Update Status Via Olog Spectech

Status Updater V.2.0

Join The Community

Subscribe via Email
Premium WordPress Themes

Tampilkan postingan dengan label Security. Tampilkan semua postingan
Tampilkan postingan dengan label Security. Tampilkan semua postingan

Kamis, 02 Juni 2011

TestOut: LX0-101-102 Linux+ Course


TestOut: LX0-101-102 Linux+ Course
English | ISO | 3.87GB
Genre: eLearning

LabSim Linux+ Powered by LPI is designed to meet the revised and standardized certification objectives from CompTIA and the Linux Professional Institute (LPI). With all new labs and content, LabSim Linux+ Powered by LPI is a single LabSim course that prepares students to pass both of the new CompTIA Linux+ exams, LX0-101 and LX0-102, and become Linux+ certified.

Linux+ Powered by LPI Certification Objectives
The CompTIA Linux+ certification validates the ability to manage Linux systems from the command line, administer users, understand file permissions, software configurations, and management of Linux-based clients, server systems and security.

Topics include:
Installation
Boot and Shutdown
User Interfaces and Desktops
Software Installation
Users and Groups
Disk and File System Management
Hardware Installation
Processes and System Services
System Monitoring
Networking
Security

Note:
After you install the Labsim following the crack-reademe.txt instructions you have to mount the ISO provided and install the course using the native labsim installer located on the middle left hand side after you login.
Keep in mind you can also install other listed testout courses through there.

More info:
_http://testout.com/products/linuxplus/LX0-101-102-Linuxplus.htm


Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/file/1078578934/TestOut-Linux+-LPI.part01.rar
http://www.filesonic.com/file/1078578974/TestOut-Linux+-LPI.part02.rar
http://www.filesonic.com/file/1078584564/TestOut-Linux+-LPI.part03.rar
http://www.filesonic.com/file/1078590664/TestOut-Linux+-LPI.part04.rar
http://www.filesonic.com/file/1078595724/TestOut-Linux+-LPI.part05.rar
http://www.filesonic.com/file/1078595814/TestOut-Linux+-LPI.part06.rar
http://www.filesonic.com/file/1078595864/TestOut-Linux+-LPI.part07.rar
http://www.filesonic.com/file/1078600544/TestOut-Linux+-LPI.part08.rar
http://www.filesonic.com/file/1078600684/TestOut-Linux+-LPI.part09.rar
http://www.filesonic.com/file/1078600754/TestOut-Linux+-LPI.part10.rar
http://www.filesonic.com/file/1078605134/TestOut-Linux+-LPI.part11.rar
http://www.filesonic.com/file/1078605224/TestOut-Linux+-LPI.part12.rar
http://www.filesonic.com/file/1078611604/TestOut-Linux+-LPI.part13.rar
http://www.filesonic.com/file/1078611754/TestOut-Linux+-LPI.part14.rar
http://www.filesonic.com/file/1078616394/TestOut-Linux+-LPI.part15.rar
http://www.filesonic.com/file/1078616384/TestOut-Linux+-LPI.part16.rar

Mirror
http://www.wupload.com/file/3074868/TestOut-Linux+-LPI.part01.rar
http://www.wupload.com/file/3074874/TestOut-Linux+-LPI.part03.rar
http://www.wupload.com/file/3075196/TestOut-Linux+-LPI.part05.rar
http://www.wupload.com/file/3075204/TestOut-Linux+-LPI.part06.rar
http://www.wupload.com/file/3075560/TestOut-Linux+-LPI.part10.rar
http://www.wupload.com/file/3075783/TestOut-Linux+-LPI.part08.rar
http://www.wupload.com/file/3075791/TestOut-Linux+-LPI.part09.rar
http://www.wupload.com/file/3075796/TestOut-Linux+-LPI.part11.rar
http://www.wupload.com/file/3076047/TestOut-Linux+-LPI.part14.rar
http://www.wupload.com/file/3076331/TestOut-Linux+-LPI.part16.rar
http://www.wupload.com/file/3076592/TestOut-Linux+-LPI.part15.rar
http://www.wupload.com/file/3114548/TestOut-Linux+-LPI.part02.rar
http://www.wupload.com/file/3114963/TestOut-Linux+-LPI.part12.rar
http://www.wupload.com/file/3169775/TestOut-Linux+-LPI.part04.rar
http://www.wupload.com/file/3169776/TestOut-Linux+-LPI.part07.rar
http://www.wupload.com/file/3169777/TestOut-Linux+-LPI.part12.rar
http://www.wupload.com/file/3169778/TestOut-Linux+-LPI.part13.rar

Kamis, 12 Mei 2011

CBT Nuggets Comptia Strata Sales Fundamentals of IT Technology Sales DVD


CBT Nuggets Comptia Strata Sales Fundamentals of IT Technology Sales DVD
English | WMV | 10hours | 800x600 | WMA 44100Hz | 1.1Gb
Genre: eLearning

If your job includes significant contact with IT professionals, you need this training. Whether you're in IT sales or an IT newcomer looking for an entry-level, vendor-neutral certification, this training gives you the background you need to converse knowledgeably with IT pros or start down your own IT career path.

By the time you've finished watching, you'll know how to speak about IT intelligently with IT pros/decision makers, visually recognize all computer hardware and software and understand information technology -- from operating systems to hardware to licensing and beyond.

Plus you'll be ready for CompTIA's Strata for IT Sales exam.


Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/file/967551194/cncssfofittsd.part1.rar
http://www.filesonic.com/file/967551304/cncssfofittsd.part2.rar
http://www.filesonic.com/file/967578804/cncssfofittsd.part3.rar
http://www.filesonic.com/file/967435734/cncssfofittsd.part3.rar
http://www.filesonic.com/file/967552004/cncssfofittsd.part4.rar
http://www.filesonic.com/file/967552144/cncssfofittsd.part5.rar
http://www.filesonic.com/file/967561464/cncssfofittsd.part6.rar
http://www.filesonic.com/file/967552284/cncssfofittsd.part7.rar

Mirror
http://www.uploadstation.com/file/bUChSDN/cncssfofittsd.part1.rar
http://www.uploadstation.com/file/aFzqgDU/cncssfofittsd.part2.rar
http://www.uploadstation.com/file/RPhYmZA/cncssfofittsd.part3.rar
http://www.uploadstation.com/file/gKS5ZER/cncssfofittsd.part4.rar
http://www.uploadstation.com/file/MuZFXwF/cncssfofittsd.part5.rar
http://www.uploadstation.com/file/dSnQayk/cncssfofittsd.part6.rar
http://www.uploadstation.com/file/d5MEE7j/cncssfofittsd.part7.rar

Minggu, 08 Mei 2011

Professor Messer Complete CompTIA A + Training Course


Professor Messer Complete CompTIA A + Training Course | 2.46 GB
Genre: eLearning

All the video's in the Professor Messer's Video course, ,these videos were made in 2010.
Videos:
CompTIA 220-701 A+ Essentials
Section 1: Hardware
1.0 – Free A+ Training Course Overview (19:55)
1.0 – Introduction to Personal Computers (25:46)
1.1 – Storage Devices (20:33)
1.2 – Motherboard Form Factors (15:22)
1.2 – I/O Interfaces (16:43)
1.2 – Memory Slots (9:19)
1.2 – Processor Sockets (7:39)
1.2 – Bus Architectures and Expansion Slots (20:47)
1.2 – PATA and SATA (15:05)
1.2 – RAID (13:16)
1.2 – Chipsets (10:57)
1.2 – BIOS and CMOS (24:32)
1.3 – Computer Power (21:33)
1.4 – CPU Technologies (15:15)
1.5 – Cooling Systems (12:04)
1.6 – An Overview of Memory (13:32)
1.6 – Identifying Memory Types (19:47)
1.7 – Display Devices (13:20)
1.8 – Input Devices (15:27)
1.9 – Adapter Cards (13:07)
1.10 – Laptop Expansion Devices (9:10)
1.10 – Laptop Communications (9:05)
1.10 – Laptop Power Technologies (9:13)
1.10 – Laptop Input Devices (5:46)
1.11 – Printer Types (14:22)
1.11 – Printer Components, Consumables, and Interfaces (13:54)

Section 2: Troubleshooting, Repair and Maintenance
2.1 – The Troubleshooting Process (15:08)
2.2 – Operating System Issues (14:23)
2.2 – Hardware Issues (9:23)
2.2 – Documentation and Resources (9:49)
2.3 – Troubleshooting Printing (13:48)
2.4 – Diagnosing and Troubleshooting Laptops (19:42)
2.5 – Preventive Maintenance (11:19)

