Inhalt: Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a sniffer is, and how hackers use it to intercept network traffic. She reviews the seven-layer OSI model, active vs. passive attacks, and the different types of protocol attacks, including MAC and macof attacks, DNS caching and forgery, DHCP denial-of-service attacks, and ARP cache poisoning. Learn how ethical hackers have an arsenal of tools to emulate these attacks and techniques, from examining headers and URLs to capturing images. Lisa relies on Wireshark, a network protocol analyzer for Unix and Windows, but also introduces other sniffing tools, including TShark, tcpdump, and CloudShark. Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:20:58.00
Inhalt: In order to assess-and ultimately, decrease-an organization's risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you're working to strengthen network security at your organization, it's essential to have a solid grasp of the processes, methodologies, and tools needed to assess vulnerabilities. In this course, security expert Lisa Bock takes a deep dive into the topic of vulnerability scanning, covering what you need to know to find and address weaknesses that attackers might exploit. Lisa goes over the basics of managing organizational risk, discusses vulnerability analysis methodologies, and shows how to work with vulnerability assessment tools, including Nikto and OpenVAS. Plus, she shares tools and strategies for defending the LAN. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10. Umfang: 01:09:34.00
Inhalt: Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and discusses practical ways to apply cryptography to ensure data security and integrity. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Umfang: 02:03:46
Inhalt: In this course, instructor Lisa Bock describes the various attacks that can occur on the network, along with ways malicious actors use methods such as tunneling and encryption to conceal their behavior. Learn how to recognize the importance of having application visibility and control to effectively monitor the network. Lisa shows you how to examine system data from tcpdump and NetFlow to help with analysis. Discover ways to limit data visibility from threat actors on the network, by using access control lists and network address translation. She then outlines how to assure trust on the network by using the Public Key Infrastructure (PKI). Finally, see how a trusted third party uses certificates to securely exchange session keys to all parties in a transaction. Along the way, Lisa provides practical challenges that let you put your new knowledge to the test. Umfang: 02:27:30
Inhalt: You've done everything you can to logically secure your systems, along with layering in user education and providing physical security. However, the only way to know if your defenses will hold is to test them. This course looks at one of the most important skills of any IT security professional: penetration testing. A key competency for the Certified Ethical Hacker exam, penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. Cybersecurity expert Lisa Bock reviews the steps involved in performing a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. She also defines the various types of "pen" tests-such as black, grey, and white box; announced vs. unannounced; and automated vs. manual testing-and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider's perspective to your IT security efforts. Umfang: 01:20:33.00
Inhalt: The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to make our products smarter and our lives easier. But the growth of this emerging technology also brings with it huge gaps in security. The IoT is plagued with vulnerabilities, malware, DDoS attacks, and the potential to disrupt infrastructure. In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT. Umfang: 01:54:59.00
Inhalt: Voice over IP (VoIP) is a technology that sends voice data in packets using the IP network-allowing you to make calls using an internet connection instead of a traditional phone line. In this course, join Lisa Bock as she takes an in-depth look at VoIP protocols and components, as well as how to troubleshoot VoIP calls. Lisa begins with an overview of VoIP, discussing its uses, codecs, and components. She then reviews the protocols that make VoIP possible, including TCP/IP, Skinny Client Control Protocol (SCCP) and the H.323 family. She provides a review of media gateways and network operations, including quality of service and DNS, that are critical to the success of VoIP. To wrap up, Lisa dives into Wireshark statistics, showing how to leverage these statistics to troubleshoot VoIP. Umfang: 01:42:23.00
Inhalt: Administering a network means controlling access to network resources: granting, limiting, preventing, and revoking permissions as necessary. This course covers the topic of secure access, including in-band and out-of-band management, secure device access, and protocols such as NTP, SCP, and SNMP, as they relate to the Secure Access domain of Cisco Certified Network Associate (CCNA) Security exam 210-260. Security ambassador Lisa Bock introduces the three a's of triple-A security: authentication, authorization, and accounting. She compares RADIUS and TACACS+ authentication, and BYOD or bring your own device architecture. Plus, learn about mobile device management and security as it applies to the Internet of Things. These lessons will help you configure and manage Cisco devices, prepare for the CCNA Security exam, and properly secure your organization's infrastructure. Umfang: 01:25:11.00
Inhalt: Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and provides a demonstration of a typical SSL transaction. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Umfang: 01:45:09.00
Inhalt: In this course, instructor Lisa Bock helps you prepare for the Cisco CBROPS exam. Lisa covers the principles of a defense-in-depth strategy, to ensure the confidentiality, availability, and integrity of a system. Lisa outlines today's threats and threat actors, and explores the relationship between risk, threat, vulnerability, and exploit. She helps you understand the metrics that make up the Common Vulnerability Scoring System. She reviews access control models and stresses the importance of employing the principle of least privilege. Lisa covers the challenges of complex environments in monitoring traffic and describes how using SIEM, SOAR, and log management helps consolidate information. She summarizes security deployments, such as network and endpoint systems. Lisa compares anti-malware applications, outlines the benefits of using threat intelligence, and concludes by describing methods you can use to manage risks and prevent data loss. Umfang: 02:22:37
Inhalt: Earning a Cisco Certified Network Associate (CCNA) Security certification demonstrates that you have the specialized knowledge needed to secure Cisco networks. Join Lisa Bock as she prepares you to tackle the Security Concepts portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. In this course Lisa covers essential security terms, and discusses common security threats such as active and passive attacks, social engineering, and malware. She reviews cryptographic techniques such as encryption and digital signatures, and describes various network topologies such as campus area networks, wide area networks, and data centers. Umfang: 01:35:03.00
Inhalt: Learn how to use Wireshark, the powerful protocol analysis tool, to deal with packet loss and recovery, so you can keep traffic moving. Instructor Lisa Bock begins by reviewing normal traffic, comparing TCP, a connection-oriented protocol, with UDP, a lightweight connectionless protocol. She then moves into discussing network latency, packet loss, and throughput; TCP and UDP packet loss recovery; misconfiguration issues that can cause an interruption of end user experience, along with malware; and more. Umfang: 01:23:09.00
Inhalt: Enhance your Wireshark skillset by picking up some more sophisticated tools and techniques. In this course, instructor Lisa Bock takes a deep dive into advanced topics such as tapping into the stream, merging and sanitizing packet captures, capture engines, optimizing packet capture, and IO and stream graphs. Lisa begins with a review of network architecture. She covers ways to solve network problems, merge traffic, and sanitize captures before sharing, along with capturing session keys to decrypt traffic. She then reviews capture engines along with a discussion on wireless traffic. She reviews CLI capture-a more lightweight option that's not resource intensive-and goes over IO graphs and TCP stream graphs, which can provide you with a closer look at traffic trends and round-trip time. Umfang: 01:49:03.00
Inhalt: Boost your technical skill set by earning a Cisco Certified Network Associate (CCNA) Security certification. By passing the CCNA Security exam, you demonstrate to potential employers that you have the specialized knowledge needed to secure Cisco networks. In this course, join Lisa Bock as she prepares you to tackle the VPN portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. Lisa covers essential VPN concepts-including the different types of VPNs, topologies, and working with the Cisco Adaptive Security Appliance-which offers many functions to help secure networks. She also dives into the IPsec framework, VPN configuration, and how to prepare your site for an IPsec VPN. Umfang: 01:27:23.00
Inhalt: Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic. Umfang: 01:52:49.00
Inhalt: Wireshark Essential Training provides a solid overview of deep packet inspection by stepping through the basics of packet capture and analysis using Wireshark. In this course, Lisa Bock helps you understand the field values of the protocols and what's considered normal behavior using precaptured packets from online repositories. Lisa helps you navigate through the many features of Wireshark. She begins by stressing the benefits of traffic analysis and discussing how this powerful tool can be used to examine traffic either live from wired or wireless connections. She compares the legacy and next generation versions of Wireshark, demonstrates how to install this tool on a PC and on a Mac, and explores the Wireshark interface. She then moves into deep packet analysis of common protocols such as TCP, IP, DHCP, and DNS. To wrap up, she summarizes working with packet captures, discusses the Wireshark expert system, and goes over how Wireshark can help detect network latency issues. She also illustrates ways to subset traffic and then share captures using CloudShark. Lisa walks participants through the basics, so no previous experience with Wireshark is necessary. Umfang: 02:25:06.00
Inhalt: The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is also a key component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this course, instructor Lisa Bock details what's actually involved in securing an operating system. Lisa reviews user authentication, the structure of Active Directory, and how to assign permissions and create audit policies. In addition, she covers various cryptographic techniques, as well as how to protect servers and email. Umfang: 01:38:41.00
Inhalt: Learn how to analyze network problems with Wireshark, a free, open-source packet analysis tool used by network administrators around the world. In this course, Lisa Bock demonstrates how to get the most out of Wireshark, so that you can better evaluate your network and keep traffic moving. You can discover how to use time as a metric for visualizing delays. In addition, you can get an introduction to some of the most helpful tools within Wireshark, such as TCP, I/O, and flow graphs. Finally, learn how to visualize transmission errors and recognize common attack signatures. Umfang: 01:30:35
Inhalt: Computing and internet security are everyone''s business, but it''s especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. These topics are also key components of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). This beginner-level, Windows-based course covers core security concepts and introduces risks such as social engineering, malware, and spyware as it prepares you for exam 98-367. IT Security Foundations series creator Lisa Bock also goes over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption. Umfang: 01:35:47.00
Inhalt: Cybersecurity specialists and related occupations are in high demand. In this course, instructor Lisa Bock helps you prepare for the host-based analysis portion of the Cisco CyberOps exam. Lisa begins by summarizing key components in a Windows OS. She then walks you through the architecture, file system, and registry, along with ways you can interact with netstat to monitor active processes. Lisa reviews basics on how to monitor the Linux OS, either while working in the shell or a GUI. She describes the importance of having a solid grasp of the network architecture and reinforces how to achieve defense in depth to monitor and protect all endpoints. Lisa then covers the elements of an IPS/IDS log entry, along with ways to examine your network security data. She summarizes methods to generate a malware analysis report. Finally, Lisa explains how to respond effectively to a cybersecurity incident while preserving the chain of custody after an attack. Umfang: 01:40:24
Inhalt: A malicious person that gains access to a switch or router can modify system integrity to steal information or disrupt communications. Cisco Certified Network Associates (CCNAs)-and other qualified network administrators-should know how to prevent attacks by securing networking devices. This course covers secure routing and switching, including mitigation procedures and VLAN switching, as covered by CCNA Security certification exam 210-260. Lisa Bock, a security ambassador, explains the difference between the control, data, and management planes in networking, and provides to an overview of Layer 3 attacks and techniques for securing Cisco routers. Next, she addresses Layer 2 attacks and techniques to secure Cisco switches. She includes mitigation procedures such as dynamic ARP inspection and BPDU guard, and wraps up with a discussion of VLAN security. Umfang: 01:21:10.00
Inhalt: Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within. Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information. Umfang: 01:37:18.00
Inhalt: The Cisco Certified Network Associate (CCNA) Security certification indicates to potential employers that you have the required skills to secure a network. Join security ambassador Lisa Bock, as she prepares you for the Cisco Firewall Technologies section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa covers firewall technologies, diving into the concept of a firewall, firewall security contexts, and how to do a basic firewall configuration. She also compares different types of firewalls including stateless, stateful, and application firewalls. She also reviews implementing NAT on Cisco ASA along with zone-based firewalls. To wrap up, she takes a closer look at some firewall features on the Cisco ASA such as Access Management, Modular Policy Framework, and high availability. Umfang: 01:34:27.00
Inhalt: Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"-how hackers use charm, power, and influence to penetrate an organization-and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks. Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:25:56.00
Inhalt: Validate your technical skills and ability to keep a Cisco network secure by earning the Cisco Certified Network Associate (CCNA) Security certification. Join security ambassador Lisa Bock as she prepares you for the Intrusion Prevention Systems (IPS) section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa provides an overview of intrusion detection and intrusion prevention systems (IDS/IPS) and explains how they detect and mitigate common attacks. She covers detection and signature engines, triggering actions and responses, and deploying an IOS-based IPS. In addition, she goes over some practical applications of these systems, including honeypot-based intrusion detection and the EINSTEIN system from the Department of Homeland Security. Umfang: 01:11:34.00
Programm Findus Internet-OPAC findus.pl V20.235/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 26.04.2024, 12:10 Uhr. 4.191 Zugriffe im April 2024. Insgesamt 509.706 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral