Inhalt: In this course, instructor Lisa Bock describes the various attacks that can occur on the network, along with ways malicious actors use methods such as tunneling and encryption to conceal their behavior. Learn how to recognize the importance of having application visibility and control to effectively monitor the network. Lisa shows you how to examine system data from tcpdump and NetFlow to help with analysis. Discover ways to limit data visibility from threat actors on the network, by using access control lists and network address translation. She then outlines how to assure trust on the network by using the Public Key Infrastructure (PKI). Finally, see how a trusted third party uses certificates to securely exchange session keys to all parties in a transaction. Along the way, Lisa provides practical challenges that let you put your new knowledge to the test. Umfang: 02:27:30
Inhalt: Earning a Cisco Certified Network Associate (CCNA) Security certification demonstrates that you have the specialized knowledge needed to secure Cisco networks. Join Lisa Bock as she prepares you to tackle the Security Concepts portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. In this course Lisa covers essential security terms, and discusses common security threats such as active and passive attacks, social engineering, and malware. She reviews cryptographic techniques such as encryption and digital signatures, and describes various network topologies such as campus area networks, wide area networks, and data centers. Umfang: 01:35:03.00
Inhalt: Network security is an important component of the Microsoft Technology Associate (MTA), Security Fundamentals exam (98-367). In this course, Lisa Bock covers one of the main topics of the exam: securing an organization''s network, to keep interconnected systems and data safe. The course introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, and implement software restriction policies. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building''s perimeter and the hardware within. Note: Learn more about the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367) at https://www.microsoft.com/learning/en-us/exam-98-367.aspx. Umfang: 02:00:07
Inhalt: Administering a network means controlling access to network resources: granting, limiting, preventing, and revoking permissions as necessary. This course covers the topic of secure access, including in-band and out-of-band management, secure device access, and protocols such as NTP, SCP, and SNMP, as they relate to the Secure Access domain of Cisco Certified Network Associate (CCNA) Security exam 210-260. Security ambassador Lisa Bock introduces the three a's of triple-A security: authentication, authorization, and accounting. She compares RADIUS and TACACS+ authentication, and BYOD or bring your own device architecture. Plus, learn about mobile device management and security as it applies to the Internet of Things. These lessons will help you configure and manage Cisco devices, prepare for the CCNA Security exam, and properly secure your organization's infrastructure. Umfang: 01:25:11.00
Inhalt: Computing and internet security are everyone''s business, but it''s especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. These topics are also key components of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). This beginner-level, Windows-based course covers core security concepts and introduces risks such as social engineering, malware, and spyware as it prepares you for exam 98-367. IT Security Foundations series creator Lisa Bock also goes over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption. Umfang: 01:35:47.00
Inhalt: Learn how to analyze network problems with Wireshark, a free, open-source packet analysis tool used by network administrators around the world. In this course, Lisa Bock demonstrates how to get the most out of Wireshark, so that you can better evaluate your network and keep traffic moving. You can discover how to use time as a metric for visualizing delays. In addition, you can get an introduction to some of the most helpful tools within Wireshark, such as TCP, I/O, and flow graphs. Finally, learn how to visualize transmission errors and recognize common attack signatures. Umfang: 01:30:35
Inhalt: Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"-how hackers use charm, power, and influence to penetrate an organization-and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks. Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:25:56.00
Inhalt: In this course, instructor Lisa Bock helps you prepare for the Cisco CBROPS exam. Lisa covers the principles of a defense-in-depth strategy, to ensure the confidentiality, availability, and integrity of a system. Lisa outlines today's threats and threat actors, and explores the relationship between risk, threat, vulnerability, and exploit. She helps you understand the metrics that make up the Common Vulnerability Scoring System. She reviews access control models and stresses the importance of employing the principle of least privilege. Lisa covers the challenges of complex environments in monitoring traffic and describes how using SIEM, SOAR, and log management helps consolidate information. She summarizes security deployments, such as network and endpoint systems. Lisa compares anti-malware applications, outlines the benefits of using threat intelligence, and concludes by describing methods you can use to manage risks and prevent data loss. Umfang: 02:22:37