Section 3: Operating Systems and Software:
3.0 – Using a Virtual Machine (13:17)
3.1 – Operating Systems (26:43)
3.2 – The Windows User Interface (14:25)
3.2 – Command Line Utilities (14:57)
3.3 – Directories and Files (26:52)
3.3 – Planning a Windows Installation (15:31)
3.3 – Planning a Windows 7 Installation (12:51)
3.3 – Installing Windows 7 (14:59)
3.3 – Installing Windows Vista (14:03)
3.3 – Installing Windows XP (14:41)
3.3 – Installing Windows 2000 (11:18)
3.3 – Upgrading Windows (23:57)
3.3 – Post-Installation Tasks (19:48)
3.4 – Boot Options (23:32)

Section 4: Networking:
4.1 – Protocols and Addresses (24:10)
4.1 – Common Ports (11:15)
4.1 – Network Technologies (18:20)
4.1 – IPv4 and IPv6 (9:38)
4.2 – Network Cabling and Connectors (16:23)
4.3 – Network Types (13:23)
4.3 – Wireless Networking (21:11)

Section 5: Security:
5.1 – Security Fundamentals (18:46)
5.2 – Security Technologies (17:15)

Section 6: Operational Procedures:
6.1 – Managing Safety Hazards (17:30)
6.2 – The Human Component: Communication (9:15)
6.2 – The Human Component: Professionalism (13:36)

CompTIA 220-702 Practical Application
Section 1: Hardware
1.1 – Installing and Configuring Storage Devices (12:30)
1.1 – Installing and Configuring Motherboards (14:29)
1.1 – Installing and Configuring Power Supplies (7:10)
1.1 – Installing and Configuring Processors (6:46)
1.1 – Installing and Configuring Memory (9:41)
1.1 – Installing and Configuring Adapter Cards (7:33)
1.1 – Installing and Configuring Cooling Systems (10:50)
1.2 – Troubleshooting Storage Devices (7:42)
1.2 – Troubleshooting Motherboards (11:22)
1.2 – Troubleshooting Power Supplies (9:59)
1.2 – Troubleshooting Processors (8:21)
1.2 – Troubleshooting Memory (8:59)
1.2 – Troubleshooting Adapter Cards (6:21)
1.2 – Troubleshooting Cooling Systems (5:25)
1.3 – Installing and Troubleshooting Laptop Components (10:22)
1.4 – The A+ Toolbag (9:30)
1.5 – Troubleshooting Printer Problems (12:49)

Section 2: Operating Systems:
2.1 – Command Line Troubleshooting (29:45)
2.2 – Differentiating Between Windows Versions (8:50)
2.3 – Disk Management Tools (10:21)
2.3 – Managing Disks (18:19)
2.3 – Administrative Tools (11:05)
2.3 – Managing Devices (15:05)
2.3 – Managing Tasks (12:16)
2.3 – Other System Tools (13:23)
2.4 – Common Operational Issues (9:54)
2.4 – Troubleshooting Error Messages (17:36)
2.4 – System Performance and Optimization (14:25)

Section 3: Networking:
3.1 – Troubleshooting TCP/IP Settings (10:46)
3.1 – Troubleshooting Mail, FTP, and Proxy Settings (9:31)
3.1 – Network Troubleshooting Tools (16:34)
3.1 – Firewalls and Secure Connections (13:06)
3.2 – Network Connections (14:39)
3.2 – Wireless Networks (12:55)
3.2 – Installing and Configuring Wireless Routers (20:04)

Section 4: Security:
4.1 – Resolving Malware Issues (15:21)
4.2 – Operating System Security Issues (13:43)



Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.uploadstation.com/file/aRXRzV3/PMTR.part01.rar
http://www.uploadstation.com/file/hyWC83r/PMTR.part02.rar
http://www.uploadstation.com/file/mgTkWSm/PMTR.part03.rar
http://www.uploadstation.com/file/awSF8Kd/PMTR.part04.rar
http://www.uploadstation.com/file/dEmFqmK/PMTR.part05.rar
http://www.uploadstation.com/file/9qTUJX4/PMTR.part06.rar
http://www.uploadstation.com/file/CcdUJWP/PMTR.part07.rar
http://www.uploadstation.com/file/EeCMDCc/PMTR.part08.rar
http://www.uploadstation.com/file/xvtBrVN/PMTR.part09.rar
http://www.uploadstation.com/file/Fxnmhjf/PMTR.part10.rar
http://www.uploadstation.com/file/xYnjmmb/PMTR.part11.rar

Mirror
http://www.uploadstation.com/file/aRXRzV3/PMTR.part01.rar
http://www.uploadstation.com/file/hyWC83r/PMTR.part02.rar
http://www.uploadstation.com/file/mgTkWSm/PMTR.part03.rar
http://www.uploadstation.com/file/awSF8Kd/PMTR.part04.rar
http://www.uploadstation.com/file/dEmFqmK/PMTR.part05.rar
http://www.uploadstation.com/file/9qTUJX4/PMTR.part06.rar
http://www.uploadstation.com/file/CcdUJWP/PMTR.part07.rar
http://www.uploadstation.com/file/EeCMDCc/PMTR.part08.rar
http://www.uploadstation.com/file/xvtBrVN/PMTR.part09.rar
http://www.uploadstation.com/file/Fxnmhjf/PMTR.part10.rar
http://www.uploadstation.com/file/xYnjmmb/PMTR.part11.rar

Selasa, 03 Mei 2011

Wireshark University Network Training Self DVD5 WMV-WMV3


Wireshark University Network Training Self DVD5 WMV-WMV3
English | WMV | WMV3 | 800x600 | 120 Min | 29.970 fps 150 kbps | MP3 128 kbps 22 KHz | 3,28GB
Genre: elearning

WSU01: Wireshark Functionality and Fundamentals
Learn to use Wireshark efficiently and effectively by placing your analyzer in an ideal location to capture traffic (even on a switched network). Learn to focus on key traffic using capture filters and display filters. Graph traffic, use navigation and colorization techniques and time values to easily spot network problems. Customize your Wireshark system and use the Expert system to identify problem areas. Learn how tshark, editcap, capinfos and other command-line tools work and test yourself by completing lab exercises.
WSU02: TCP/IP Network Analysis
This course focuses on both the normal and abnormal communications patterns of the TCP/IP suite and most common applications including ARP, ICMP, UDP, TCP, IPv4, DHCP, DNS, FTP, telnet, HTTP, POP and SMTP. Follow along as Laura explains the options for creating capture filters and display filters to view packets based on commands.
WSU03: Troubleshooting Network Performance
This course focuses on the cause of poor network performance including packet loss, retransmissions, high latency, low throughput rates, application errors, configuration faults, resolution problems and protocol behavior issues.
WSU04: Network Forensics and Security
This course focuses on network forensics including capture locations, stealth-mode capture, optimal capture and display filters, validating encrypted communications, reconnaissance processes, header and payload signatures, penetration tests, malware behavior and backdoor/virus communications.




Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/file/585508714/WCF.part01.rar
http://www.filesonic.com/file/585508914/WCF.part02.rar
http://www.filesonic.com/file/585511404/WCF.part03.rar
http://www.filesonic.com/file/585510834/WCF.part04.rar
http://www.filesonic.com/file/585512004/WCF.part05.rar
http://www.filesonic.com/file/585511914/WCF.part06.rar
http://www.filesonic.com/file/585511654/WCF.part07.rar
http://www.filesonic.com/file/585511484/WCF.part08.rar
http://www.filesonic.com/file/585512674/WCF.part09.rar
http://www.filesonic.com/file/887729534/WSVT.part01.rar
http://www.filesonic.com/file/887729134/WSVT.part02.rar
http://www.filesonic.com/file/887733934/WSVT.part03.rar
http://www.filesonic.com/file/887729604/WSVT.part04.rar
http://www.filesonic.com/file/887733244/WSVT.part05.rar
http://www.filesonic.com/file/887735724/WSVT.part06.rar
http://www.filesonic.com/file/887735774/WSVT.part07.rar
http://www.filesonic.com/file/887735154/WSVT.part08.rar
http://www.filesonic.com/file/887735794/WSVT.part09.rar
http://www.filesonic.com/file/887735184/WSVT.part10.rar
http://www.filesonic.com/file/887743044/WSVT.part11.rar
http://www.filesonic.com/file/887742644/WSVT.part12.rar
http://www.filesonic.com/file/887747944/WSVT.part13.rar
http://www.filesonic.com/file/887743014/WSVT.part14.rar

Mirror
http://www.uploadstation.com/file/5whVaS2/WSVT.part12.rar
http://www.uploadstation.com/file/mMastGs/WSVT.part13.rar
http://www.uploadstation.com/file/yhBKB9Y/WSVT.part10.rar
http://www.uploadstation.com/file/BeSH7Hg/WSVT.part11.rar
http://www.uploadstation.com/file/ZH7s94N/WSVT.part14.rar
http://www.uploadstation.com/file/ggvECsR/WSVT.part06.rar
http://www.uploadstation.com/file/UnFFYEB/WSVT.part09.rar
http://www.uploadstation.com/file/H4JpWWj/WSVT.part03.rar
http://www.uploadstation.com/file/2y2JCaK/WSVT.part07.rar
http://www.uploadstation.com/file/XRWsUWE/WSVT.part08.rar
http://www.uploadstation.com/file/DN5uv54/WSVT.part05.rar
http://www.uploadstation.com/file/ZVMCS7b/WSVT.part02.rar
http://www.uploadstation.com/file/PGrQVhN/WSVT.part04.rar
http://www.uploadstation.com/file/Q3rcDaM/WSVT.part01.rar

Kamis, 28 April 2011

VTC - CompTIA Security Plus 2011


VTC - CompTIA Security Plus 2011 | ISO | 401 MB
Genre: eLearning

Description Course:
CompTIA Security+ (2011 Objectives)
Author: Mike Chapple
SKU: 34211
ISBN: 1-936334-84-4
Duration: 7.5 hrs / 89 tutorials

Course Contents:

Introduction
About this Course (02:29)
CIA Triad (04:40)
Security Basics (05:15)
Networking
TCP/IP Networking (05:53)
IP Addressing (09:03)
Ports (04:00)
Domain Name Service (07:20)
Network Address Translation (03:19)
Routers & Switches (04:18)
Virtual LANs (04:00)
Routing & Switching Security (03:49)
Network Access Control (04:03)
Network Security Devices
Firewalls (05:37)
Firewall Rule Management (06:30)
Intrusion Detection & Prevention (05:24)
Web Security Devices (05:44)
Load Balancing (04:59)
Proxies (04:36)
Virtual Private Networks (04:34)
Network Security Techniques
Sniffers & Protocol Analyzers (06:09)
Simple Network Management Protocol (03:29)
Content Filtering (07:23)
Virtualization (06:32)
Cloud Computing (04:43)
Telephony Security (07:07)
Wireless Networking (06:01)
Wireless Security (06:38)
Security Policies & Awareness
Security Policies (06:10)
Information Classification (05:31)
Information Handling (03:10)
Information Disposal (04:43)
Business Practices (03:59)
Security Awareness Training (04:18)
Risk Management
Risk Assessment (06:25)
Risk Management (04:54)
Implementing Controls (03:52)
Reviews & Audits (06:17)
Change Management (05:05)
Compliance (04:25)
Social Networking & P2P (04:44)
Threat Awareness (05:45)
Incident Response
Incident Response Process (05:24)
System Forensics (04:54)
Network Forensics (06:22)
Physical Forensics (03:30)
Disaster Recovery & Business Continuity
Business Continuity (05:27)
Disaster Recovery (04:22)
Data Backups (05:02)
Redundancy & Fault Tolerance (08:42)
Environmental Controls (07:08)
Threats & Vulnerabilities
Malware (05:30)
Social Engineering (03:07)
Network Attacks (03:24)
Host-based Attacks (03:46)
Cookies & Session Hijacking (03:32)
Vulnerability Management
Vulnerability Scanning (04:12)
Penetration Testing (03:27)
Honeypots & Honeynets (03:12)
Application Security
Application Security (04:37)
Secure Coding (05:54)
Cross-Site Scripting Attacks (05:06)
Cross-Site Request Forgery Attacks (04:07)
Injection Attacks (05:57)
Host Security
Operating System Security (05:19)
Host Firewalls (06:38)
Patch Management (03:53)
Anti-Malware Techniques (04:15)
Mobile Device Security (05:23)
Data Loss Prevention (06:06)
Access Control & Identity Management
Physical Security (07:05)
Authentication & Authorization (04:16)
Password Security (06:20)
Multifactor Authenticaton (05:40)
Single Sign On (03:27)
Kerberos (05:53)
Access Controls (05:38)
Account Management (03:28)
Cryptography
Cryptography (03:55)
Encryption & Decryption (07:12)
Symmetric Cryptography (06:12)
Asymmetric Cryptography (06:38)
Hashing (04:04)
Digital Signatures (05:58)
Digital Certificates (06:03)
Transport Encryption (05:12)
IPSec (05:15)
Portable Device Encryption (03:28)
Conclusion
Wrap-Up (03:32)
Credits
About this Author (00:55)
Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/file/561804244/VTC.downeb.com
http://www.filesonic.com/file/561804284/VTC.downeb.com
http://www.filesonic.com/file/561804294/VTC.downeb.com
http://www.filesonic.com/file/561804414/VTC.downeb.com

Mirror
http://www.fileserve.com/file/NzK5hrA/VTC
http://www.fileserve.com/file/uA3SMwN/VTC
http://www.fileserve.com/file/nvRhrXt/VTC
http://www.fileserve.com/file/Fxz5VyM/VTC

Rabu, 20 April 2011

Black hat 2010


Black hat 2010
H264 | English | 1200x600 | MOV | 14.985 fps 416 kbps | MP3 64 kbps | 25.6 GB
Genre: eLearning

The official recordings from the Blackhat USA 2010 Conference

K1/K2 Welcome & Introduction to Black Hat USA 2010 / Keynote Speaker (Video Only)
Jeff Moss / Deputy Secretary: Jane Holl Lute
K3 Keynote Speaker (Video Only)
Gen (Ret.) Michael Hayden
BP1 State of SSL on the Internet: 2010 Survey, Results and Conclusions
Ivan Ristic
BP2 Becoming the Six-Million-Dollar Man
Gunter Ollmann
BP3 Defenseless in Depth
Alex Wheeler, Ryan Smith
BP4 Need a Hug? I’m Secure
Steve Ocepek, Charles Henderson
BP5 Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing
Francis Brown, Rob Ragan
BC1 Industrial Bug Mining – Extracting, Grading and Enriching the Ore of Exploits
Ben Nagy
BC2 Virtual Forensics
Christiaan Beek
BC3 Network Stream Debugging with Mallory
Raj Umadas, Jeremy Alleny
BC4 JavaSnoop: How to Hack Anything Written in Java
Arshan Dabirsiaghi
BC5 Exploiting the Forest with Trees
Meredith L. Patterson, Len Sassaman
CS1 How to Hack Millions of Routers
Craig Heffner
CS2 HTTPS Can Byte Me
Robert Hansen, Josh Sokol
CS3 Blitzableiter – The Release
FX
CS4 Hacking Browser’s DOM – Exploiting Ajax and RIA
Shreeraj Shah
CS5 Bad Memories
Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt, Dan Boneh
KEYNOTE (DISC 1)
BIG PICTURE (DISC 2)
Bugug Collectingollectingollectingollectingollectingollectingollectingollectingollecting (DISC 2)
CLIENT SIDE (DISC 2)




Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/folder/3980371

Mirror
http://www.fileserve.com/list/nS9j7Jh

Minggu, 10 April 2011

EC Council's Official CEH and Countermeasures v6 - 4 DVD


EC Council's Official CEH and Countermeasures v6 - 4 DVD ( with tool )
eLearning | 13.63 GB

The Certified Ethical Hacker (C|EH) is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.).An Ethical Hacker is one name given to a Penetration Tester. An ethical hacker is usually employed by an organization who trusts him to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Illegal hacking (i.e.; gaining unauthorized access to computer systems) is a crime in most countries, but penetration testing done by request of the owner of the targeted system(s) or network(s) is not, except in Germany.

A Certified Ethical Hacker has obtained a certification in how to look for the
weaknesses and vulnerabilities in target systems and uses the same knowledge and
tools as a hacker.

These are all the DVD materials for the CEH v6 exam training from EC-Council.
This is a fantastic class with a lot of knowledge. If you are interested in
ethical hacking this is release for you!

Course Description

This class will immerse the student into an interactive environment where they
will be shown how to scan, test, hack and secure their own systems. The lab
intensive environment gives each student in-depth knowledge and practical
experience with the current essential security systems. Students will begin by
understanding how perimeter defenses work and then be lead into scanning and
attacking their own networks, no real network is harmed. Students then learn how
intruders escalate privileges and what steps can be taken to secure a system.
Students will also learn about Intrusion Detection, Policy Creation, Social
Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student
leaves this intensive 5 day class they will have hands on understanding and
experience in Ethical Hacking. This course prepares you for EC-Council Certified
Ethical Hacker exam 312-50.

Who Should Attend

This course will significantly benefit security officers, auditors, security
professionals, site administrators, and anyone who is concerned about the
integrity of the network infrastructure.

Certification The Certified Ethical Hacker exam 312-50 may be taken on the last
day of the training (optional). Students need to pass the online Prometric exam
to receive CEH certification. Training fee is inclusive of Exam, Official Kit,
Certificate and meals.

CEHv6 Curriculum consists of instructor-led training and self-study. The
Instructor will provide the details of self-study modules to the students
beginning of the class.

