Inhalt: Think about your favorite brand. What's their story? What do they do? What do they stand for? In six short years, Warby Parker has defined itself as one of the most successful new American brands. Here, LinkedIn Influencer Neil Blumenthal shares his perspective on branding, and building companies and products in a brand-centric manner. He explains how he and cofounder and co-CEO, Dave Gilboa, run a company whose story and values play into everything from design and marketing to managing customer relationships and hiring talent. Umfang: 00:10:39.00
Inhalt: The Internet of Things (IoT) is how devices on the Internet communicate through omnipresent sensors. Since its inception, consumers have connected smart devices to the network at an exponential rate, bringing us closer to a future where everyday things all interconnect. In this course-the first in a series that focuses on securing the Internet of Things-you can get started with this essential concept. Lisa Bock kicks off the course with an overview of IoT, and the types of IoT devices designed to improve the quality of life in homes and businesses. Lisa covers different networks that range in size and purpose-LANS, WANS and PANS-and explains how businesses invest heavily in IoT in order to keep a competitive edge, going into IoT developments in automobiles, building automation, and the medical field. She then evaluates consumer devices, such as wearables and mobile devices. Plus, she discusses zero-configuration networking, service discovery, designing IoT security, and more. Umfang: 01:29:51.00
Inhalt: In order to assess-and ultimately, decrease-an organization's risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you're working to strengthen network security at your organization, it's essential to have a solid grasp of the processes, methodologies, and tools needed to assess vulnerabilities. In this course, security expert Lisa Bock takes a deep dive into the topic of vulnerability scanning, covering what you need to know to find and address weaknesses that attackers might exploit. Lisa goes over the basics of managing organizational risk, discusses vulnerability analysis methodologies, and shows how to work with vulnerability assessment tools, including Nikto and OpenVAS. Plus, she shares tools and strategies for defending the LAN. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10. Umfang: 01:09:34.00
Inhalt: Ransomware, a form of malware, is a threat to everyone. It spreads through phishing or other methods that get the victim to click a link. To avoid an attack, good security practices are important, both at home and at the office. The course provides an overview of the types of ransomware, including onion and mobile ransomware, and covers ways of safeguarding a Windows computer from risks. It is designed not just for IT pros, but anyone who wants to protect against ransomware and other types of cyberattacks. Security professional Lisa Bock covers best practices for securing routers, updating your software, strengthening passwords, identifying spam and other forms of social engineering, and reporting ransomware attacks to authorities. She closes with some simple ways that you can prevent your network from becoming infected, including a tabletop exercise to help your organization test your response to attacks. Umfang: 01:37:04.00
Inhalt: Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic. Umfang: 01:52:49.00
Inhalt: Learn how to use Wireshark, the powerful protocol analysis tool, to deal with packet loss and recovery, so you can keep traffic moving. Instructor Lisa Bock begins by reviewing normal traffic, comparing TCP, a connection-oriented protocol, with UDP, a lightweight connectionless protocol. She then moves into discussing network latency, packet loss, and throughput; TCP and UDP packet loss recovery; misconfiguration issues that can cause an interruption of end user experience, along with malware; and more. Umfang: 01:23:09.00
Inhalt: Validate your technical skills and ability to keep a Cisco network secure by earning the Cisco Certified Network Associate (CCNA) Security certification. Join security ambassador Lisa Bock as she prepares you for the Intrusion Prevention Systems (IPS) section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa provides an overview of intrusion detection and intrusion prevention systems (IDS/IPS) and explains how they detect and mitigate common attacks. She covers detection and signature engines, triggering actions and responses, and deploying an IOS-based IPS. In addition, she goes over some practical applications of these systems, including honeypot-based intrusion detection and the EINSTEIN system from the Department of Homeland Security. Umfang: 01:11:34.00
Inhalt: Speed up your workflow and enhance your analysis by becoming better acquainted with the Wireshark interface and its core features. In this course, join Lisa Bock as she helps to familiarize you with this powerful protocol analysis tool. Lisa reviews the menu choices, explains each of the toolbars available, and shares tips for modifying the Wireshark interface to suit your needs. Discover capture options and understand the difference between capture and display filters. Learn how to efficiently find and mark packets, and fine-tune columns, fonts, and colors. Create configuration protocols and easily add comments to a single packet or to the entire capture, all with the goal of helping you navigate easier in Wireshark. Umfang: 01:41:44.00
Inhalt: Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a sniffer is, and how hackers use it to intercept network traffic. She reviews the seven-layer OSI model, active vs. passive attacks, and the different types of protocol attacks, including MAC and macof attacks, DNS caching and forgery, DHCP denial-of-service attacks, and ARP cache poisoning. Learn how ethical hackers have an arsenal of tools to emulate these attacks and techniques, from examining headers and URLs to capturing images. Lisa relies on Wireshark, a network protocol analyzer for Unix and Windows, but also introduces other sniffing tools, including TShark, tcpdump, and CloudShark. Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:20:58.00
Inhalt: Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"-how hackers use charm, power, and influence to penetrate an organization-and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks. Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:25:56.00
Inhalt: Learn how to capture and analyze network traffic with Wireshark, a free, open-source packet analysis tool, and identify congestion issues, suspicious activity, and network intrusions. In this course, Lisa Bock reviews the fundamental concepts underlying Wireshark, such as network analysis and the OSI model, and examines some example packet captures so you can start to understand field values and compare normal to abnormal network behaviors. You'll also be introduced to common attack signatures, display and capture filters, and protocols such as HTTP, TCP, DNS, and FTP. Umfang: 02:35:54.00
Inhalt: After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Scanning is where they dive deeper into the system to look for valuable data and services in a specific IP address range. Network scans are also a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organization's infrastructure and data. This course investigates the scanning tools and techniques used to obtain information from a target system, including specially crafted packets, TCP flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can identify live systems via protocols, blueprint a network, and perform a vulnerability scan to find weaknesses. She also introduces some of the tools and techniques that hackers use to counter detection via evasion, concealment, and spoofing. In addition, learn how to reduce the threat of tunneling, a method hackers use to circumvent network security. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Umfang: 01:54:44.00
Inhalt: What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Umfang: 01:21:35.00
Inhalt: Administering a network means controlling access to network resources: granting, limiting, preventing, and revoking permissions as necessary. This course covers the topic of secure access, including in-band and out-of-band management, secure device access, and protocols such as NTP, SCP, and SNMP, as they relate to the Secure Access domain of Cisco Certified Network Associate (CCNA) Security exam 210-260. Security ambassador Lisa Bock introduces the three a's of triple-A security: authentication, authorization, and accounting. She compares RADIUS and TACACS+ authentication, and BYOD or bring your own device architecture. Plus, learn about mobile device management and security as it applies to the Internet of Things. These lessons will help you configure and manage Cisco devices, prepare for the CCNA Security exam, and properly secure your organization's infrastructure. Umfang: 01:25:11.00
Inhalt: Earning a Cisco Certified Network Associate (CCNA) Security certification demonstrates that you have the specialized knowledge needed to secure Cisco networks. Join Lisa Bock as she prepares you to tackle the Security Concepts portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. In this course Lisa covers essential security terms, and discusses common security threats such as active and passive attacks, social engineering, and malware. She reviews cryptographic techniques such as encryption and digital signatures, and describes various network topologies such as campus area networks, wide area networks, and data centers. Umfang: 01:35:03.00
Inhalt: Voice over IP (VoIP) is a technology that sends voice data in packets using the IP network-allowing you to make calls using an internet connection instead of a traditional phone line. In this course, join Lisa Bock as she takes an in-depth look at VoIP protocols and components, as well as how to troubleshoot VoIP calls. Lisa begins with an overview of VoIP, discussing its uses, codecs, and components. She then reviews the protocols that make VoIP possible, including TCP/IP, Skinny Client Control Protocol (SCCP) and the H.323 family. She provides a review of media gateways and network operations, including quality of service and DNS, that are critical to the success of VoIP. To wrap up, Lisa dives into Wireshark statistics, showing how to leverage these statistics to troubleshoot VoIP. Umfang: 01:42:23.00
Inhalt: Boost your technical skill set by earning a Cisco Certified Network Associate (CCNA) Security certification. By passing the CCNA Security exam, you demonstrate to potential employers that you have the specialized knowledge needed to secure Cisco networks. In this course, join Lisa Bock as she prepares you to tackle the VPN portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. Lisa covers essential VPN concepts-including the different types of VPNs, topologies, and working with the Cisco Adaptive Security Appliance-which offers many functions to help secure networks. She also dives into the IPsec framework, VPN configuration, and how to prepare your site for an IPsec VPN. Umfang: 01:27:23.00
Inhalt: If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks. Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council's certification exam. This course maps to the 02 Footprinting and Reconnaissance domain. Umfang: 01:31:36.00
Inhalt: Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within. Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information. Umfang: 01:37:18.00
Inhalt: The Cisco Certified Network Associate (CCNA) Security certification indicates to potential employers that you have the required skills to secure a network. Join security ambassador Lisa Bock, as she prepares you for the Cisco Firewall Technologies section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa covers firewall technologies, diving into the concept of a firewall, firewall security contexts, and how to do a basic firewall configuration. She also compares different types of firewalls including stateless, stateful, and application firewalls. She also reviews implementing NAT on Cisco ASA along with zone-based firewalls. To wrap up, she takes a closer look at some firewall features on the Cisco ASA such as Access Management, Modular Policy Framework, and high availability. Umfang: 01:34:27.00
Inhalt: A malicious person that gains access to a switch or router can modify system integrity to steal information or disrupt communications. Cisco Certified Network Associates (CCNAs)-and other qualified network administrators-should know how to prevent attacks by securing networking devices. This course covers secure routing and switching, including mitigation procedures and VLAN switching, as covered by CCNA Security certification exam 210-260. Lisa Bock, a security ambassador, explains the difference between the control, data, and management planes in networking, and provides to an overview of Layer 3 attacks and techniques for securing Cisco routers. Next, she addresses Layer 2 attacks and techniques to secure Cisco switches. She includes mitigation procedures such as dynamic ARP inspection and BPDU guard, and wraps up with a discussion of VLAN security. Umfang: 01:21:10.00
Inhalt: Wireshark Essential Training provides a solid overview of deep packet inspection by stepping through the basics of packet capture and analysis using Wireshark. In this course, Lisa Bock helps you understand the field values of the protocols and what's considered normal behavior using precaptured packets from online repositories. Lisa helps you navigate through the many features of Wireshark. She begins by stressing the benefits of traffic analysis and discussing how this powerful tool can be used to examine traffic either live from wired or wireless connections. She compares the legacy and next generation versions of Wireshark, demonstrates how to install this tool on a PC and on a Mac, and explores the Wireshark interface. She then moves into deep packet analysis of common protocols such as TCP, IP, DHCP, and DNS. To wrap up, she summarizes working with packet captures, discusses the Wireshark expert system, and goes over how Wireshark can help detect network latency issues. She also illustrates ways to subset traffic and then share captures using CloudShark. Lisa walks participants through the basics, so no previous experience with Wireshark is necessary. Umfang: 02:25:06.00
Inhalt: System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking-password cracking, privilege escalation, spyware installation, and keylogging-and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools. These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:25:19.00
Inhalt: As a network professional, it's imperative to have a solid understanding of endpoint threats and how to defend against them. In this course, bolster your understanding of how to combat threats as you study for the Cisco Certified Network Associate (CCNA) Security exam. Join security ambassador Lisa Bock as she prepares you for the Content and Endpoint Security section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa begins by reviewing the current state of cybersecurity and the importance of standards and regulations such as HIPAA and GDPR to ensure privacy. She outlines the COBIT framework and explains how it helps organizations provide information assurance, security, and risk mitigation. She covers web and email security concepts that include web filtering, along with email encryption and spam filtering. To wrap up, she shares best practices, such as leveraging antimalware protection and personal firewalls to prevent data loss in an organization. Umfang: 01:11:52.00
Inhalt: Cybersecurity specialists and related occupations are in high demand. In this course, instructor Lisa Bock helps you prepare for the host-based analysis portion of the Cisco CyberOps exam. Lisa begins by summarizing key components in a Windows OS. She then walks you through the architecture, file system, and registry, along with ways you can interact with netstat to monitor active processes. Lisa reviews basics on how to monitor the Linux OS, either while working in the shell or a GUI. She describes the importance of having a solid grasp of the network architecture and reinforces how to achieve defense in depth to monitor and protect all endpoints. Lisa then covers the elements of an IPS/IDS log entry, along with ways to examine your network security data. She summarizes methods to generate a malware analysis report. Finally, Lisa explains how to respond effectively to a cybersecurity incident while preserving the chain of custody after an attack. Umfang: 01:40:24
Programm Findus Internet-OPAC findus.pl V20.235/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 06.05.2024, 19:41 Uhr. 569 Zugriffe im Mai 2024. Insgesamt 510.799 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral