnkey_Security_Upgrade_Patch_UDS.rar
Readme
Password : ut@updatesofts.com
No comments:
Post a Comment