Module 1: Introduction to Ethical Hacking
Module 2: Hacking Laws
Module 3: Footprinting
Module 4: Google Hacking
Module 5: Scanning
Module 6: Enumeration
Module 7: System Hacking
Module 8: Trojans and Backdoors
Module 9: Viruses and Worms
Module 10: Sniffers
Module 11: Social Engineering
Module 12: Phishing
Module 13: Hacking Email Accounts
Module 14: Denial-of-Service
Module 15: Session Hijacking
Module 16: Hacking Web Servers
Module 17: Web Application Vulnerabilities
Module 18: Web-Based Password Cracking Techniques
Module 19: SQL Injection
Module 20: Hacking Wireless Networks
Module 21: Physical Security
Module 22: Linux Hacking
Module 23: Evading IDS, Firewalls and Detecting Honey Pots
Module 24: Buffer Overflows
Module 25: Cryptography
Module 26: Penetration Testing
Module 27: Covert Hacking
Module 28: Writing Virus Codes
Module 29: Assembly Language Tutorial
Module 30: Exploit Writing
Module 31: Smashing the Stack for Fun and Profit
Module 32: Windows Based Buffer Overflow Exploit Writing
Module 33: Reverse Engineering
Module 34: MAC OS X Hacking
Module 35: Hacking Routers, cable Modems and Firewalls
Module 36: Hacking Mobile Phones, PDA and Handheld Devices
Module 37: Bluetooth Hacking
Module 38: VoIP Hacking
Module 39: RFID Hacking
Module 40: Spamming Module
Module 41: Hacking USB Devices
Module 42: Hacking Database Servers
Module 43: Cyber Warfare- Hacking, Al-Qaida and Terrorism
Module 44: Internet Content Filtering Techniques
Module 45: Privacy on the Internet
Module 46: Securing Laptop Computers
Module 47: Spying Technologies
Module 48: Corporate Espionage- Hacking Using Insiders
Module 49: Creating Security Policies
Module 50: Software Piracy and Warez
Module 51: Hacking and Cheating Online Games
Module 52: Hacking RSS and Atom
Module 53: Hacking Web Browsers (Firefox, IE)
Module 54: Proxy Server Technologies
Module 55: Data Loss Prevention
Module 56: Hacking Global Positioning System (GPS)
Module 57: Computer Forensics and Incident Handling
Module 58: Credit Card Frauds
Module 59: How to Steal Passwords
Module 60: Firewall Technologies
Module 61: Threats and Countermeasures
Module 62: Case Studies
Module 62: Case Studies
Module 63: Botnets
Module 64: Economic Espionage
Module 65: Patch Management
Module 66: Security Convergence

ALL PDF's

CEH-Classroom-Lab-Setup-v6.pdf
CEHv6 Module 00 Student Introduction.pdf
CEHv6 Module 01 Introduction to Ethical Hacking.pdf
CEHv6 Module 02 Hacking Laws.pdf
CEHv6 Module 03 Footprinting.pdf
CEHv6 Module 04 Google Hacking.pdf
CEHv6 Module 05 Scanning.pdf
CEHv6 Module 06 Enumeration.pdf
CEHv6 Module 07 System Hacking.pdf
CEHv6 Module 08 Trojans and Backdoors.pdf
CEHv6 Module 09 Viruses and Worms.pdf
CEHv6 Module 10 Sniffers.pdf
CEHv6 Module 11 Social Engineering.pdf
CEHv6 Module 12 Phishing.pdf
CEHv6 Module 13 Hacking Email Accounts.pdf
CEHv6 Module 14 Denial of Service.pdf
CEHv6 Module 15 Session Hijacking.pdf
CEHv6 Module 16 Hacking Webservers.pdf
CEHv6 Module 17 Web Application Vulnerabilities.pdf
CEHv6 Module 18 Web based Password Cracking Techniques.pdf
CEHv6 Module 19 SQL Injection.pdf
CEHv6 Module 20 Hacking Wireless Networks.pdf
CEHv6 Module 21 Physical Security.pdf
CEHv6 Module 22 Linux Hacking.pdf
CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf
CEHv6 Module 24 Buffer Overflows.pdf
CEHv6 Module 25 Cryptography.pdf
CEHv6 Module 26 Penetration Testing.pdf
CEHv6 Module 28 Writing Virus Codes.pdf
CEHv6 Module 29 Assembly Language Tutorial.pdf
CEHv6 Module 30 Exploit Writing.pdf
CEHv6 Module 31 Exploit Writing.pdf
CEHv6 Module 32 Exploit Writing.pdf
CEHv6 Module 33 Reverse Engineering Techniques.pdf
CEHv6 Module 34 MAC OS X Hacking.pdf
CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf
CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf
CEHv6 Module 37 Bluetooth Hacking.pdf
CEHv6 Module 38 VoIP Hacking.pdf
CEHv6 Module 39 RFID Hacking.pdf
CEHv6 Module 40 Spamming.pdf
CEHv6 Module 41 Hacking USB Devices.pdf
CEHv6 Module 42 Hacking Database Servers.pdf
CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf
CEHv6 Module 44 Internet Content Filtering Techniques.pdf
CEHv6 Module 45 Privacy on the Internet.pdf
CEHv6 Module 46 Securing Laptop Computers.pdf
CEHv6 Module 47 Spying Technologies.pdf
CEHv6 Module 48 Corporate Espionage by Insiders.pdf
CEHv6 Module 49 Creating Security Policies.pdf
CEHv6 Module 50 Software Piracy and Warez.pdf
CEHv6 Module 51 Hacking and Cheating Online Games.pdf
CEHv6 Module 52 Hacking RSS and Atom.pdf
CEHv6 Module 53 Hacking Web Browsers.pdf
CEHv6 Module 54 Proxy Server Technologies.pdf
CEHv6 Module 55 Preventing Data Loss.pdf
CEHv6 Module 56 Hacking Global Positioning System.pdf
CEHv6 Module 57 Computer Forensics and Incident Handling.pdf
CEHv6 Module 58 Credit Card Frauds.pdf
CEHv6 Module 59 How to Steal Passwords.pdf
CEHv6 Module 60 Firewall Technologies.pdf
CEHv6 Module 61 Threats and Countermeasures.pdf
CEHv6 Module 62 Case Studies.pdf
CEHv6 Module 63 Botnets.pdf
CEHv6 Module 64 Economic Espionage.pdf
CEHv6 Module 65 Patch Management.pdf
CEHv6 Module 66 Security Convergence.pdf
CEHv6 Module 67 Identifying the Terrorists.pdf
Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/file/569348574/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part01.rar.downeb.com
http://www.filesonic.com/file/569347254/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part02.rar.downeb.com
http://www.filesonic.com/file/569348804/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part03.rar.downeb.com
http://www.filesonic.com/file/569347384/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part04.rar.downeb.com
http://www.filesonic.com/file/569351064/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part05.rar.downeb.com
http://www.filesonic.com/file/569348564/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part06.rar.downeb.com
http://www.filesonic.com/file/569350884/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part07.rar.downeb.com
http://www.filesonic.com/file/569352024/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part08.rar.downeb.com
http://www.filesonic.com/file/569352384/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part09.rar.downeb.com
http://www.filesonic.com/file/569352034/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part10.rar.downeb.com
http://www.filesonic.com/file/569351314/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part11.rar.downeb.com
http://www.filesonic.com/file/569351164/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part12.rar.downeb.com
http://www.filesonic.com/file/569354554/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part13.rar.downeb.com
http://www.filesonic.com/file/569352664/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part14.rar.downeb.com
http://www.filesonic.com/file/569354474/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part15.rar.downeb.com
http://www.filesonic.com/file/569354604/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part16.rar.downeb.com
http://www.filesonic.com/file/569355384/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part17.rar.downeb.com
http://www.filesonic.com/file/569356344/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part18.rar.downeb.com
http://www.filesonic.com/file/569355344/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part19.rar.downeb.com
http://www.filesonic.com/file/569355824/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part20.rar.downeb.com
http://www.filesonic.com/file/569356144/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part21.rar.downeb.com
http://www.filesonic.com/file/569356754/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part22.rar.downeb.com
http://www.filesonic.com/file/569360584/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part23.rar.downeb.com
http://www.filesonic.com/file/569356514/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part24.rar.downeb.com
http://www.filesonic.com/file/569360934/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part25.rar.downeb.com
http://www.filesonic.com/file/569360754/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part26.rar.downeb.com
http://www.filesonic.com/file/569360784/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part27.rar.downeb.com
http://www.filesonic.com/file/569361634/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part28.rar.downeb.com
http://www.filesonic.com/file/569362184/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part29.rar.downeb.com
http://www.filesonic.com/file/569361264/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part30.rar.downeb.com
http://www.filesonic.com/file/569361834/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part31.rar.downeb.com

Mirror
http://www.fileserve.com/file/J5dZWC7/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part01.rar
http://www.fileserve.com/file/EPwnBsw/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part02.rar
http://www.fileserve.com/file/Qdv9pKb/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part03.rar
http://www.fileserve.com/file/j63u36h/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part04.rar
http://www.fileserve.com/file/8ufYZF7/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part05.rar
http://www.fileserve.com/file/mE5qYPC/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part06.rar
http://www.fileserve.com/file/rGnrUDt/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part07.rar
http://www.fileserve.com/file/54sYGRh/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part08.rar
http://www.fileserve.com/file/PsNHaJS/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part09.rar
http://www.fileserve.com/file/nhV5KBH/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part09.rar
http://www.fileserve.com/file/pkfUBSh/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part10.rar
http://www.fileserve.com/file/Pm5gD5g/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part11.rar
http://www.fileserve.com/file/eHMqyEC/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part12.rar
http://www.fileserve.com/file/u5QXvm2/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part12.rar
http://www.fileserve.com/file/kjNB9f4/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part13.rar
http://www.fileserve.com/file/5ReWMfJ/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part14.rar
http://www.fileserve.com/file/Vu6mNxM/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part15.rar
http://www.fileserve.com/file/myY8WVY/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part16.rar
http://www.fileserve.com/file/UCfQ5Zq/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part17.rar
http://www.fileserve.com/file/gfEerrN/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part18.rar
http://www.fileserve.com/file/t9SAPbH/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part19.rar
http://www.fileserve.com/file/J3UKcyY/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part20.rar
http://www.fileserve.com/file/9evdYnn/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part21.rar
http://www.fileserve.com/file/2mPK9rF/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part22.rar
http://www.fileserve.com/file/ERgfTdM/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part23.rar
http://www.fileserve.com/file/uP8MP7B/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part24.rar
http://www.fileserve.com/file/mgBBjEF/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part25.rar
http://www.fileserve.com/file/8GKp94m/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part26.rar
http://www.fileserve.com/file/MCwHUK9/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part27.rar
http://www.fileserve.com/file/EREJzAr/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part28.rar
http://www.fileserve.com/file/ppA2aJ4/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part29.rar
http://www.fileserve.com/file/bByesgx/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part30.rar
http://www.fileserve.com/file/d36CpRX/EC.Councils.Official.CEH.and.Countermeasures.v6.4dvd.part31.rar

Kamis, 24 Maret 2011

TrainSignal - CompTIA Linux+ Training 2010 (3 DVDs)


TrainSignal - CompTIA Linux+ Training 2010 (3 DVDs)
English | ISO | 800 x 600 | TSCC 79.2 Kbps | PCM 352.8 Kbps | AVI | 9.55 GB
Genre: Training

Our Comprehensive CompTIA Linux+ Training Course Teaches You How to Install, Configure, and Manage the Linux Operating System. You'll Also Work to Develop System Architecture, Work Hands-On with GNU and Unix commands, Learn About Linux Filesystems, and Much More! Plus, get Complete Exam Coverage for Both the LX0-101 and LX0-102!

Course Outline

Lesson 01 - Getting Started with CompTIA Linux+ Training

In this video you will meet your instructor, you will learn about the scenario that will be used throughout the course, and you will get some advice from Veronica about how to most effectively use this course.

* Who is Your Instructor?
* What We Will Be Doing?
* How to Use This Course
*

Lesson 02 - Lab Setup

In this lesson you will find out about the lab environment used for this course. We will talk about the hardware and software settings, as well as VirtualBox setup. Then we’ll talk go over how to create a Linux virtual machine.

*
* The Lab Environment
* VirtualBox Setup
* Minimum Hardware Requirements
* Creating a Linux Virtual Machine
* Verifying Installation
* Installing Guest Additions
*

Lesson 03 - The Course Scenario

In this video you will learn the details of the course scenario.

*
* The Globomantics Scenario
* The Globomantics Network

Lesson 04 - Linux Hardware Settings

In this lesson we will focus on how Linux interacts with system hardware. We will cover how to configure and manage hardware settings including enabling/disabling peripherals and device settings.

*
* IRQs
* I/O Addresses
* DMA Addresses
* Boot Disks and Geometry
* Coldplug and Hotplug Devices
* Expansion Card Configuration
* Kernel Modules
* Configuring USB Devices
* Configuring Hard Disks
*

Lesson 05 - The Boot Process

In this lesson we will cover the boot process from a hardware perspective. We will talk about the sequence of steps performed during the boot process, the role of the BIOS and the kernel. This lesson wraps up with an overview of the boot loader and how to use log files to track boot events.

* The BIOS
* The Boot Loader
* The Boot Sequence
* The Boot Process and the Kernel
* Interpreting Log Files
*

Lesson 06 - Runlevels and System Shutdown and Reboot

This lesson will show how to use run levels and the command line to shutdown and reboot the system. We’ll cover the different runlevel mode options and how to set defaults, as well as process termination.

*
* Defining Runlevels
* Runlevel Services
* Managing Runlevels
* Checking and Changing Runlevels
* Managing Runlevels - Utilities
*

Lesson 07 - Linux Installation Planning

In the Linux Installation lesson we will talk about hard disk layout and partitioning schemes. We will cover the software (boot managers) and hardware that is associated with the boot process. In addition I will show you how to identify shared libraries, their roles and locations.

*
* Hard Disk Layout
* Boot Manager Configuration
* LILO Boot Manager Configuration
* GRUB Boot Manager Configuration
* Shared Libraries
*

Lesson 08 - Package Management

This lesson will cover Linux package management for Debian and RPM based distributions. We’ll talk about installing, removing and upgrading software.

*
* The Role of a Package Manager
* Debian Package Management
* Apt Package Management
* Dselect, Aptitude and Synaptic Tools
* Debian Configuration & Troubleshooting
* RPM Package Management
* Yum Package Management
* RPM & Yum Configuration & Troubleshooting

Lesson 09 - GNU and Unix Commands

The GNU and Unix Commands lesson will focus on how to manage Linux from the command line. We’ll cover commands for interacting with files and the Linux shell environment and its associated variables. This lesson will also review how to identify and manage system processes, along with an introduction to the Vi text editor.

*
* The Linux Command Line
* Linux Navigation
* Linux Configuration and Help Files
* Pipes, Streams and Filters
* Using Filters to Manipulate Files
* File Management
* Process Management
* Foreground and Background Processes
* Searching and Regular Expressions
* The Vi Editor

Lesson 10 - Linux Filesystem

In this lesson, we’ll focus on Linux filesystem types and how to create them along with maintenance and administration tasks. We’ll also talk about how to mount and unmounts a filesystem.

* Creating Partitions and Filesystems
* Preparing Partition for Use
* Creating Filesystem and Swap Partition
* Tuning Filesystems
* Debugging
* Journaling and Checking Filesystems
* Monitoring Disk Usage
* Mounting and Unmounting Filesystems

Lesson 11 - Managing User Resources: Quotas and Permissions

This lesson will show you how to manage user resources with hard disk quotas and file permissions and ownership rules.

* Disk Quotas
* Configuring Quotas
* File Permissions and Ownership
* Permission Bits
* Changing Permissions
* Setting Default Mode and Group
* Changing File Attributes
*

Lesson 12 - Linux Links and System Files

The Linux Filesystems lesson will cover the different Linux system files, along with a review of hard and symbolic links.

* Understanding Links
* Linux System Files
* Locating Files

Lesson 13 - Preparing for Your CompTIA Linux+ Certification Exam (LXO-101)

This lesson will cover how to prepare for your first CompTIA Linux+ exam.

*
* Exam Overview
* Where to Take the Exam
* Retake Policy
* Preparation Tips
* After the Exam

Exam LX0-102

Lesson 14 - Introduction to CompTIA Linux+ Training – Exam LX0-102

This lesson will introduce the second part of this CompTIA Linux+ Training course. The second part is dedicated to LX0-102 exam objectives.

Lesson 15 - The Linux Shell Environment

In this lesson, we’ll review the Linux shell environment. Focus items include types of shells, environment variables and skeleton directories.

* Environment Variables
* Shell Configuration Files
* Aliases

Lesson 16 - Writing and Editing Scripts

This lesson will review how to write and edit scripts. Topics will include basic commands, functions, and loops.

*
* Shell Scripts Components
* Shell Script Commands
* Conditional Expressions
* Using Case Statement
* Using Loop and Function Expressions

Lesson 17 - Linux Databases

The Linux databases lesson will cover databases, with particular focus on creating and managing MySQL tables and databases.

* SQL Overview
* MySQL – Databases and Tables
* MySQL – Storing Data
* MySQL – Retrieving Data
* MySQL – Deleting Data

Lesson 18 - X11 Installation and Configuration

In this lesson, we’ll review the X window system – Linux’s GUI, and how to install and configure it.

*
* Understanding the Linux GUI
* X Configuration Tools
* Configuration X
* X Font Configuration

Lesson 19 - Display Manager and Accessibility Options

This lesson will cover the top display managers and their configuration options, along with a look at accessibility options for persons with physical disabilities.

* The X Login System
* XDMCP Server Configuration
* X and Remote Access
* Accessibility Options
*

Lesson 20 - User and Group Accounts and Files

The User and Group accounts lesson will focus on the administrative commands that are used to manage users and groups.

* Introduction to Linux Users and Groups
* Creating User Accounts
* Changing User Accounts
* Account Configuration Files
* Deleting User Accounts
* Creating Groups
* Changing Groups
*

Lesson 21 - Job Scheduling

In this lesson, we’ll cover the important task of job scheduling using the cron, anacron, and at tools

* Cron Job Overview
* Creating User Cron Jobs
* The Anacron Tool
* The At Command
*

Lesson 22 - Localization and System Time

This lesson will focus on how to modify and configure location settings like time, locale, and time zone.

* Time Zone Settings
* Understanding Locales
* Linux System Time
* Network Time Protocol Configuration

Lesson 23 - Managing System and Kernel Logs

This lesson will cover system and kernel log management and configuration.

*
* The Syslog Daemon
* Manual Logging
* Log File Rotation
* Reviewing Log Files
*
*

Lesson 24 - Email and Printing

In this, we’ll learn how to use Linux’s mail tool for sending, receiving, and otherwise managing email from the command line. In addition, we’ll cover printing, printing technologies and how to manage the print queue.

* Email Basics
* Email Software
* Managing Your Email
* Email Security
* Printing Basics
* Common Unix Printing System
* Managing The Print Queue

Lesson 25 - Internet Protocols

In the Internet Protocols lesson, we’ll review IPv4 and IPv6, along with routing and communications ports.

* Networking and TCP/IP
* TCP/IP Protocol Types
* IP Addressing
* Network Hostnames
* Network Ports

Lesson 26 - Network Configuration and Troubleshooting

This lesson will focus on Network configuration and troubleshooting. We will also cover how to configure and use DNS for domain name resolution.

* Dynamic Host Configuration Protocol
* Configuring Static IP Addresses
* Configuring Routing
* Configuring Devices and Hostnames
* Troubleshooting Overview

Lesson 27 - Security Administration

This lesson will focus on how to manage security, including administration tasks like passwords, system limits, and managing administrative privileges. In addition we will also cover security from a host versus a server perspective. Topics include the use of shadow passwords, network services and TCP wrappers.

*
* Understanding the Super Server
* The inetd Super Server
* The xinetd Super Server
* Unused Servers and Security
* The Role of Configuration Files
* Host Security
* ulimit Command
* SUID & SGID Files

Lesson 28 - Encryption Options

This lesson will review the different security encryption options available and how to implement them.

* The Secure Shell (SSH) Overview
* SSH Configuration
* SSH Access Control & Logins
* SSH Security
* GNU Privacy Guard
* GNU Encryption

Lesson 29 - Preparing for Your Linux+ Certification Exam (LX0-102)

This lesson will cover how to prepare for your second CompTIA Linux+ exam.

* Exam Overview
* Where to Take the Exam
* Retake Policy
* Exam Preparation Tips
* After the Exam
*

Lesson 30 - Next Steps

This lesson will review what was learned during the course, introduce the transcender exam and provide other certification preparation suggestions.

*
* What We Learned in the Course
* Follow Up
* What's Next

Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/folder/2571251


Mirror
http://fileserve.com/list/t6bnuA4

Course 50020A: Forefront Security Technical Boot Camp


Course 50020A: Forefront Security Technical Boot Camp DVD-KiPiSO
Genre: Training | English | ISO | 1.15 GB

This three-day instructor-led course provides students with the knowledge and skills to deploy Forefront security products. This course is intended for technical professionals who are deploying Microsoft Forefront security products. The Boot Camp will be conducted in a hands-on-lab-type environment in order to provide for maximum interactivity and includes technical content of Level 300 or higher.

At Course Completion

After completing this course, students will be able to: Understand how Intelligent Application Gateway (IAG) 2007 (formerly Whale) provides secure, remote access for your clients.

*
See how Internet Security and Acceleration (ISA) Server 2006 provides network edge protection for customers and deployment versatility.
*
Understand how Forefront Client Security provides integrated anti-virus, anti-spyware and security state assessment to provide unified desktop protection.
*
See how Forefront Security for Exchange (formerly Antigen) provides superior protection for Exchange 2007.
*
See how Forefront Security for SharePoint (formerly Antigen) is configured to protect SharePoint 2007.
Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/file/249318574/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part01.rar
http://www.filesonic.com/file/249327184/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part02.rar
http://www.filesonic.com/file/249326984/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part03.rar
http://www.filesonic.com/file/249324624/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part04.rar
http://www.filesonic.com/file/249326574/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part05.rar
http://www.filesonic.com/file/249335264/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part06.rar
http://www.filesonic.com/file/249331974/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part07.rar
http://www.filesonic.com/file/249337784/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part08.rar
http://www.filesonic.com/file/249334814/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part09.rar
http://www.filesonic.com/file/249332684/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part10.rar
http://www.filesonic.com/file/249340084/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part11.rar
http://www.filesonic.com/file/249340024/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part12.rar


Mirror
http://www.fileserve.com/file/rNdfh8M/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part01.rar
http://www.fileserve.com/file/JPa4dS3/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part02.rar
http://www.fileserve.com/file/j4CEaPW/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part03.rar
http://www.fileserve.com/file/xWNguUq/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part04.rar
http://www.fileserve.com/file/QemhZWQ/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part05.rar
http://www.fileserve.com/file/95uVDdB/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part06.rar
http://www.fileserve.com/file/BWJR3UC/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part07.rar
http://www.fileserve.com/file/eVySHH4/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part08.rar
http://www.fileserve.com/file/xBrMZTB/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part09.rar
http://www.fileserve.com/file/XPA3Qh6/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part10.rar
http://www.fileserve.com/file/cN2xkjF/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part11.rar
http://www.fileserve.com/file/DMDMerd/MOC.50020A.MS.Forefront.Security.Techinical.Boot.Camp.DVD-KiPiSO.part12.rar

Selasa, 15 Maret 2011

TrainSignal - CWNA Trainings PW0-104 (2 DVDs)


TrainSignal - CWNA Trainings PW0-104 (2 DVDs)
English | AVI | 800 x 600 | TSCC 195 Kbps | PCM 352 Kbps | 4.93 GB
Genre: Training

Learn Wireless Networking, Administration and Security by Watching an Expert Instructor Configure a Real Live Network! Avoid 1-2 Years of Trial & Error and Learn Wireless Networking As You Prepare for and Pass the CWNA PW0-104 Exam!

There are two DVD:

Video 1

Introduction

Get a first look at what you will be learning in this course and learn who your instructor is.

* Objectives
* About Your Instructor and Train Signal
* What?s Covered in this Course

Video 2
Introduction to WLAN Standards

In this video you will learn about the several different wireless LAN Standards and other related standards.

* Standard Organizations
* Wi-Fi Alliance
* IEEE 802.11 Working Groups
* 802.11 Amendments
* 802.11a Amendment
* 802.11b Amendment
* 802.11g Amendment
* 802.11h Amendment
* 802.11e and 802.11i Amendments
* 802.11j, 802.11d, and 802.11c Amendments
* 802.11r and 802.11n Amendments
* 802.11s and 802.11k Amendments
* 802.11p and 802.11t Amendments
* 802.11u, 802.11v, and 802.11w Amendments
* Related Standards: 802.1X and EAP
* Related Standards: 802.3 - 2005, Clause 33
* Related Standards: RADIUS

Video 3
RF Fundamentals

In this video you will learn to understand the fundamentals of Radio Frequency behavior as it relates to wireless networking. This is one of the most important videos in the course so you may want to watch this video twice!

* Sine Waves
* Current Flow
* Photons
* Wavelength
* Frequency
* Wavelength and Frequency
* Wavelength Calculation
* Amplitude (Power Level)
* Phase
* RF Loss
* RF Loss: Reflection
* RF Loss: Refraction
* RF Loss: Diffraction
* RF Loss: Scattering
* RF Loss: Absorption
* Interference (Corruption)
* Basic Types of Modulation
* DSSS and HR/DSSS MCS
* OFDM MCS
* Spectral Mask: DSSS and HR/DSSS
* Spectral Mask: OFDM
* 2.4 GHz ISM Band and Channels
* UNII Bands and Channels
* DSSS Coding
* OFDM FEC Coding

Video 4
RF Math

Learn how to set a basic wireless router and a single client, talking to an access point. Also, learn to put WEP encryption between the wireless client and the access point, to provide basic internet security.

* Inverse Square Law
* Free Space Path Loss (FSPL)
* Units of Measure
* Rule of 10s and 3s
* RF Numbers: Infinitely Large to Infinitesimally Small
* Conversion Chart: dBm/mW
* Gains and Losses
* 2X Amplification (Rule of 3s)
* 2X Attenuation (Rule of 3s)
* 10X Amplification (Rule of 10s)
* 10X Attenuation (Rule of 10s)
* RF Math: Problem
* Receiver Sensitivity
* Equivalent Isotropically Radiated Power (EIRP)
* Will the Link Work?

Video 5
Antennas

In this video you will embark on a comprehensive journey, learning everything you will need to know about antennas.

* Isotropic Radiator
* Visualizing Beam Patterns
* Polarization of an Antenna
* Understanding Polarization
* Passive Gain
* Low Gain Omni Antennas
* High Gain Omni Antennas
* Omni Antenna Examples
* Semi-Directional Antennas: Patch/Panel
* Patch Antennas
* Patch/Panel Antenna Examples
* Sector Panel Antennas
* Sectorized Antenna Systems
* Yagi Antennas
* Highly-Directional Antennas: Parabolic Dish or Grid
* Dish/Grid Antennas
* Antenna Mounting Accessories
* Antenna Mounting Examples
* Voltage Standing Wave Ratio
* Antenna Characteristics
* Simple Diversity Systems
* Diversity Transit Systems
* Line-of-Sight (LoS)
* Fresnel Zone
* Calculating 1FZ Size & Minimum Clearance
* Free Space Path Loss (FSPL)
* Earth Bulge
* Calculating Antenna Height for Links > 7 Miles
* Antenna Downtilt
* Antenna Safety
* Antenna Accessories: RF Cables
* FCC Part 15.204 Amendment
* Antenna Accessories: Pigtail Cables
* Common RF Connectors
* Lightning Arrestors
* Lightning Protection

Video 6
RF Regulatory Domains

In this video you will learn how the Radio Frequency spectrum is managed locally, regionally, and throughout the world.

* International RF Spectrum Management Hierarchy
* Regional Spectrum Management Groups u CITEL, CEPT, RCC, ATU, & APT
* Examples of Local RF Regulatory Bodies
* 2.4 GHz ISM Band
* 5 GHz Unlicensed Bands
* FCC 2.4 GHz PtMP Rules
* Americas/EMEA 5 GHz Band Rules
* FCC 5 GHz PtMP Rules: UNII-1, 2, & 3
* FCC 2.4 GHz PtP Rules
* FCC 5 GHz PtP Rules: UNII-3

Video 7
Wireless LAN Operation

In this video you will get a comprehensive view at the operation Wirless LAN hardware and software.

* WLAN Radios
* Client Utilities
* Enterprise-Class Client Utilities
* Access Points
* Access Points as MAC Bridges
* Frame Forwarding Between Physical Interfaces
* Ad Hoc Mode
* Infrastructure Mode
* Wireless Network Management Systems (WNMS)
* WLAN Controllers
* WLAN Controller: Core
* WLAN Controller: Distribution
* WLAN Controller: Access
* WLAN Profiles
* Remote Office WLAN Controllers
* Wireless Workgroup Bridges
* Workgroup Bridges
* Wireless Bridges
* Bridging Repeaters
* Access Point: Root Mode
* Access Point: Repeater Mode Wireless Distribution System
* Point-to-Point (PtP) Connections
* Point-to-Point Bridging
* Point-to-Multipoint (PtMP) Connections
* Point-to-Multipoint Bridging
* Line-of-Sight (LoS)
* Wireless Residential Gateways
* Wireless VPN Routers
* Enterprise Encryption Gateways (EEGs)
* Using EEGs
* WLAN Arrays
* Location Tracking
* Evolution of WLAN Architecture
* Evolution of WLAN Architecture: Multi-Channel Architecture (MCA)
* Evolution of WLAN Architecture: Single Channel Architecture (SCA)
* Wireless Mesh Networks

Video 8
Power over Ethernet (PoE)

In this video you will learn what Power over Ethernet is, how it works, and it?s applications in the wireless network.

* A Tale of Two Standards
* PoE Overview
* Powered Device (PD)
* Power Sourcing Equipment
* 802.3af PD Classification Signature
* 802.3af PSE Power Classes & PD Power Consumption
* Where is the Power?
* 802.3af Power Interface
* PSE Endpoint Alternative A
* PSE Endpoint Alternative B
* PSE Midspan
* 802.3af PD Pinout
* High Density PoE Requires Planning
* High Density PoE Requires High-Power Feeds and Much Cooling
* Use of Management Protocols
* Where PoE is Used in WLANs
* Non-WLAN Uses of PoE
* PoE Diagnostics

Video 9
802.11 Service Sets

In this video you will learn about the three types of service sets within the 802.11 Service Set. Plus, you will learn about 802.11 association, authentication, and network infrastructure.

* 802.11 Service Sets
* Independent Basic Service Sete (IBSS)
* IBSS Process
* Basic Service Set (BBS)
* BSS Selection
* Extended Service Set
* The Network Infrastructure
* Integration Service
* Distribution System
* Wireless Distribution System (WDS)
* 802.11 State Machine
* Joining a Service Set - State 1 (Discovery)
* Joining a Service Set - State 1 (Open System Auth)
* Joining a Service Set - State 1 (Shared Key Auth)
* Joining a Service Set - State 2 (All Frames)
* Disassociation
* Deauthentication
* Roaming (BSS Transition)
* Load Balancing

Video 10
Basic WLAN Analysis

In this video you will learn how to perform protocol analysis on your wireless network. Plus, you will take a detailed look at the 802.11 Frame Types, Protection Mechanisms, Power Saving Operations, and Transmission Rates.

* WLAN Protocol Analyzers
* Handheld Protocol Analyzers
* 802.11 Frame Format
* Data Frames
* Null Frames
* Control Frames
* Hidden Node - Obstructions
* Hidden Node - Signal Strength
* Hidden Node - Signaling Methods
* Using RTS/CTS
* RTS/CTS Exchange
* Protection Mechanisms
* Power Management Modes
* TIM and DTIM
* ATIM & ATIM Window
* Legacy Power Save and U-APSD
* Management Frames
* Beacons
* Probe Requests/Responses
* Open Authentication
* Shared Key Authentication
* Association Request/Response
* Disassociation
* Deauthentication
* Acknowledgement (Ack) Frames
* Basic and Supported Rates
* Transmission Rates

Video 11
802.11 Medium Access

In this video you will learn about Carrier Sense Multiple Access Collision Detection and Carrier Sense Multiple Access Collision Avoidance and other methods and functions that you can use to avoide collisions and provide true Quality of Service.

* CSMA/CD
* CSMA/CA
* Distributed Coordination Function (DCF)
* Virtual Carrier Sense
* Physical Carrier Sense
* Inter-Frame Spacing
* Random Backoff Algorithm
* Point Coordination Function (PCF)
* 802.11e MAC Architecture
* HCF Controlled Channel Access (HCCA)
* Enhanced Distributed Channel Access (EDCA)
* WMM Access Categories (AC)
* WMM Transmission Queues
* WMM Power Save (WMM-PS)

Video 12
802.11n Amendment

802.11n completely revamps how we look at wireless networking. 802.11n is the wave of the future and if you plan on becoming a Wireless Network Administrator then you will have to be an expert on 802.11n. This video will help you take that next step to becoming an 802.11n expert and prepare your for the future of wireless networking!

* Why 802.11n?
* PHY Comparison
* Reliable Connectivity
* Challenging RF Environments
* Bandwidth Intensive Environments
* Voice and Video Readiness
* Mixed Client Environments
* 802.11n Enhancements
* SISo vs. MIMO
* MIMO
* SISO and Multipath
* MIMO Radio Card
* MIMO "Uses" Multipath
* MIMO: Tx Beam Forming
* MIMO: Maximal Ratio Combining
* MIMO: Spatial Multiplexing
* PHY Enhancements: Effect of Throughput Example
* MIMO: Space-Time Block Coding (STBC)
* SM + STBC Data Flow
* 20 MHz Channel Mask
* 40 MHz Channel Mask
* 20 MHz vs. 40 MHz Channels
* 2.4 GHz Channel Selection
* Channel Bonding (2.4 & 5 GHz)
* Channel Bonding in 5 GHz
* OFDM Subcarries
* Non-HT Duplicate Mode
* Guard Interval Reduction
* Antenna Selection (ASEL)
* 802.11n MCS (Data) Rates
* 802.11n Enhancements
* 802.11 Protocol Stack
* 802.11 Encapsulation
* Frame Aggregation
* Frame Aggregation: A-MSDU
* Frame Aggregation: A-MPDU
* Frame Aggregation Efficiency
* Block Acknowledgements
* Reducing MAC Overhead
* Power Save: SMPS & PSMP
* SMPS: Static
* SMPS: Dynamic
* Unscheduled PSMP (U-PSMP)
* Scheduled PSMP (S-PSMP)
* 802.11n Coexistence
* PPDU Frame Formats
* 802.11n HT Protection Modes
* 20/40 MHz BSS Mode
* PCO BSS Mode
* Dual CTS Protection
* L-SIG TXOP Protection
* 40 MHz Intolerant
* Wi-Fi Certification for Draft 2.0
* 802.11n Considerations
* Backhaul Speeds
* Power over Ethernet (PoE)
* Cable Plant Certification
* 802.11n Deployment Strategy
* 802.11n Migration Strategy
* Client Population
* Site Survey Methodology
* Data Forwarding Scalability
* 802.11n Tools: Analyzer
* 802.11n Tools: Calculator
* 802.11n Tools: Simulator
* 802.11n Tools: Efficiency
* Analyzer: AP Detail
* Channel Occupancy Effects

Video 13
Site Surveying

A site survey can be the most important component of a wireless network?s design. In this video you will learn how to determine how much equipment is going to be needed and where that equipment should be located in order to allow the wireless network to function as required.

* What is an RF Site Survey?
* The Survey Process
* Understanding the Customer?s Requirements
* Access and Documents
* Spectrum Analyzers
* Portable, Traditional Spectrum Analyzers
* Spectrum Analysis
* Identifying Legacy and Non Wi-Fi 802.11 Transmissions
* Two Types of RF Site Surveys
* Manual RF Site Surveys
* Manual RF Site Survey Applications
* Manual Site Survey Kit
* Predictive RF Site Surveys
* Predictive RF Modeling Tools
* General Survey Principles
* Channel Reuse
* MCA vs. SCA
* Coverage vs. Capacity
* VoWLAN Surveying
* Surveying for SCA Systems
* Portability vs. Mobility
* Recommended Rx Thresholds
* Site Survey Report: The Deliverable
* RF Site Survey Forms

Video 14
Basic WLAN Security

In this video you will learn how to lockdown your Wirless Network so that your private data being sent over your wireless network remains private.

* The Importance of WLAN Security
* WLAN Secuirty is...
* Wi-Fi Worries at Home
* Is Your WLAN Secure?
* Network Security Components
* General Security Policy
* Functional Security Policy
* Security Policy Compliance
* WLAN Discovery
* SSID Hiding
* Legacy WLAN Security
* Wi-Fi Protected Access
* WPA Terminology
* WPA-2 Personal
* Wi-Fi Protected Setup
* Generic 802.1x Process
* Role Based Access Control
* WIDS/WIPS
* Protocol Analyzers
* Baseline Practices: SOHO
* Baseline Practices: SMB
* Baseline Practices: Enterprise

Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/folder/2131021


Mirror
http://fileserve.com/list/Pq6UTE6

PrepLogic - CISSP Training (Video, Audio, Ebook)


PrepLogic - CISSP Training (Video, Audio, Ebook)
English | FLV, MP3, PDF | 640x480 | H.263 718Kbps | MP3 64Kbps | 4.76 GB
Genre: Training

The CISSP certification is the premier information security certification. Earning your CISSP certification involves passing the challenging CISSP exam. PrepLogic helps you get certified with CISSP training including CISSP LearnSmart Video Training and CISSP Practice Exams. Our CISSP video training features over 33 hours of CBT training for the CISSP exam. Our CISSP Practice Exams provide multiple practice tests with hundreds of practice questions and authentic CISSP exam simulation. PrepLogic provides genuine CISSP exam training, as well as video training, practice exams and study guides for ISC? certifications including SSCP and more.

LearnSmart Video Training:

01_Introduction
02_The Security Triangle
03_Security Management Training
04_Risk Assessment
05_Security Policy
06_Job Policies and Training
07_Ethics
08_Access Control Basics
09_Data Classification
1-Booklist.bat
1-Booklist.txt
10_Access Control Techniques
11_Identification and Authentication
12_Attack and Monitor
13_Concepts and Methodologies
14_Cryptographic Algorithms
15_Cryptographic Practices
16_Methods of Attack
17_Physical Security Threats
18_Facility Requirements
19_Physical Security Controls
20_Environmental Issues
21_Physical Security
22_Organization
23_Machine Operation
24_Operating Modes _ Protection Mechanisms
25_Evaluation Criteria
26_BCP Project Scope
27_Business Impact Analysis
28_Recovery Plan
29_Recovery Plan Implementation
30_OSI Reference Model
31_OSI Layers
32_Remote Access Security
33_Network Devices
34_Firewalls
35_Security Protocols and Services
36_Common Network Attacks
37_Application Issues
38_Databases and Warehousing
39_Data and Information Storage
40_System Development Controls
41_Security Develpment Controls
42_Malicious Code
43_Methods of Attack
44_Administrative Management
45_Auditing
46_Monitoring
47_Intrusion Detection
48_Threats and Countermeasures
49_Types of Computer Crime
50_Categories of Law
51_Computer Laws
52_Types of Incidents

Audio:

Quiz Me Series Audio Training - CISSP Quiz Me Series

Ebooks:

Mega Guide
Pocket Guide
Printables

More info: http://www.preplogic.com/cissp-certification-training.aspx

Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/folder/2131321


Mirror
http://fileserve.com/list/sJSfGk7

PrepLogic - CISSP Training (Video, Audio, Ebook)


PrepLogic - CISSP Training (Video, Audio, Ebook)
English | FLV, MP3, PDF | 640x480 | H.263 718Kbps | MP3 64Kbps | 4.76 GB
Genre: Training

The CISSP certification is the premier information security certification. Earning your CISSP certification involves passing the challenging CISSP exam. PrepLogic helps you get certified with CISSP training including CISSP LearnSmart Video Training and CISSP Practice Exams. Our CISSP video training features over 33 hours of CBT training for the CISSP exam. Our CISSP Practice Exams provide multiple practice tests with hundreds of practice questions and authentic CISSP exam simulation. PrepLogic provides genuine CISSP exam training, as well as video training, practice exams and study guides for ISC? certifications including SSCP and more.

LearnSmart Video Training:

01_Introduction
02_The Security Triangle
03_Security Management Training
04_Risk Assessment
05_Security Policy
06_Job Policies and Training
07_Ethics
08_Access Control Basics
09_Data Classification
1-Booklist.bat
1-Booklist.txt
10_Access Control Techniques
11_Identification and Authentication
12_Attack and Monitor
13_Concepts and Methodologies
14_Cryptographic Algorithms
15_Cryptographic Practices
16_Methods of Attack
17_Physical Security Threats
18_Facility Requirements
19_Physical Security Controls
20_Environmental Issues
21_Physical Security
22_Organization
23_Machine Operation
24_Operating Modes _ Protection Mechanisms
25_Evaluation Criteria
26_BCP Project Scope
27_Business Impact Analysis
28_Recovery Plan
29_Recovery Plan Implementation
30_OSI Reference Model
31_OSI Layers
32_Remote Access Security
33_Network Devices
34_Firewalls
35_Security Protocols and Services
36_Common Network Attacks
37_Application Issues
38_Databases and Warehousing
39_Data and Information Storage
40_System Development Controls
41_Security Develpment Controls
42_Malicious Code
43_Methods of Attack
44_Administrative Management
45_Auditing
46_Monitoring
47_Intrusion Detection
48_Threats and Countermeasures
49_Types of Computer Crime
50_Categories of Law
51_Computer Laws
52_Types of Incidents

Audio:

Quiz Me Series Audio Training - CISSP Quiz Me Series

Ebooks:

Mega Guide
Pocket Guide
Printables

More info: http://www.preplogic.com/cissp-certification-training.aspx

Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/folder/2131321


Mirror
http://fileserve.com/list/sJSfGk7

Minggu, 13 Maret 2011

Managing Knowledge Security: Strategies for Protecting Your Company's Intellectual Assets by Kevin C.


Managing Knowledge Security: Strategies for Protecting Your Company's Intellectual Assets by Kevin C. Desouza

Publisher: Kogan Page | 2007 | ISBN 0749449616 | PDF | 200 pages | 12 MB


Managing Knowledge Security is a comprehensive reference guide detailing how to secure both the physical and intangible assets owned by a business. Citing international examples such as Hewlett Packard, Microsoft, Google, Boeing, and Amazon, the author covers all aspects of knowledge protection, from employee retention strategies to physical security. Knowledge managers, security professionals, general managers, information systems managers, and competitive intelligence professionals will find the book of immediate relevance, as will members of the defense, national security, and government intelligence agencies.

Download
http://i1189.photobucket.com/albums/z431/reevn/photo/preaccos.png
http://www.filesonic.com/file/210093952/0749449616.rar