Inhalt: A malicious person that gains access to a switch or router can modify system integrity to steal information or disrupt communications. Cisco Certified Network Associates (CCNAs)-and other qualified network administrators-should know how to prevent attacks by securing networking devices. This course covers secure routing and switching, including mitigation procedures and VLAN switching, as covered by CCNA Security certification exam 210-260. Lisa Bock, a security ambassador, explains the difference between the control, data, and management planes in networking, and provides to an overview of Layer 3 attacks and techniques for securing Cisco routers. Next, she addresses Layer 2 attacks and techniques to secure Cisco switches. She includes mitigation procedures such as dynamic ARP inspection and BPDU guard, and wraps up with a discussion of VLAN security. Umfang: 01:21:10.00
Inhalt: Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a sniffer is, and how hackers use it to intercept network traffic. She reviews the seven-layer OSI model, active vs. passive attacks, and the different types of protocol attacks, including MAC and macof attacks, DNS caching and forgery, DHCP denial-of-service attacks, and ARP cache poisoning. Learn how ethical hackers have an arsenal of tools to emulate these attacks and techniques, from examining headers and URLs to capturing images. Lisa relies on Wireshark, a network protocol analyzer for Unix and Windows, but also introduces other sniffing tools, including TShark, tcpdump, and CloudShark. Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:20:58.00
Inhalt: Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic. Umfang: 01:52:49.00
Inhalt: System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking-password cracking, privilege escalation, spyware installation, and keylogging-and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools. These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:25:19.00
Inhalt: After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Scanning is where they dive deeper into the system to look for valuable data and services in a specific IP address range. Network scans are also a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organization's infrastructure and data. This course investigates the scanning tools and techniques used to obtain information from a target system, including specially crafted packets, TCP flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can identify live systems via protocols, blueprint a network, and perform a vulnerability scan to find weaknesses. She also introduces some of the tools and techniques that hackers use to counter detection via evasion, concealment, and spoofing. In addition, learn how to reduce the threat of tunneling, a method hackers use to circumvent network security. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Umfang: 01:54:44.00
Inhalt: In order to assess-and ultimately, decrease-an organization's risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you're working to strengthen network security at your organization, it's essential to have a solid grasp of the processes, methodologies, and tools needed to assess vulnerabilities. In this course, security expert Lisa Bock takes a deep dive into the topic of vulnerability scanning, covering what you need to know to find and address weaknesses that attackers might exploit. Lisa goes over the basics of managing organizational risk, discusses vulnerability analysis methodologies, and shows how to work with vulnerability assessment tools, including Nikto and OpenVAS. Plus, she shares tools and strategies for defending the LAN. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10. Umfang: 01:09:34.00
Inhalt: The Internet of Things (IoT) is how devices on the Internet communicate through omnipresent sensors. Since its inception, consumers have connected smart devices to the network at an exponential rate, bringing us closer to a future where everyday things all interconnect. In this course-the first in a series that focuses on securing the Internet of Things-you can get started with this essential concept. Lisa Bock kicks off the course with an overview of IoT, and the types of IoT devices designed to improve the quality of life in homes and businesses. Lisa covers different networks that range in size and purpose-LANS, WANS and PANS-and explains how businesses invest heavily in IoT in order to keep a competitive edge, going into IoT developments in automobiles, building automation, and the medical field. She then evaluates consumer devices, such as wearables and mobile devices. Plus, she discusses zero-configuration networking, service discovery, designing IoT security, and more. Umfang: 01:29:51.00
Inhalt: Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and provides a demonstration of a typical SSL transaction. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Umfang: 01:45:09.00
