Unity is strength... when there is teamwork and collaboration, wonderful things can be achieved.
Public Feed
Beginner
 
5 votes (50%)
Intermediate
 
0 votes (0%)
Expert
 
3 votes (30%)
I know the concept but never worked
 
1 votes (10%)
I don't know about cisco ACI
 
1 votes (10%)
Insights into Wireless
Insights into Wireless
New Terms to Learn
Advantages & Disadvantages
Types of Wi-Fi Networks
Wi-Fi Standards
Wi-Fi Authentication Modes
Chalking
Antenna Types
Summary
Encryption in Wireless
Encryption in Wireless
WEP Encryption
WPA & WPA2 Encryption
Breaking Encryption
Defending Against Cracking
Summary
Threats from Wireless
Threats from Wireless
Types of Attacks
Attack on the AP
Attack on the Client
Summary
The Methodology of Hacking Wireless
The Method of Hacking Wireless
Wi-Fi Discovery
GPS Mapping
Wireless Traffic Analysis
Launching Attacks
Let's Go Look-ng
Cracking Wi-Fi Encryption
Let's See How Much Damage We Can Do!
Summary
Hacking Bluetooth
Hacking Bluetooth
The Threats
New Terms
All About Bluetooth
Security
Summary
Countermeasures
Countermeasures
Bluetooth
Rogue APs
6 Layers of Wireless
Best Practices
Tools
Summary
[Fold]

Формат видео: MP4
Видео: AVC, 1280x720, 16:9, 30 fps, 220 Kbps
Аудио: AAC, 44.1 KHz, 96 Kbps, 2 channels

Contents:
Computer_Forensics_in_Today's_World:
0.0 - Overview (195645124)
1.0 - Computer Forensics in Todays World
2.0 - Computer Forensics in Todays World Part 2
3.0 - Computer Forensics in Todays World Part 3
Computer_Forensics_Investigation_Process:
20.0 - Investigative Process
21.0 - Investigative Process Part 2
22.0 - Investigative Process Part 3
23.0 - Investigative Process Part 4
Searching_and_Seizing_Computers:
30.0 - Search and Seizure of a Computer
31.0 - Search and Seizure of a Computer
32.0 - Search and Seizure of a Computer Part 3
33.0 - Search and Seizure of a Computer Part 4
Digital Evidence:
40.0 - Digital Evidence
41.0 - Digital Evidence Part 2
First Responder Procedures:
50.0 - First Responders
Computer_Forensics_Labs:
60.0 - Setting up Forensics Lab
Understanding_Hard_Disks_and_File_Systems:
70.0 - Hard Disks and File Systems
71.0 - Hard Disks and File Systems Part 2
72.0 - Hard Disks and File Systems Part 3
73.0 - Hard Disks and File Systems Part 4
Windows_Forensics:
80.0 - Windows Forensics
81.0 - Windows Forensics Part 2
82.0 - Windows Forensics Part 3
83.0 - Windows Forensics Part 4
84.0 - Windows Forensics Part 5
Data_Acquisition_and_Duplication:
90.0 - Data Acquisition, Duplication and Recovery
92.0 - Overview of The Sleuth Kit (TSK)
Recovering_Deleted_Files_and_Deleted_Partitions:
-empty folder-
Forensics_Investigation_Using_AccessData_FTK:
100.0 - AccessData FTK
Forensics_Investigation_Using_Encase:
101.0 - EnCase
Steganography_and_Image_File_Forensics:
110.0 - Steganography
111.0 - Steganography Part 2
Application _and_Password_Crackers:
120.0 - Password Crackers
121.0 - Password Crackers Part 2
Log_Capturing_and_Event_Correlation:
130.0 - Log Capturing and Network Forensics
131.0 - Log Capturing and Network Forensics Part 2
132.0 - Log Capturing and Network Forensics Part 3
133.0 - Log Capturing and Network Forensics Part 4
Network_Forensics:
-empty folder-
Investigating_Wireless_Attacks:
170.0 - Wireless
171.0 - Wireless Part 2
Investigating_Web_Attacks:
180.0 - Web Forensics
181.0 - Web Forensics Part 2
Tracking_Emails_and+Investigating_Email_Crines:
190.0 - Email Forensics
Mobile_Forensics:
200.0 - Mobile Forensics
Investigative_Reports:
210.0 - Reports and Testimony
Becoming_An_Expert_Witness:
-empty folder-

[Packt] CompTIA Advanced Security Practitioner (CASP) [2017, ENG]

Contents:
01 - Course Introduction
02 - Business Influences and Associated Security Risks
03 - Risk Management
04 - Business Model Strategies
05 - Integrating Diverse Industries
06 - Third Party Information Security and Providers
07 - Internal and External Influences
08 - Impact of De-Perimeterization
09 - Risk Mitigation Planning - Strategies and Controls
100 - Secure Storage Management Techniques
101 - LUN Masking_Mapping and HBA Allocation
102 - Replication and Encryption Methods
103 - Network and Security Components-Concepts-Security Architectures
104 - Remote Access Protocols
105 - IPv6 and Transport Encryption
106 - Network Authentication Methods
107 - 802.1x and Mesh Networks
108 - Security Devices
109 - Network Devices
10 - CIA Triad
110 - Firewalls
111 - Wireless Controllers
112 - Router Security and Port Numbers
113 - Network Security Solutions
114 - Availability Controls-Terms and Techniques
115 - Advanced Router and Switch Configuration
116 - Data Flow Enforcement of Applications and Networks
117 - Network Device Accessibility and Security
118 - Security Controls for Hosts
119 - Trusted Operation Systems
11 - Business Classifications
120 - Endpoint Security Software and Data Loss Prevention
121 - Host Based Firewalls
122 - Log Monitoring and Host Hardening
123 - Standard Operating Environment and Group Policy Security
124 - Command Shell Restrictions
125 - Configuring and Managing Interface Security
126 - USB-Bluetooth-Firewire Restrictions and Security
127 - Full Disk Encryption
128 - Virtualization Security
129 - Cloud Security Services
12 - Information Life Cycle and Steak-Holder Input
130 - Boot Loader Protections
131 - Virtual Host Vulnerabilities
132 - Virtual Desktop Infrastructure
133 - Terminal Services
134 - Virtual TPM
135 - Application Vulnerabilities and Security Controls
136 - Web Application Security Design
137 - Specific Application Issues
138 - Session Management
139 - Input Validation
13 - Implementing Technical Controls
140 - Web Vulnerabilities and Input Mitigation Issues
141 - Buffer Overflow and other Application Issues
142 - Application Security Framework
143 - Web Service Security and Secure Coding Standards
144 - Software Development Methods
145 - Monitoring Mechanisms and Client-Server Side Processing
146 - Browser Extensions and Other Web Development Techniques
147 - Host-Storage-Network and Application Integration
148 - Securing Data Flows
149 - Standards Concepts
14 - Determine Aggregate CIA Score
150 - Interoperability Issues
151 - In House Commercial and Customized Applications
152 - Cloud and Virtualization Models
153 - Logical and Physical Deployment Diagrams
154 - Secure Infrastructure Design
155 - Storage Integration Security
156 - Enterprise Application Integration Enablers
157 - Authentication and Authorization Technologies
158 - Authentication and Identity Management
159 - Password Types-Management and Policies
15 - Worst Case Scenario Planning
160 - Authentication Factors
161 - Biometrics
162 - Dual-Multi Factor and Certificate Authentication
163 - Single Sign On Issues
164 - Access Control Models and Open Authorization
165 - Extensible Access Control Markup Language (XACML)
166 - Service Provisioning Markup Language (SPML)
167 - Attestation and Identity Propagation
168 - Federation and Security Assertion Markup Language (SAML)
169 - OpenID-Shibboleth and WAYF
16 - Calculation Tools and Attacker Motivation
170 - Advanced Trust Models
171 - Business Unit Collaboration
172 - Identifying and Communicating Security Requirements
173 - Security Controls Recommendations
174 - Secure Solutions Collaboration
175 - Secure Communication and Collaboration
176 - Web-Video Conferencing-Instant Messaging
177 - Desktop Sharing
178 - Presence Guidelines
179 - Email Messaging Protocol
17 - Return Of Investment
180 - Telephony-VoIP and Social Media
181 - Cloud Based Collaboration
182 - Remote Access and IPsec
183 - Mobile and Personal Device Management
184 - Over Air Technology Concerns
185 - WLAN Concepts-Terms-Standards
186 - WLAN Security and Attacks
187 - Security Across the Technology Life Cycle
188 - End to End Solution Ownership
189 - System Development Life Cycle
18 - Total Cost of Ownership and Risk Strategies
190 - Security Implications of Software Development Methodologies
191 - Asset Management
192 - Course End
19 - Risk Management Process
20 - Identifying Vulnerabilities and Threats
21 - Security Architecture Frameworks
22 - Business Continuity Planning
23 - IT Governance
24 - Security Policies
25 - Security-Privacy Policies and Procedures Part1
26 - Security-Privacy Policies and Procedures Part2
27 - Policy Development Updates
28 - Developing Processes and Procedures
29 - Legal Compliance Part1
30 - Legal Compliance Part2
31 - Security Policy Business Documents
32 - Outage Impact and Estimating Downtime Terms
33 - Sensitive Information-Internal Security Policies
34 - Incident Response Process
35 - Forensic Tasks
36 - Employment and Termination Procedures
37 - Network Auditing
38 - Incident Response and Recovery Procedures
39 - E-Discovery and Data Retention Policies
40 - Data Recovery-Storage and Backup Schemes
41 - Data Owner and Data Handling
42 - Disposal Terms and Concepts
43 - Data Breach and Data Analysis
44 - Incident Response Guidelines
45 - Incident and Emergency Response
46 - Media-Software and Network Analysis
47 - Order of Volatility
48 - Industry Trends Overview
49 - Performing Ongoing Research
50 - Security Practices
51 - Evolution of Technology
52 - Situational Awareness and Vulnerability Assessments
53 - Researching Security Implications
54 - Global Industry Security Response
55 - Threat Actors
56 - Contract Security Requirements
57 - Contract Documents
58 - Securing the Enterprise Overview
59 - Benchmarks and Baselines
60 - Prototyping and Testing Multiple Solutions
61 - Cost_Benefit Analysis
62 - Metrics Collection and Trend Data
63 - Security Controls-Reverse Engineering and Deconstructing
64 - Security Solutions Business Needs
65 - Lesson Learned- After Action Report
66 - Assessment Tools and Methods
67 - Port Scanners and Vulnerability Scanners
68 - Protocol Analyzer- Network Enumerator-Password Cracker
69 - Fuzzers and HTTP Interceptors
70 - Exploitation Tools
71 - Passive Reconnaissance Tools
72 - Vulnerability Assessments and Malware Sandboxing
73 - Memory Dumping and Penetration Testing
74 - Reconnaissance and Fingerprinting
75 - Code Review
76 - Social Engineering
77 - Social Cryptographic Concepts and Techniques
78 - Cryptographic Benefits and Techniques
79 - Hashing Algorithms
80 - Message Authentication Code
81 - Cryptographic Concepts
82 - Transport Encryption Protocol
83 - Symmetric Algorithms
84 - Asymmetric Algorithms
85 - Hybrid Encryption and Digital Signatures
86 - Public Key Infrastructure
87 - Digital Certificate Classes and Cypher Types
88 - Des Modes
89 - Cryptographic Attacks
90 - Strength vs Performance and Cryptographic Implementations
91 - Enterprise Storage
92 - Virtual Storage Types and Challenges
93 - Cloud Storage
94 - Data Warehousing
95 - Data Archiving
96 - Storage Area Networks (SANs) and (VSANs)
97 - Network Attached Storage (NAS)
98 - Storage Protocols and Fiber Channel over Ethernet (FCoE)
99 - Storage Network File Systems

[Packt] CompTIA Advanced Security Practitioner (CASP) [2017, ENG]

Contents:
01 - Course Introduction
02 - Business Influences and Associated Security Risks
03 - Risk Management
04 - Business Model Strategies
05 - Integrating Diverse Industries
06 - Third Party Information Security and Providers
07 - Internal and External Influences
08 - Impact of De-Perimeterization
09 - Risk Mitigation Planning - Strategies and Controls
100 - Secure Storage Management Techniques
101 - LUN Masking_Mapping and HBA Allocation
102 - Replication and Encryption Methods
103 - Network and Security Components-Concepts-Security Architectures
104 - Remote Access Protocols
105 - IPv6 and Transport Encryption
106 - Network Authentication Methods
107 - 802.1x and Mesh Networks
108 - Security Devices
109 - Network Devices
10 - CIA Triad
110 - Firewalls
111 - Wireless Controllers
112 - Router Security and Port Numbers
113 - Network Security Solutions
114 - Availability Controls-Terms and Techniques
115 - Advanced Router and Switch Configuration
116 - Data Flow Enforcement of Applications and Networks
117 - Network Device Accessibility and Security
118 - Security Controls for Hosts
119 - Trusted Operation Systems
11 - Business Classifications
120 - Endpoint Security Software and Data Loss Prevention
121 - Host Based Firewalls
122 - Log Monitoring and Host Hardening
123 - Standard Operating Environment and Group Policy Security
124 - Command Shell Restrictions
125 - Configuring and Managing Interface Security
126 - USB-Bluetooth-Firewire Restrictions and Security
127 - Full Disk Encryption
128 - Virtualization Security
129 - Cloud Security Services
12 - Information Life Cycle and Steak-Holder Input
130 - Boot Loader Protections
131 - Virtual Host Vulnerabilities
132 - Virtual Desktop Infrastructure
133 - Terminal Services
134 - Virtual TPM
135 - Application Vulnerabilities and Security Controls
136 - Web Application Security Design
137 - Specific Application Issues
138 - Session Management
139 - Input Validation
13 - Implementing Technical Controls
140 - Web Vulnerabilities and Input Mitigation Issues
141 - Buffer Overflow and other Application Issues
142 - Application Security Framework
143 - Web Service Security and Secure Coding Standards
144 - Software Development Methods
145 - Monitoring Mechanisms and Client-Server Side Processing
146 - Browser Extensions and Other Web Development Techniques
147 - Host-Storage-Network and Application Integration
148 - Securing Data Flows
149 - Standards Concepts
14 - Determine Aggregate CIA Score
150 - Interoperability Issues
151 - In House Commercial and Customized Applications
152 - Cloud and Virtualization Models
153 - Logical and Physical Deployment Diagrams
154 - Secure Infrastructure Design
155 - Storage Integration Security
156 - Enterprise Application Integration Enablers
157 - Authentication and Authorization Technologies
158 - Authentication and Identity Management
159 - Password Types-Management and Policies
15 - Worst Case Scenario Planning
160 - Authentication Factors
161 - Biometrics
162 - Dual-Multi Factor and Certificate Authentication
163 - Single Sign On Issues
164 - Access Control Models and Open Authorization
165 - Extensible Access Control Markup Language (XACML)
166 - Service Provisioning Markup Language (SPML)
167 - Attestation and Identity Propagation
168 - Federation and Security Assertion Markup Language (SAML)
169 - OpenID-Shibboleth and WAYF
16 - Calculation Tools and Attacker Motivation
170 - Advanced Trust Models
171 - Business Unit Collaboration
172 - Identifying and Communicating Security Requirements
173 - Security Controls Recommendations
174 - Secure Solutions Collaboration
175 - Secure Communication and Collaboration
176 - Web-Video Conferencing-Instant Messaging
177 - Desktop Sharing
178 - Presence Guidelines
179 - Email Messaging Protocol
17 - Return Of Investment
180 - Telephony-VoIP and Social Media
181 - Cloud Based Collaboration
182 - Remote Access and IPsec
183 - Mobile and Personal Device Management
184 - Over Air Technology Concerns
185 - WLAN Concepts-Terms-Standards
186 - WLAN Security and Attacks
187 - Security Across the Technology Life Cycle
188 - End to End Solution Ownership
189 - System Development Life Cycle
18 - Total Cost of Ownership and Risk Strategies
190 - Security Implications of Software Development Methodologies
191 - Asset Management
192 - Course End
19 - Risk Management Process
20 - Identifying Vulnerabilities and Threats
21 - Security Architecture Frameworks
22 - Business Continuity Planning
23 - IT Governance
24 - Security Policies
25 - Security-Privacy Policies and Procedures Part1
26 - Security-Privacy Policies and Procedures Part2
27 - Policy Development Updates
28 - Developing Processes and Procedures
29 - Legal Compliance Part1
30 - Legal Compliance Part2
31 - Security Policy Business Documents
32 - Outage Impact and Estimating Downtime Terms
33 - Sensitive Information-Internal Security Policies
34 - Incident Response Process
35 - Forensic Tasks
36 - Employment and Termination Procedures
37 - Network Auditing
38 - Incident Response and Recovery Procedures
39 - E-Discovery and Data Retention Policies
40 - Data Recovery-Storage and Backup Schemes
41 - Data Owner and Data Handling
42 - Disposal Terms and Concepts
43 - Data Breach and Data Analysis
44 - Incident Response Guidelines
45 - Incident and Emergency Response
46 - Media-Software and Network Analysis
47 - Order of Volatility
48 - Industry Trends Overview
49 - Performing Ongoing Research
50 - Security Practices
51 - Evolution of Technology
52 - Situational Awareness and Vulnerability Assessments
53 - Researching Security Implications
54 - Global Industry Security Response
55 - Threat Actors
56 - Contract Security Requirements
57 - Contract Documents
58 - Securing the Enterprise Overview
59 - Benchmarks and Baselines
60 - Prototyping and Testing Multiple Solutions
61 - Cost_Benefit Analysis
62 - Metrics Collection and Trend Data
63 - Security Controls-Reverse Engineering and Deconstructing
64 - Security Solutions Business Needs
65 - Lesson Learned- After Action Report
66 - Assessment Tools and Methods
67 - Port Scanners and Vulnerability Scanners
68 - Protocol Analyzer- Network Enumerator-Password Cracker
69 - Fuzzers and HTTP Interceptors
70 - Exploitation Tools
71 - Passive Reconnaissance Tools
72 - Vulnerability Assessments and Malware Sandboxing
73 - Memory Dumping and Penetration Testing
74 - Reconnaissance and Fingerprinting
75 - Code Review
76 - Social Engineering
77 - Social Cryptographic Concepts and Techniques
78 - Cryptographic Benefits and Techniques
79 - Hashing Algorithms
80 - Message Authentication Code
81 - Cryptographic Concepts
82 - Transport Encryption Protocol
83 - Symmetric Algorithms
84 - Asymmetric Algorithms
85 - Hybrid Encryption and Digital Signatures
86 - Public Key Infrastructure
87 - Digital Certificate Classes and Cypher Types
88 - Des Modes
89 - Cryptographic Attacks
90 - Strength vs Performance and Cryptographic Implementations
91 - Enterprise Storage
92 - Virtual Storage Types and Challenges
93 - Cloud Storage
94 - Data Warehousing
95 - Data Archiving
96 - Storage Area Networks (SANs) and (VSANs)
97 - Network Attached Storage (NAS)
98 - Storage Protocols and Fiber Channel over Ethernet (FCoE)
99 - Storage Network File Systems

CompTIA Advanced Security Practitioner (CASP)

Contents:
01 - Course Introduction
02 - Business Influences and Associated Security Risks
03 - Risk Management
04 - Business Model Strategies
05 - Integrating Diverse Industries
06 - Third Party Information Security and Providers
07 - Internal and External Influences
08 - Impact of De-Perimeterization
09 - Risk Mitigation Planning - Strategies and Controls
100 - Secure Storage Management Techniques
101 - LUN Masking_Mapping and HBA Allocation
102 - Replication and Encryption Methods
103 - Network and Security Components-Concepts-Security Architectures
104 - Remote Access Protocols
105 - IPv6 and Transport Encryption
106 - Network Authentication Methods
107 - 802.1x and Mesh Networks
108 - Security Devices
109 - Network Devices
10 - CIA Triad
110 - Firewalls
111 - Wireless Controllers
112 - Router Security and Port Numbers
113 - Network Security Solutions
114 - Availability Controls-Terms and Techniques
115 - Advanced Router and Switch Configuration
116 - Data Flow Enforcement of Applications and Networks
117 - Network Device Accessibility and Security
118 - Security Controls for Hosts
119 - Trusted Operation Systems
11 - Business Classifications
120 - Endpoint Security Software and Data Loss Prevention
121 - Host Based Firewalls
122 - Log Monitoring and Host Hardening
123 - Standard Operating Environment and Group Policy Security
124 - Command Shell Restrictions
125 - Configuring and Managing Interface Security
126 - USB-Bluetooth-Firewire Restrictions and Security
127 - Full Disk Encryption
128 - Virtualization Security
129 - Cloud Security Services
12 - Information Life Cycle and Steak-Holder Input
130 - Boot Loader Protections
131 - Virtual Host Vulnerabilities
132 - Virtual Desktop Infrastructure
133 - Terminal Services
134 - Virtual TPM
135 - Application Vulnerabilities and Security Controls
136 - Web Application Security Design
137 - Specific Application Issues
138 - Session Management
139 - Input Validation
13 - Implementing Technical Controls
140 - Web Vulnerabilities and Input Mitigation Issues
141 - Buffer Overflow and other Application Issues
142 - Application Security Framework
143 - Web Service Security and Secure Coding Standards
144 - Software Development Methods
145 - Monitoring Mechanisms and Client-Server Side Processing
146 - Browser Extensions and Other Web Development Techniques
147 - Host-Storage-Network and Application Integration
148 - Securing Data Flows
149 - Standards Concepts
14 - Determine Aggregate CIA Score
150 - Interoperability Issues
151 - In House Commercial and Customized Applications
152 - Cloud and Virtualization Models
153 - Logical and Physical Deployment Diagrams
154 - Secure Infrastructure Design
155 - Storage Integration Security
156 - Enterprise Application Integration Enablers
157 - Authentication and Authorization Technologies
158 - Authentication and Identity Management
159 - Password Types-Management and Policies
15 - Worst Case Scenario Planning
160 - Authentication Factors
161 - Biometrics
162 - Dual-Multi Factor and Certificate Authentication
163 - Single Sign On Issues
164 - Access Control Models and Open Authorization
165 - Extensible Access Control Markup Language (XACML)
166 - Service Provisioning Markup Language (SPML)
167 - Attestation and Identity Propagation
168 - Federation and Security Assertion Markup Language (SAML)
169 - OpenID-Shibboleth and WAYF
16 - Calculation Tools and Attacker Motivation
170 - Advanced Trust Models
171 - Business Unit Collaboration
172 - Identifying and Communicating Security Requirements
173 - Security Controls Recommendations
174 - Secure Solutions Collaboration
175 - Secure Communication and Collaboration
176 - Web-Video Conferencing-Instant Messaging
177 - Desktop Sharing
178 - Presence Guidelines
179 - Email Messaging Protocol
17 - Return Of Investment
180 - Telephony-VoIP and Social Media
181 - Cloud Based Collaboration
182 - Remote Access and IPsec
183 - Mobile and Personal Device Management
184 - Over Air Technology Concerns
185 - WLAN Concepts-Terms-Standards
186 - WLAN Security and Attacks
187 - Security Across the Technology Life Cycle
188 - End to End Solution Ownership
189 - System Development Life Cycle
18 - Total Cost of Ownership and Risk Strategies
190 - Security Implications of Software Development Methodologies
191 - Asset Management
192 - Course End
19 - Risk Management Process
20 - Identifying Vulnerabilities and Threats
21 - Security Architecture Frameworks
22 - Business Continuity Planning
23 - IT Governance
24 - Security Policies
25 - Security-Privacy Policies and Procedures Part1
26 - Security-Privacy Policies and Procedures Part2
27 - Policy Development Updates
28 - Developing Processes and Procedures
29 - Legal Compliance Part1
30 - Legal Compliance Part2
31 - Security Policy Business Documents
32 - Outage Impact and Estimating Downtime Terms
33 - Sensitive Information-Internal Security Policies
34 - Incident Response Process
35 - Forensic Tasks
36 - Employment and Termination Procedures
37 - Network Auditing
38 - Incident Response and Recovery Procedures
39 - E-Discovery and Data Retention Policies
40 - Data Recovery-Storage and Backup Schemes
41 - Data Owner and Data Handling
42 - Disposal Terms and Concepts
43 - Data Breach and Data Analysis
44 - Incident Response Guidelines
45 - Incident and Emergency Response
46 - Media-Software and Network Analysis
47 - Order of Volatility
48 - Industry Trends Overview
49 - Performing Ongoing Research
50 - Security Practices
51 - Evolution of Technology
52 - Situational Awareness and Vulnerability Assessments
53 - Researching Security Implications
54 - Global Industry Security Response
55 - Threat Actors
56 - Contract Security Requirements
57 - Contract Documents
58 - Securing the Enterprise Overview
59 - Benchmarks and Baselines
60 - Prototyping and Testing Multiple Solutions
61 - Cost_Benefit Analysis
62 - Metrics Collection and Trend Data
63 - Security Controls-Reverse Engineering and Deconstructing
64 - Security Solutions Business Needs
65 - Lesson Learned- After Action Report
66 - Assessment Tools and Methods
67 - Port Scanners and Vulnerability Scanners
68 - Protocol Analyzer- Network Enumerator-Password Cracker
69 - Fuzzers and HTTP Interceptors
70 - Exploitation Tools
71 - Passive Reconnaissance Tools
72 - Vulnerability Assessments and Malware Sandboxing
73 - Memory Dumping and Penetration Testing
74 - Reconnaissance and Fingerprinting
75 - Code Review
76 - Social Engineering
77 - Social Cryptographic Concepts and Techniques
78 - Cryptographic Benefits and Techniques
79 - Hashing Algorithms
80 - Message Authentication Code
81 - Cryptographic Concepts
82 - Transport Encryption Protocol
83 - Symmetric Algorithms
84 - Asymmetric Algorithms
85 - Hybrid Encryption and Digital Signatures
86 - Public Key Infrastructure
87 - Digital Certificate Classes and Cypher Types
88 - Des Modes
89 - Cryptographic Attacks
90 - Strength vs Performance and Cryptographic Implementations
91 - Enterprise Storage
92 - Virtual Storage Types and Challenges
93 - Cloud Storage
94 - Data Warehousing
95 - Data Archiving
96 - Storage Area Networks (SANs) and (VSANs)
97 - Network Attached Storage (NAS)
98 - Storage Protocols and Fiber Channel over Ethernet (FCoE)
99 - Storage Network File Systems

Cisco Firepower and Advanced Malware Protection LiveLessons

Lesson 1: Fundamentals of Cisco Next-Generation Network Security
Lesson 2: Introduction and Design of Cisco ASA with FirePOWER Services
Lesson 3: Configuring Cisco ASA with FirePOWER Services
Lesson 4: Cisco AMP for Networks
Lesson 5: Cisco AMP for Endpoints
Lesson 6: Cisco AMP for Content Security
Lesson 7: Configuring and Troubleshooting the Cisco Next-Generation IPS Appliances
Lesson 8: Firepower Management Center

 

Understanding the Cisco ASA Firewall Training Video

01. Introduction
0101Welcome To The Course
0102 About The Author
0103 How To Access Your Working Files
02. Introduction To The Firewall
0201 ASA Hardware Models
0202 CLI Basics Part - 1
0203 CLI Basics Part - 2
03. Basic Configuration
0301 Interface Configuration
0302 5505 Switchports
0303 Security Levels
0304 Same Security Level
0305 The Course Lab Environment
0306 Implementing Access Lists Part - 1
0307 Implementing Access Lists Part - 2
0308 Introduction To NAT
0309 Fixup Protocol ICMP
0310 Management Access Part - 1
0311 Management Access Part - 2
0312 Firewall Local DHCP Server
0313 A Basic Firewall Configuration Part - 1
0314 A Basic Firewall Configuration Part - 2
0315 An Introduction To ASDM Part - 1
0316 An Introduction To ASDM Part - 2
04. Network Address Translation In Depth
0401 Network Address Translation Part - 1
0402 Network Address Translation Part - 2
0403 Network Address Translation Part - 3
0404 Network Address Translation Part - 4
0405 NAT And Access Lists
05. Anyconnect Client VPN Setup
0501 Two Types Of VPN Connections
0502 Two Types Of VPN Clients
0503 SSL Certificates Part - 1
0504 SSL Certificates Part - 2
0505 Download Anyconnect Files From Cisco
0506 Upload .Pkg Files To ASA
0507 Default Licenses In ASA
0508 Configuring The .Pkg-Files To Use
0509 Activating Anyconnect (Enabling)
0510 Logging And Debugging Anyconnect
0511 Connecting But No Traffic Flow
0512 Fix NAT To Make It Work
0513 Internet Access Via The Tunnel
0514 Split Tunneling
0515 Making The User Select Connection Profile
0516 VPN Filter
0517 Client Profile Editor
0518 LDAP Authentication Of Users
0519 Dynamic Access Policies Part - 1
0520 Dynamic Access Policies Part - 2
06. IPSEC VPN
0601 The Life Of An IPSEC-Tunnel
0602 Information Needed
0603 Configuring Phase 1 Parameters
0604 Configuring Phase 2 Parameters
0605 Proxy ACL And Crypto Map Configuration
0606 Finalising The VPN Configuration
0607 Testing The Tunnel
0608 Modifying NAT To Make The Tunnel Work
07. Troubleshooting Tools
0701 Logging And Debugging
0702 Packet Tracer
0703 Packet Capture
08. Advanced Topics
0801 Transparent Mode
0802 Multi Context
0803 Failover
0804 Trunks And Etherchannels
09. Conclusion
0901 Wrap Up And Thank You

Cisco CCNP Security 300-207 SITCS

1. SITCS Welcome (3 min)
2. WSA Overview (10 min)
3. Bootstrapping the WSA (12 min)
4. Deploy and License a WSA VM (10 min)
5. WSA Identities (6 min)
6. WSA Access Policy (13 min)
7. WSA User Authentication (10 min)
8. Directing Traffic to the WSA (6 min)
9. WCCP Router Configuration (12 min)
10. WCCP ASA Configuration (12 min)
11. Cisco Legacy IPS and IDS Concepts (9 min)
12. IDM Interface (13 min)
13. ESA Overview (9 min)
14. Email Terminology (7 min)
15. ESA VM Install (6 min)
16. Licensing the ESA (2 min)
17. ESA HATs, RATs, and Listeners (9 min)
18. Verifying HATs and RATs (5 min)
19. E-Mail Policies (6 min)
20. ESA Message Tracking (5 min)
21. ESA Trace Tool (1 min)
22. Cloud Web Security Overview (7 min)
23. ASA to CWS Connector (9 min)
24. IOS to CWS Connector (4 min)
25. ASA to CX Module Policy (7 min)

Introduction
3m 37s
Introduction 3m 37s
Create and Configure VMware Clusters
1h 14m
What This Module Covers 2m 35s
vSphere HA and DRS Overview 14m 40s
Determine How DRS and HA are Applicable to an Environment 2m 17s
Create/Delete a DRS/HA Cluster 7m 41s
Add/Remove ESXi Hosts from a DRS/HA Cluster 4m 13s
Add/Remove Virtual Machines from a DRS/HA Cluster 2m 28s
Configure Storage DRS 4m 8s
Configure Enhanced vMotion Compatibility 3m 23s
Monitor a DRS/HA Cluster 13m 25s
Configure Migration Thresholds for DRS and Virtual Machines 4m 30s
Configure Automation Levels for DRS and Virtual Machines 1m 55s
Enable/Configure/Disable Host Power Management and DPM 5m 33s
Enable/Disable Host Monitoring 2m 2s
Enable/Configure/Disable Virtual Machine and App Monitoring 4m 29s
What This Module Covered 1m 8s
Plan and Implement VMware Fault Tolerance
25m 57s
What This Module Covers 1m 15s
VMware Fault Tolerance Overview 4m 26s
Configure VMware Fault Tolerance Networking 3m 25s
Given a Scenario, Determine VMware Fault Tolerance Config 3m 14s
Enable/Disable VMware Fault Tolerance on a Virtual Machine 8m 1s
Test a Fault Tolerant Configuration 2m 29s
Determine Use Case for VMware Fault Tolerance on a VM 1m 26s
What This Module Covered 1m 37s
Create and Administer Resource Pools
28m 15s
What This Module Covers 1m 19s
Explain vFlash Architecture 2m 36s
Explain use Cases for Resource Pools 3m 14s
Create/Remove a Resource Pool 1m 59s
Configure Resource Pool Attributes 5m 28s
Add/Remove Virtual Machines from a Resource Pool 1m 15s
Create/Delete vFlash Resource Pool 2m 20s
Assign vFlash Resources to VMDKs 2m 52s
Determine Resource Pool Requirements 6m 12s
What This Module Covered 0m 56s
Migrating Virtual Machines
21m 21s
What This Module Covers 1m 40s
Explain Enhanced vMotion Compatibility (EVC) 1m 56s
Explain Long Distance vMotion 1m 46s
Explain Process for vMotion/Storage vMotion Migrations 2m 52s
Configure Virtual Machine Swap File Location 2m 41s
Migrate a Powered-off or Suspended Virtual Machine 2m 41s
Migrate Virtual Machines Using vMotion/Storage vMotion 6m 9s
What This Module Covered 1m 31s
Backup and Restore Virtual Machines
32m 0s
What This Module Covers 1m 19s
VMware Data Protection Overview 1m 42s
Explain VMware Data Protection Sizing Guidelines 2m 30s
Describe vSphere Replication Architecture 0m 58s
Install and Configure VMware Data Protection 7m 6s
Create a Backup Job with VMware Data Protection 2m 46s
Perform a Live File-level Restore with VMware Data Protection 3m 12s
Create/Delete/Consolidate Virtual Machine Snapshots 6m 18s
Perform a Failback Operation Using vSphere Replication 2m 10s
Determine Backup Solution for a Given vSphere Implementation 2m 2s
What This Module Covered 1m 52s
Update ESXi and Virtual Machines
33m 9s
What This Module Covers 1m 40s
Create/Edit/Remove a Host Profile from an ESXi Host 3m 34s
Attach/Apply a Host Profile to an ESXi Host or Cluster 2m 10s
Perform Compliance Scanning/Remediation Using Host Profiles 4m 45s
Install and Configure vSphere Update Manager 7m 10s
Configure Patch Download Options 4m 30s
Create/Edit/Delete an Update Manager Baseline 2m 48s
Attach an Update Manager Baseline to an ESXi Host or Cluster 1m 19s
Scan and Remediate ESXi Hosts and VMs Using Update Manager 3m 41s
What This Module Covered 1m 28s

1. CISA Overview (7 min)
2. The Process of Auditing Information Systems (11 min)
3. IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics (9 min)
4. Audit Risk Assessment (15 min)
5. Business Processes (5 min)
6. Control Objectives (8 min)
7. Audit Planning and Management (9 min)
8. Laws and Regulations (3 min)
9. Evidence (11 min)
10. Sampling Methodologies (9 min)
11. Reporting and Communications (5 min)
12. Audit Quality Assurance (3 min)
13. Types of Audits (5 min)
14. Governance and Management of IT (8 min)
15. Information Systems Strategy (10 min)
16. Standards, Governance and Frameworks (9 min)
17. IT Organization (6 min)
18. Legal Compliance (8 min)
19. Enterprise Architecture (4 min)
20. Maintenance of Policies and Procedures (2 min)
21. Maturity Models (5 min)
22. Process Optimization (3 min)
23. IT Investment Strategies (5 min)
24. IT Vendor Selection and Management (8 min)
25. IT Risk Management (8 min)
26. Control Processes (4 min)
27. Quality Management Systems (4 min)
28. IT Performance Monitoring and Reporting (6 min)
29. BCP - Business Impact Analysis (8 min)
30. BCP – Maintenance and Testing (3 min)
31. BCP - Invoke and Return to Normal (7 min)
32. Information Systems Acquisition, Development and Implementation (9 min)
33. Benefits Realization (5 min)
34. Vendor Management (7 min)
35. Project Governance (9 min)
36. Project Management (17 min)
37. Risk Management (5 min)
38. Requirements Management (7 min)
39. Application Architecture (5 min)
40. Methodologies (12 min)
41. Control Objectives and Techniques (11 min)
42. Testing (10 min)
43. Configuration and Change Management (6 min)
44. System Migration and Deployment (10 min)
45. Project Success Criteria (5 min)
46. Post-Implementation Reviews (4 min)
47. Information Systems Operations, Maintenance & Support (8 min)
48. Service Level Frameworks (6 min)
49. Service Level Management (7 min)
50. Monitor 3rd Party Compliance (4 min)
51. Architecture (11 min)
52. Computer Hardware, Software and Networks (22 min)
53. Software Resiliency Tools and Techniques (4 min)
54. Software Licensing and Inventory Interfaces (3 min)
55. Managing Schedules (6 min)
56. System Interface Integrity (10 min)
57. Capacity Planning (4 min)
58. Performance Monitoring (3 min)
59. Data Backup (5 min)
60. Database Administration Practices (9 min)
61. Data Quality and Retention (6 min)
62. Problem and Incident Management (5 min)
63. Managing Change to Production Environments (3 min)
64. Risks and Controls for End User Computing (6 min)
65. Disaster Recovery – Legal and Contractual Issues (7 min)
66. Business Impact of Disaster Recovery (2 min)
67. Disaster Recovery Plan Maintenance (5 min)
68. Alternate Processing Sites (9 min)
69. Disaster Recovery Testing (4 min)
70. Invoking Disaster Recovery (6 min)
71. Protection of Information Assets (8 min)
72. Information Asset Protection (4 min)
73. Privacy Principles (6 min)
74. Security Controls (5 min)
75. Environmental Protection (6 min)
76. Physical Access Controls (5 min)
77. Logical Access Controls (3 min)
78. Identification and Authentication (3 min)
79. Virtual Systems (5 min)
80. Mobile Devices (3 min)
81. Voice Communication (4 min)
82. Internet Security, Protocols and Techniques (9 min)
83. Network Security Concerns (4 min)
84. Data Encryption (3 min)
85. Public Key Infrastructure (5 min)
86. Peer to Peer Computing (5 min)
87. Data Classification Standards (4 min)
88. Handling Confidential Data (4 min)
89. Data Leakage (4 min)
90. End-User Computing Security (5 min)
91. Security Awareness Program (4 min)
92. Cyber Attacks (7 min)
93. Detection Tools (4 min)
94. Security Testing Techniques (6 min)
95. Security Incidents (3 min)
96. Handling of Evidence (4 min)
97. Fraud Risk Factors (6 min)
98. Passing the Exam (7 min)

Insights into Wireless
Insights into Wireless
New Terms to Learn
Advantages & Disadvantages
Types of Wi-Fi Networks
Wi-Fi Standards
Wi-Fi Authentication Modes
Chalking
Antenna Types
Summary
Encryption in Wireless
Encryption in Wireless
WEP Encryption
WPA & WPA2 Encryption
Breaking Encryption
Defending Against Cracking
Summary
Threats from Wireless
Threats from Wireless
Types of Attacks
Attack on the AP
Attack on the Client
Summary
The Methodology of Hacking Wireless
The Method of Hacking Wireless
Wi-Fi Discovery
GPS Mapping
Wireless Traffic Analysis
Launching Attacks
Let's Go Look-ng
Cracking Wi-Fi Encryption
Let's See How Much Damage We Can Do!
Summary
Hacking Bluetooth
Hacking Bluetooth
The Threats
New Terms
All About Bluetooth
Security
Summary
Countermeasures
Countermeasures
Bluetooth
Rogue APs
6 Layers of Wireless
Best Practices
Tools
Summary

Section 1: Basics practice examples
Lecture 1
Introduction
09:01
Lecture 2
Necessary software
04:21
Lecture 3
APK1 # 2
08:05
Lecture 4
1 - # PART3
07:28
Lecture 5
1 - # part4
06:13
Lecture 6
2 - # part1
06:54
Lecture 7
2 - # part2
05:28
Lecture 8
2 - # part3
02:59
Lecture 9
2 - # part4
01:40
Lecture 10
3 - # part1
04:37
Lecture 11
3 - # part2
12:42
Lecture 12
3 - # part3
01:48
Lecture 13
3 - # part4
11:59
Lecture 14
4 - # part1
04:03
Lecture 15
4 - # part2
06:13
Lecture 16
4 - # part3
07:59
Lecture 17
4 - # part4
09:57
Lecture 18
4 - # part5
06:46
Lecture 19
5 - # part1
01:47
Lecture 20
5 - # part2
04:02
Lecture 21
5 - # part3
12:13
Lecture 22
5 - # part4
06:00
Lecture 23
5 - # part5
02:29
Lecture 24
5 - # part6
02:53
Section 2: Python Networking Basics
Lecture 25
Arguments
07:59
Lecture 26
Dictionaries introduction
03:49
Lecture 27
Dictionary methods
06:01
Light th 28
Dictionary methods 2
06:01
Lecture 29
Data Types
03:46
Lecture 30
dir and help
02:41
Lecture 31
Break, Continue, Pass
07:12
Lecture 32
Booleans and logical operators
06:45
Lecture 33
Classes and Inheritance
06:50
lecture 34
Classes and Objects
13:06
lecture 35
Exceptions
02:52
Section 3: Loops
lecture 36
If Elif Else conditionals
13:52
lecture 37
If Elif Else conditionals 2
13:52
lecture 38
If For While nesting
07:27
lecture 39
Functions
10 28
Lecture 40
Lambda functions
07:00
Lecture 41
List Set Dictionary comprehensions
05:47
Lecture 42
Lists introduction
04:03
Lecture 43
List methods
09:14
Lecture 44
List slices
06:13
Lecture 45
Try Except Else Finally
10:59
Lecture 46
Map, Filter, Reduce
06:24
Lecture 47
Modules and importing
16:03
Section 4: Files
Lecture 48
Python scripts
04:02
Lecture 49
File writing and appending
10:11
Lecture 50
File opening and read ing
08:43
Lecture 51
File closing The method with
03:08
Lecture 52
Namespaces
12:32
Lecture 53
Numbers and math operators
08:04
Lecture 54
Planning the application
01:30
Lecture 55
Planning the applications # 1
01:30
Lecture 56
Python passing argument
06:13
Lecture 57
Python interacting with MySQL
09:59
Lecture 58
Python interpreter
07:17
Lecture 59
Python networking with Scapy. Creating your own packets.
11:50
Lecture 60
Python networking with SNMP
17:32
Lecture 61
Python networking with SSH
13:38
Lecture 62
Python networking with Telnet
16:40
Lecture 63
Some advice on coding
06:21
Lecture 64
Linking VirtualBox to the GNS3 network
08:10
lecture 65
GNS3 Setup
08:25
lecture 66
python-programming-for-real- life-networking-use- 2336402
01:52
lecture 67
python-programming-for-real- life-networking-use- 2678380
01:52
lecture 68
python -programming-for-real-life- networking-use- 2713592
04:36
Lecture 69
python-programming-for-real- life-networking-use- 2727964
05:22
Lecture 70
python-programming-for-real- life-networking -use-2754060
04:38
Lecture 71
python-programming-for-real- life-networking-use- 2754706
05:26
Lecture 72
Sets introduction
04:45
Lecture 73
Set methods
03:33
Lecture 74
Short introduction
03:21
Lecture 75
up the MySQL Setting database
11:44
Section 5: Strings
lecture 76
introduction
07:26
lecture 77
String slices
09:23
Lecture 78
String operators and formatting
05:00
Lecture 79
String methods
08:26
Section 6: testing
Lecture 80
Testing the application 2
03:41
Lecture 81
Testing the application
03:11
Lecture 82
The re.findall and methods re.sub
06:38
Lecture 83
The re.match and re.search methods
19:48
Lecture 84
Threading basics
06:54
Section 7: Working with GNS3 software
Lecture 85
Tuples introduction
05:54
Lecture 86
Tuple methods
04:24
Lecture 87
User input
03:51
Lecture 88
Variables
07:18
Lecture 89
While While-Else loops
05:27

├── 01 Introduction Where to get started
│ └── 001 Introduction.mp4
├── 02 Optional Background Knowledge
│ └── 001 Background Knowledge Vim and Editing Files on a Server.mp4
├── 03 Install Odoo on the Local Server
│ ├── 001 Ubuntu 14.04.2 LTS Server Download.mp4
│ ├── 002 Virtual Box Installation.mp4
│ ├── 003 Create a Virtual Machine.mp4
│ ├── 004 Install Ubuntu 14.04.2 LTS Long Term Support.mp4
│ ├── 005 Login to Ubuntu the first time - difference between OS and Server.mp4
│ ├── 006 Access Ubuntu Odoo from the Host System - Port Forwarding.mp4
│ └── 007 Install Odoo Version 8 with a Script.mp4
├── 04 Create the first Database and install more Modules
│ ├── 001 Create a new Database and recover Login Details.mp4
│ └── 002 Install an additional module from git from the Odoo page.mp4
├── 05 User Administration
│ └── 001 Login with Admin and create a new user.mp4
└── 06 Setup E-Mail Functionality
├── 001 Sign up for Google Apps for Work.mp4
├── 002 Setup Incoming Mails Servers for users and receive mails in the user-inbox.mp4
└── 003 Send E-Mails with Odoo.mp4

Introduction
2m 19s
Welcome
1m 9s
What you should know
1m 10s
1. AWS Security Foundations
18m 27s
The AWS shared responsibility model
5m 25s
The AWS security landscape
1m 31s
The importance of separation of duties
2m 58s
Implement separation of duties
3m 46s
Enable CloudTrail
4m 47s
2. IAM Concepts in AWS
53m 55s
Identity and Access Management (IAM) overview
4m 34s
Configure IAM policies
7m 0s
Configure IAM groups
3m 28s
Configure IAM users
6m 48s
Create IAM roles
4m 3s
Understand temporary access
1m 30s
Grant temporary access
8m 13s
Incorporate least privilege
6m 30s
Exploring federated access in AWS
7m 6s
Use case: Securing financial access
4m 43s
3. S3 Access Management
33m 57s
Simple Storage Service (S3) management options
2m 23s
Access S3 privately
2m 11s
Manage S3 with IAM
2m 28s
The practice bit of the previous video
4m 44s
Solving S3 access with IAM
5m 7s
S3 bucket policies
4m 7s
S3 bucket access via the AWS CLI
2m 58s
S3 access control lists
5m 39s
Presigned URLs
4m 20s
4. Security Audits in AWS
15m 57s
Prepare for a security audit
4m 29s
Access key rotation
5m 4s
Get help with Trusted Advisor
6m 24s

1. Welcome: Course Overview and Cisco Certification
2. Intro: Technology Connecting Offices
3. Intro: A Focus on GRE and DMVPN
4. Intro: Routing Protocol Choices
5. Intro: IPv6 Review and RIPng
6. EIGRP: Overview, Communication, and Neighbors
7. EIGRP: Base Configuration
8. EIGRP: Summary Routes
9. EIGRP: Security
10. EIGRP: L2 and L3 MPLS Design
11. EIGRP: Frame Relay Design
12. EIGRP: Frame Relay Point-to-Point Configuration
13. EIGRP: Frame Relay Multipoint Configuration
14. EIGRP: Stub Routing
15. EIGRP: Load Balancing
16. EIGRP: IPv6 Configuration
17. EIGRP: Named Configuration
18. OSPF: Understanding Core OSPF Design
19. OSPF: OSPF Neighbor Relationships - The Nitty Gritty
20. OSPF: DR/BDR Relationships, Neighbor States, and SPF Algorithm
21. OSPF: Implementing Summarization on ABRs and ASBRs
22. OSPF: Special Area Types
23. OSPF: Virtual Links
24. OSPF: Configuring OSPFv3
25. Redistribution: Understanding Route Redistribution Concepts
26. Redistribution: Configuring Basic Redistribution
27. Redistribution: Filtering with Distribution Lists
28. Redistribution: Prefix List Concepts
29. Redistribution: Route-map Concepts and Filtering
30. Redistribution: Configuring Redistribution with Prefix Lists
31. Path Control: Policy-Based Routing
32. Path Control: Using IP SLA
33. BGP: Understanding Internet Connection Options
34. BGP: Understanding BGP Neighbor Relationships
35. BGP: Understanding Key BGP Attributes
36. Miscellaneous Protocols: Understanding and Configuring SNMPv3
37. Miscellaneous Protocols: Understanding and Configuring PPPoE
38. Miscellaneous Protocols: Cisco Easy Virtual Networking (EVN)

1. Welcome to ICND2! (7 min)
2. Review Lab: Rebuilding ICND1 (9 min)
3. Review Lab, Step 1: Base Config (12 min)
4. Review Lab, Step 2: IP Addressing, Speed, and Duplex (12 min)
5. Review Lab, Step 3: Enabling RIPv2 Routing (14 min)
6. Review Lab, Step 4: Static Routes, Default Routes (8 min)
7. Review Lab, Step 5: Trunking, VTP, and VLANs (18 min)
8. Review Lab, Step 6: Router on a Stick and DHCP Services (14 min)
9. Review Lab, Step 7: Network Address Translation (11 min)
10. Review Lab, Step 8: Standard ACLs (5 min)
11. Spanning Tree Protocol: What Does STP Do? (14 min)
12. Spanning Tree Protocol: Understanding the Standards (10 min)
13. Spanning Tree Protocol: How the Root Bridge is Elected (16 min)
14. Spanning Tree Protocol: Will the Real Network Topology Step Forward (18 min)
15. Spanning Tree Protocol: Lab - Build, Configure, Test (22 min)
16. Spanning Tree Protocol: Portfast and BPDUGuard (8 min)
17. Switch Services: Stacking and Chassis Aggregation (7 min)
18. Switch Services: Security at Layer 2 (13 min)
19. Etherchannel: Etherchannel is Awesome! (13 min)
20. Etherchannel: Lab - Configuring Etherchannel Bundles of Joy (21 min)
21. IOS Software: Fully Understanding the IOS Boot Process (18 min)
22. IOS Software: Lab — Upgrading the IOS (13 min)
23. IOS Software: Understanding IOS Licensing (6 min)
24. Core Routing: The Routing Table (does not) Reveal All! (22 min)
25. Core Routing: Revising Routing Protocols (17 min)
26. OSPF: Protocol Overview (15 min)
27. OSPF: Neighbor Relationships (20 min)
28. OSPF: The DR and BDR (10 min)
29. OSPF Lab: Base Configuration (30 min)
30. OSPF Lab: DR Election (11 min)
31. OSPF Lab: Metric Adjustment (8 min)
32. OSPF Lab: Passive Networks and Timer Configuration (12 min)
33. OSPF Lab: Troubleshooting Single Area OSPF (21 min)
34. OSPF: Understanding Multiarea (11 min)
35. OSPF Lab: Multiarea OSPF Configuration (17 min)
36. OSPF Lab: Implementing Summary Routes (12 min)
37. OSPF Lab: Implementing Default Routing (9 min)
38. EIGRP: Protocol Overview (18 min)
39. EIGRP: Neighbors and Metric (13 min)
40. EIGRP Lab: Base Configuration (15 min)
41. EIGRP Lab: Route Summarization (17 min)
42. EIGRP Lab: Load Balancing (15 min)
43. EIGRP Lab: Hello and Hold Down Timers (12 min)
44. IPv6 Routing: IPv6 Addressing Review (8 min)
45. IPv6 Routing: Configuring OSPFv3 Routing (13 min)
46. IPv6 Routing: IPv6 with EIGRP (6 min)
47. WAN Technologies: Understanding Point-to-Point Connections (18 min)
48. WAN Technologies: Getting the Layer 2 (13 min)
49. WAN Technologies Lab: Configuring a Point-to-Point Connection (10 min)
50. WAN Technologies Lab: Configuring PPP Authentication (18 min)
51. WAN Technologies Lab: Configuring PPP Multilink (10 min)
52. WAN Technologies: The WAN Revolution (11 min)
53. Internet Technology: Cable and DSL (10 min)
54. Internet Technology Lab: PPPoE Configuration (12 min)
55. Internet Technology: Understanding VPN Solutions (18 min)
56. Internet Technology Lab: GRE Tunnel Implementation (12 min)
57. Internet Technology: Understanding BGP Fundamentals (22 min)
58. Internet Technology Lab: Basic BGP Configuration (34 min)
59. Infrastructure Services: Understanding HSRP (17 min)
60. Infrastructure Services Lab: Configuring HSRP (21 min)
61. Infrastructure Services: Understanding the QoS Dilemma (6 min)
62. Infrastructure Services: QoS Tools (20 min)
63. Infrastructure Services: RADIUS and TACACS+ (20 min)
64. Infrastructure Services Lab: Configuring Extended ACLs (38 min)
65. Monitoring Tools: Understanding IP SLA (10 min)
66. Monitoring Tools Lab: Configuring IP SLA (and Beyond) (17 min)
67. Monitoring Tools: Understanding SNMP (12 min)
68. Monitoring Tools Lab: Configuring SNMP (34 min)
69. Monitoring Tools Lab: Understanding and Configuring SPAN (6 min)
70. Network Services: Defining Software Defined Networking (SDN) (11 min)
71. Network Services: How Cisco Does SDN (16 min)

content:

Understanding the CompTIA Troubleshooting Model
33m 36s
Overview 2m 37s
Meanwhile, in the Real World 1m 16s
Getting to Know CompTIA 1m 26s
About Troubleshooting Models 1m 32s
The CompTIA Troubleshooting Model 1m 1s
Step 1: Identify the Problem 3m 0s
Step 2: Establish a Theory 2m 1s
Step 3: Test the Theory 2m 5s
Step 4: Establish the Repair Plan 2m 26s
Step 5: Verify the Repair 1m 34s
Step 6: Document the Case 0m 47s
Hardware and Software Tools 2m 6s
Demo: Touring Software Diagnostic Tools 5m 53s
Back to the Real World 3m 50s
Homework 0m 24s
For Further Learning 0m 35s
Summary 0m 56s
Troubleshooting the Motherboard
36m 12s
Overview 2m 4s
Meanwhile, in the Real World 1m 14s
Common Symptoms and Resolutions 4m 15s
POST Codes 3m 1s
Correcting the BIOS 4m 28s
More Symptoms and Resolutions 2m 2s
Hard Disk Head Crash 3m 50s
ESD Component Damage 3m 15s
Proprietary Crash Screens 1m 59s
Technician Tools 3m 37s
Demo: Motherboard Troubleshooting Tips 3m 51s
Back to the Real World 0m 38s
Homework 0m 35s
For Further Learning 0m 26s
Summary 0m 50s
Troubleshooting Storage
37m 53s
Overview 1m 28s
Meanwhile, in the Real World 0m 59s
Common Symptoms and Resolutions 3m 38s
SSDs and Fragmentation 3m 20s
More Symptoms and Resolutions 1m 34s
PATA Drive Configuration 4m 16s
S.M.A.R.T. 1m 41s
Proprietary Crash Screens 1m 35s
Technician Tools 1m 46s
Demo 1: Shopping for Screwdrivers 1m 59s
External Drive Enclosures 1m 5s
File Recovery Software 1m 56s
Demo 2: Using Windows Command-line Tools 9m 41s
Back to the Real World 0m 30s
Homework 0m 43s
For Further Learning 0m 48s
Summary 0m 45s
Troubleshooting the Display
30m 53s
Overview 2m 10s
Meanwhile, in the Real World 1m 5s
Common Symptoms and Resolutions 3m 38s
Quick Fixes 3m 36s
Color Calibration 3m 49s
More Symptoms and Resolutions 2m 9s
Display Burn-in 1m 19s
Demo 1: Using MSCONFIG 5m 27s
Demo 2: Demo: Experimenting with Video Modes 4m 4s
Back to the Real World 0m 41s
Homework 0m 59s
For Further Learning 0m 42s
Summary 1m 10s
Troubleshooting the Network
35m 35s
Overview 1m 37s
Common Symptoms and Resolutions 3m 19s
Link-local Addresses 3m 57s
Duplicate IP Address Errors 3m 26s
Half- vs. Full-duplex Communications 2m 10s
Hardware Tools 2m 12s
Wireless Locators 1m 3s
Demo 1: Troubleshooting with PING and IPCONFIG 5m 55s
Demo 2: Troubleshooting with TRACERT 9m 50s
Homework 0m 32s
For Further Learning 0m 26s
Summary 1m 3s
Troubleshooting Mobile Devices
35m 7s
Overview 1m 55s
Meanwhile, in the Real World 0m 52s
Common Symptoms and Resolutions 4m 7s
Laptop Display Replacement 2m 53s
Key Repair 4m 10s
Trackpad Annoyances 3m 14s
More Symptoms and Resolutions 2m 51s
Stuck OS 4m 34s
The Memory Effect 2m 55s
Mobile Battery Woes 2m 13s
Disassembly Procedures 3m 10s
Back to the Real World 0m 31s
Summary 1m 36s
Troubleshooting Printers
30m 27s
Overview 1m 18s
Meanwhile, in the Real World 1m 7s
Common Symptoms and Resolutions 4m 32s
More Symptoms and Resolutions 6m 10s
Even More Symptoms and Resolutions 7m 22s
The Maintenance Kit 0m 44s
The Toner Vacuum 1m 41s
The Printer Spooler 2m 8s
Back to the Real World 1m 21s
Homework 1m 1s
For Further Learning 0m 30s
Summary 2m 27s

Introduction
Welcome
1. Cabling and Topology
Coaxial cabling
UTP and STP cabling
Fiber-optic cabling
2. Ethernet Basics
Introduction to Ethernet
Early Ethernet
The daddy of Ethernet, 10BaseT
3. Modern Ethernet
Modern Ethernet, switches, and duplex
Connecting switches
Gigabit Ethernet and 10-gigabit Ethernet
Switch backbones
4. Installing a Physical Network
Introduction to structured cabling
Crimping cables
Punchdown blocks
MDF, IDF, demarc, and tour of the equipment room
Testing cable
Troubleshooting structured cabling
Advanced troubleshooting structured cabling
Using a toner and probe
Conclusion

├── 01 Introduction
│ ├── 001 Welcome to Volume 4.mp4
│ ├── 002 Introduction to the Instructor.mp4
│ ├── 003 Security Quick Win.mp4
│ ├── 004 Target Audience.mp4
│ ├── 005 Study Recommendations.mp4
│ ├── 006 Course updates.mp4
│ └── links.txt
├── 02 Goals and Learning Objectives - Volume 4
│ ├── 007 What is End Point Protection and why is it important.mp4
│ └── 008 Goals and Learning Objectives - Volume 4.mp4
├── 03 File and Disk Encryption
│ ├── 009 Goals and Learning Objectives.mp4
│ ├── 010 Disk Encryption What is it good for.mp4
│ ├── 011 Disk Encryption Attacks - Cryptoalgorithms Brute Force Attacks Implementation.mp4
│ ├── 012 Disk Encryption Attacks - Physical.mp4
│ ├── 013 Disk Encryption Attacks - Containers Volumes and Partitions.mp4
│ ├── 014 Windows - Disk Encryption - An Introduction.mp4
│ ├── 015 Windows - Disk Encryption - Bitlocker.mp4
│ ├── 016 Windows - Setting Up BitLocker.mp4
│ ├── 017 Windows - Disk Encryption - VeraCrypt.mp4
│ ├── 018 Windows - Disk Encryption - CipherShed Diskcryptor Symantec and Bestcrypt.mp4
│ ├── 019 Windows Mac Linux - Setting up VeraCrypt.mp4
│ ├── 020 Mac - Filevault2.mp4
│ ├── 021 Mac - Setting up Filevault2.mp4
│ ├── 022 Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4
│ ├── 023 Linux - Setting up DMCryptLUKS.mp4
│ ├── 024 Linux - Encrypting the boot partition with Grub2.mp4
│ ├── 025 Self Encrypting Drives SEDs.mp4
│ ├── 026 Defense Against Disk Decryption Attacks.mp4
│ ├── 027 File Encryption.mp4
│ ├── 028 Mandatory Key Disclosure Plausible Deniability.mp4
│ ├── 029 Nesting Crypto Systems Obfuscation.mp4
│ ├── 030 Case Studies in Disk Decryption.mp4
│ └── links.txt
├── 04 Anti-Virus and End-Point-Protection
│ ├── 031 Goals and Learning Objectives.mp4
│ ├── 032 Is Anti-Virus dead - The Threat Landscape.mp4
│ ├── 033 Is Anti-Virus dead - Protection Methods.mp4
│ ├── 034 Ransomware.mp4
│ ├── 035 Anti-Virus and End-Point-Protection Testing.mp4
│ ├── 036 The Problem With AV and EPP Testing.mp4
│ ├── 037 The Best of Business End-Point-Protection EPP.mp4
│ ├── 038 Windows - The Best of Anti-Virus and End-Point-Protection.mp4
│ ├── 039 Business End Point Protection EPP.mp4
│ ├── 040 Mac - XProtect.mp4
│ ├── 041 Mac - The Best of Anti-Virus and End-Point-Protection.mp4
│ ├── 042 Linux - The Best of Anti-Virus and End-Point-Protection.mp4
│ ├── 043 Online and Second Opinion - Anti-Virus and End-Point-Protection.mp4
│ ├── 044 Is Anti-Virus and End-Point-Protection Dangerous.mp4
│ └── links.txt
├── 05 Next Generation - Anti-Virus End-Point-Protection Detection Response EDR
│ ├── 045 Goals and Learning Objectives.mp4
│ ├── 046 Next Generation - Anti-Virus NG-AV End-Point-Protection NG-EPP.mp4
│ ├── 047 End Point Detection and Response EDR.mp4
│ ├── 048 End-Point-Protection How it works together in layers.mp4
│ └── links.txt
├── 06 End-Point-Protection Technology
│ ├── 049 Goals and Learning Objectives.mp4
│ ├── 050 What is application and execution control.mp4
│ ├── 051 Windows - Application control - ACLs Windows Permission Identifier Accessenum.mp4
│ ├── 052 Windows - Application control - User Account Control UAC.mp4
│ ├── 053 Windows - Application control - Software Restriction Policies.mp4
│ ├── 054 Windows - Application control - AppLocker.mp4
│ ├── 055 Windows - Application Control - Parental controls.mp4
│ ├── 056 Windows - Third Party App Control AV Appguard VoodooShield NoVirusThanks.mp4
│ ├── 057 Windows - Exploitation Prevention - EMET.mp4
│ ├── 058 Windows - Exploitation Prevention - Traps MBEA and HMPA.mp4
│ ├── 059 Windows 10 - Device Guard.mp4
│ ├── 060 Windows - Defender Application Guard for Microsoft Edge.mp4
│ ├── 061 Linux - Access Control Models.mp4
│ ├── 062 Linux - Security frameworks - AppArmor.mp4
│ ├── 063 Linux - Security frameworks - SElinux.mp4
│ ├── 064 Linux - Security frameworks - Grsecurity.mp4
│ ├── 065 Linux - Security frameworks - PaX and more.mp4
│ ├── 066 Linux Mac - File permissions POSIX and ACLs.mp4
│ ├── 067 Mac - Application control - Parental controls.mp4
│ ├── 068 Mac - Application control - Gatekeeper.mp4
│ ├── 069 Mac - Application control - System Integrity Protection.mp4
│ ├── 070 Mac - Application control - Santa.mp4
│ ├── 071 Mac - Application control - Little Flocker.mp4
│ ├── 072 Mac - Other Stuff.mp4
│ ├── 073 The New Normal For End-Point-Protection Technology.mp4
│ ├── 074 Cylance.mp4
│ └── links.txt
├── 07 Threat Detection and Monitoring
│ ├── 075 Goals and Learning Objectives.mp4
│ ├── 076 A Complete Failure to Detect Threats.mp4
│ ├── 077 Rethinking Honeypots.mp4
│ ├── 078 CanaryTokens.mp4
│ ├── 079 OpenCanary.mp4
│ ├── 080 CanaryPi.html
│ ├── 081 Artillery - Binary Defense.mp4
│ ├── 082 Honey Drive.mp4
│ ├── 083 Intrusion Detection Systems IDS Part 1 - Methods.mp4
│ ├── 084 Intrusion Detection Systems IDS Part 2 - Snort Suricata Bro IDS OpenWIPS-n.mp4
│ ├── 085 Host-Based Intrusion Detection - OSSEC.mp4
│ ├── 086 Network Analysis - Sguil Xplico NetworkMiner.mp4
│ ├── 087 File Integrity Monitoring FIM and Checking Part 1.mp4
│ ├── 088 File Integrity Monitoring FIM and Checking Part 2 - Tripwire and El Jefe.mp4
│ ├── 089 Network Security Toolkit NST.mp4
│ ├── 090 Security Onion.mp4
│ ├── 091 Security Information and Event Management Software SIEM.mp4
│ └── links.txt
├── 08 Malware and Hacker Hunting on the End-Point
│ ├── 092 Goals and Learning Objectives.mp4
│ ├── 093 Introduction to Malware and Hacker Hunting.mp4
│ ├── 094 Windows - Farbar Recovery Scanner.mp4
│ ├── 095 Automated Malware Removal Tools.mp4
│ ├── 096 Live Rescue Operating Systems CDs and USBs.mp4
│ ├── 097 Windows - Malware Seek Destroy - Process Explorer - Part 1.mp4
│ ├── 098 Windows - Malware Seek Destroy - Process Explorer - Part 2.mp4
│ ├── 099 Windows - Malware Seek Destroy - Process Tools.mp4
│ ├── 100 Windows - Malware Seek Destroy - Sigcheck.mp4
│ ├── 101 Windows - Malware Seek Destroy - Autoruns.mp4
│ ├── 102 Windows - Malware Seek Destroy - Process Monitor.mp4
│ ├── 103 Windows - Malware Seek Destroy - Network Connections.mp4
│ ├── 104 Malware Seek Destroy - Networkx.mp4
│ ├── 105 Linux - Malware Seek Destroy - Sysdig.mp4
│ ├── 106 Linux - Seek Destroy Malware and Hackers - Csysdig.mp4
│ ├── 107 Linux - Seek Destroy Malware and Hackers - debsums unhide.mp4
│ ├── 108 Linux Mac OS X - Malware Seek Destroy - netstat.mp4
│ ├── 109 Linux Mac OS X - Malware Seek Destroy - lsof.mp4
│ ├── 110 Linux - Malware Seek Destroy - rkhunter.mp4
│ ├── 111 Linux - Malware Seek Destroy - Linux - Chkrootkit Tiger Clamav LMD.mp4
│ ├── 112 Linux - Malware Seek Destroy - Linux - Persistence Part 1.mp4
│ ├── 113 Linux - Malware Seek Destroy - Linux - Persistence Part 2.mp4
│ ├── 114 Linux - Malware Seek Destroy - Linux - Persistence Part 3.mp4
│ ├── 115 Mac - Malware Seek Destroy - Task Explorer.mp4
│ ├── 116 Mac - Malware Seek Destroy KnockKnock BlockBlock KextViewer.mp4
│ ├── 117 Mac Linux Windows - OSquery.mp4
│ ├── 118 Firmware Rootkits Seek and Destroy Part 1.mp4
│ ├── 119 Firmware Rootkits Seek and Destroy Part 2.mp4
│ ├── 120 End-Point-Protection Recovery and Remediation Technology.mp4
│ ├── 121 Encrypted Backup and Cloud Storage.mp4
│ └── links.txt
├── 09 Operating System and Application Hardening
│ ├── 122 Goals and Learning Objectives.mp4
│ ├── 123 An Introduction to Hardening.mp4
│ ├── 124 Hardening Standards.mp4
│ ├── 125 OpenSCAP.mp4
│ ├── 126 Baseline Auditing.mp4
│ ├── 127 Windows - Hardening.mp4
│ ├── 128 Windows - Security Compliance Manager SCM.mp4
│ ├── 129 Mac Hardening.mp4
│ ├── 130 Linux Hardening.mp4
│ ├── 131 Security Focused Operating Systems.mp4
│ ├── 132 Monitoring for Security Drift.mp4
│ └── links.txt
├── 10 Secure Deleting Evidence Elimination and Anti-Forensics
│ ├── 133 Goals and Learning Objectives.mp4
│ ├── 134 Secure File Deletion - Mechanical drives.mp4
│ ├── 135 Secure File Deletion - Solid Sate Drives.mp4
│ ├── 136 Evidence Elimination Anti-Forensics - An Introduction.mp4
│ ├── 137 Evidence Elimination - CCleaner and Bleachit.mp4
│ ├── 138 Evidence Elimination - Virtual Memory Swap RAM Memory Cache and Buffer.mp4
│ ├── 139 Disk Wiping - Mechanical Drives.mp4
│ ├── 140 Disk Wiping - Solid State Drives SSD.mp4
│ ├── 141 Scrubbing EXIF Metadata Part 1 - Introduction.mp4
│ ├── 142 Scrubbing EXIF Metadata Part 2 - Tools.mp4
│ ├── 143 Scrubbing EXIF Metadata Part 3 - Guidance.mp4
│ ├── 144 Sensor Noise Camera Identification.mp4
│ └── links.txt
├── 11 Email Security Privacy and Anonymity
│ ├── 145 Goals and Learning Objectives.mp4
│ ├── 146 Clients Protocols and Authentication.mp4
│ ├── 147 Email Weaknesses.mp4
│ ├── 148 PGP GPG Privacy.mp4
│ ├── 149 PGP GPG Clients.mp4
│ ├── 150 Windows - PGP GPG.mp4
│ ├── 151 Tail - PGP GPG.mp4
│ ├── 152 PGP GPG Weaknesses.mp4
│ ├── 153 Improving OpenPGP Security - Best Practices - Part 1.mp4
│ ├── 154 Improving OpenPGP Security - Primary and Subkeys - Part 2.mp4
│ ├── 155 Improving OpenPGP Security - SmartcardsYubikey - Part 3.mp4
│ ├── 156 Email Tracking Exploits.mp4
│ ├── 157 Email Anonymity Pseudonymity.mp4
│ ├── 158 TorBirdy.mp4
│ ├── 159 Remailers.mp4
│ ├── 160 Choosing an Email Provider.mp4
│ ├── 161 Email Alternatives.mp4
│ └── links.txt
├── 12 Messengers - Security Privacy and Anonymity
│ ├── 162 Goals and Learning Objectives.mp4
│ ├── 163 An Introduction to Instant Messengers.mp4
│ ├── 164 Instant Messenger - Signal.mp4
│ ├── 165 Instant Messengers - Chatsecure.mp4
│ ├── 166 Instant Messengers - Cryptocat.mp4
│ ├── 167 Instant Messengers - Ricochet.mp4
│ ├── 168 Instant Messengers - Other.mp4
│ ├── 169 Video and Voice Messengers - Linphone.mp4
│ ├── 170 Video and Voice Messengers - Jitsi.mp4
│ ├── 171 Video and Voice Messengers - Other.mp4
│ └── links.txt
├── 13 BONUS SECTION
│ ├── 172 Congratulations.mp4
│ ├── 173 BONUS - Important Information.mp4
│ ├── 174 Certificate Of Completion for CPEs.html
│ ├── 175 BONUS Sample Lecture from Volume 1 - Qubes OS.mp4
│ ├── 176 BONUS Sample Lecture from Volume 2 - Effective Network Isolation.mp4
│ ├── 177 BONUS Sample Lecture from Volume 3 - Socks5 proxy tunneling.mp4
│ ├── 178 BONUS DISCOUNT COUPONS.html
│ └── links.txt

1. SITCS Welcome (3 min)
2. WSA Overview (10 min)
3. Bootstrapping the WSA (12 min)
4. Deploy and License a WSA VM (10 min)
5. WSA Identities (6 min)
6. WSA Access Policy (13 min)
7. WSA User Authentication (10 min)
8. Directing Traffic to the WSA (6 min)
9. WCCP Router Configuration (12 min)
10. WCCP ASA Configuration (12 min)
11. Cisco Legacy IPS and IDS Concepts (9 min)
12. IDM Interface (13 min)
13. ESA Overview (9 min)
14. Email Terminology (7 min)
15. ESA VM Install (6 min)
16. Licensing the ESA (2 min)
17. ESA HATs, RATs, and Listeners (9 min)
18. Verifying HATs and RATs (5 min)
19. E-Mail Policies (6 min)
20. ESA Message Tracking (5 min)
21. ESA Trace Tool (1 min)
22. Cloud Web Security Overview (7 min)
23. ASA to CWS Connector (9 min)
24. IOS to CWS Connector (4 min)
25. ASA to CX Module Policy (7 min)

1. Course Introduction (4 min)
2. Plan, Build, and Manage (7 min)
3. The PPDIOO Network Lifecycle (6 min)
4. Characterizing the Existing Network (13 min)
5. IP SLA (10 min)
6. Top-Down Versus Bottom-Up (4 min)
7. Case Study: Top-Down Design (7 min)
8. Building a Modular Network (6 min)
9. Applying Modularity (11 min)
10. Campus Network Design (26 min)
11. Designing Enterprise Network Security (11 min)
12. Designing the Edge Module (17 min)
13. WAN Design (22 min)
14. Branch Design (9 min)
15. Data Center Design (19 min)
16. IP Addressing (18 min)
17. Case Study: IP Addressing (5 min)
18. Routing Protocols (19 min)
19. Case Study: IGPs (28 min)
20. Case Study: BGP (19 min)
21. QoS (20 min)
22. Wireless (12 min)
23. Case Study: Wireless (9 min)
24. Collaboration (10 min)
25. Case Study: Collaboration (4 min)
26. SDN (14 min)

... or jump to: 2017
New People