Inhalt: Boost your technical skill set by earning a Cisco Certified Network Associate (CCNA) Security certification. By passing the CCNA Security exam, you demonstrate to potential employers that you have the specialized knowledge needed to secure Cisco networks. In this course, join Lisa Bock as she prepares you to tackle the VPN portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. Lisa covers essential VPN concepts-including the different types of VPNs, topologies, and working with the Cisco Adaptive Security Appliance-which offers many functions to help secure networks. She also dives into the IPsec framework, VPN configuration, and how to prepare your site for an IPsec VPN. Umfang: 01:27:23.00
Inhalt: The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is also a key component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this course, instructor Lisa Bock details what's actually involved in securing an operating system. Lisa reviews user authentication, the structure of Active Directory, and how to assign permissions and create audit policies. In addition, she covers various cryptographic techniques, as well as how to protect servers and email. Umfang: 01:38:41.00
Inhalt: Voice over IP (VoIP) is a technology that sends voice data in packets using the IP network-allowing you to make calls using an internet connection instead of a traditional phone line. In this course, join Lisa Bock as she takes an in-depth look at VoIP protocols and components, as well as how to troubleshoot VoIP calls. Lisa begins with an overview of VoIP, discussing its uses, codecs, and components. She then reviews the protocols that make VoIP possible, including TCP/IP, Skinny Client Control Protocol (SCCP) and the H.323 family. She provides a review of media gateways and network operations, including quality of service and DNS, that are critical to the success of VoIP. To wrap up, Lisa dives into Wireshark statistics, showing how to leverage these statistics to troubleshoot VoIP. Umfang: 01:42:23.00
Inhalt: You've done everything you can to logically secure your systems, along with layering in user education and providing physical security. However, the only way to know if your defenses will hold is to test them. This course looks at one of the most important skills of any IT security professional: penetration testing. A key competency for the Certified Ethical Hacker exam, penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. Cybersecurity expert Lisa Bock reviews the steps involved in performing a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. She also defines the various types of "pen" tests-such as black, grey, and white box; announced vs. unannounced; and automated vs. manual testing-and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider's perspective to your IT security efforts. Umfang: 01:20:33.00
Inhalt: Ransomware, a form of malware, is a threat to everyone. It spreads through phishing or other methods that get the victim to click a link. To avoid an attack, good security practices are important, both at home and at the office. The course provides an overview of the types of ransomware, including onion and mobile ransomware, and covers ways of safeguarding a Windows computer from risks. It is designed not just for IT pros, but anyone who wants to protect against ransomware and other types of cyberattacks. Security professional Lisa Bock covers best practices for securing routers, updating your software, strengthening passwords, identifying spam and other forms of social engineering, and reporting ransomware attacks to authorities. She closes with some simple ways that you can prevent your network from becoming infected, including a tabletop exercise to help your organization test your response to attacks. Umfang: 01:37:04.00
Inhalt: The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to make our products smarter and our lives easier. But the growth of this emerging technology also brings with it huge gaps in security. The IoT is plagued with vulnerabilities, malware, DDoS attacks, and the potential to disrupt infrastructure. In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT. Umfang: 01:54:59.00
Inhalt: What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Umfang: 01:21:35.00
Inhalt: Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within. Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information. Umfang: 01:37:18.00
Inhalt: Speed up your workflow and enhance your analysis by becoming better acquainted with the Wireshark interface and its core features. In this course, join Lisa Bock as she helps to familiarize you with this powerful protocol analysis tool. Lisa reviews the menu choices, explains each of the toolbars available, and shares tips for modifying the Wireshark interface to suit your needs. Discover capture options and understand the difference between capture and display filters. Learn how to efficiently find and mark packets, and fine-tune columns, fonts, and colors. Create configuration protocols and easily add comments to a single packet or to the entire capture, all with the goal of helping you navigate easier in Wireshark. Umfang: 01:41:44.00
Programm Findus Internet-OPAC findus.pl V20.235/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 07.05.2024, 18:13 Uhr. 695 Zugriffe im Mai 2024. Insgesamt 510.925 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral