Inhalt: In this course, instructor Lisa Bock helps you prepare for the Cisco CBROPS exam. Lisa covers the principles of a defense-in-depth strategy, to ensure the confidentiality, availability, and integrity of a system. Lisa outlines today's threats and threat actors, and explores the relationship between risk, threat, vulnerability, and exploit. She helps you understand the metrics that make up the Common Vulnerability Scoring System. She reviews access control models and stresses the importance of employing the principle of least privilege. Lisa covers the challenges of complex environments in monitoring traffic and describes how using SIEM, SOAR, and log management helps consolidate information. She summarizes security deployments, such as network and endpoint systems. Lisa compares anti-malware applications, outlines the benefits of using threat intelligence, and concludes by describing methods you can use to manage risks and prevent data loss. Umfang: 02:22:37
Inhalt: In this course, instructor Lisa Bock describes the various attacks that can occur on the network, along with ways malicious actors use methods such as tunneling and encryption to conceal their behavior. Learn how to recognize the importance of having application visibility and control to effectively monitor the network. Lisa shows you how to examine system data from tcpdump and NetFlow to help with analysis. Discover ways to limit data visibility from threat actors on the network, by using access control lists and network address translation. She then outlines how to assure trust on the network by using the Public Key Infrastructure (PKI). Finally, see how a trusted third party uses certificates to securely exchange session keys to all parties in a transaction. Along the way, Lisa provides practical challenges that let you put your new knowledge to the test. Umfang: 02:27:30
Inhalt: Cybersecurity specialists and related occupations are in high demand. In this course, instructor Lisa Bock helps you prepare for the host-based analysis portion of the Cisco CyberOps exam. Lisa begins by summarizing key components in a Windows OS. She then walks you through the architecture, file system, and registry, along with ways you can interact with netstat to monitor active processes. Lisa reviews basics on how to monitor the Linux OS, either while working in the shell or a GUI. She describes the importance of having a solid grasp of the network architecture and reinforces how to achieve defense in depth to monitor and protect all endpoints. Lisa then covers the elements of an IPS/IDS log entry, along with ways to examine your network security data. She summarizes methods to generate a malware analysis report. Finally, Lisa explains how to respond effectively to a cybersecurity incident while preserving the chain of custody after an attack. Umfang: 01:40:24
Inhalt: The Cisco Certified Network Associate (CCNA) Security certification indicates to potential employers that you have the required skills to secure a network. Join security ambassador Lisa Bock, as she prepares you for the Cisco Firewall Technologies section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa covers firewall technologies, diving into the concept of a firewall, firewall security contexts, and how to do a basic firewall configuration. She also compares different types of firewalls including stateless, stateful, and application firewalls. She also reviews implementing NAT on Cisco ASA along with zone-based firewalls. To wrap up, she takes a closer look at some firewall features on the Cisco ASA such as Access Management, Modular Policy Framework, and high availability. Umfang: 01:34:27.00
Inhalt: As a network professional, it's imperative to have a solid understanding of endpoint threats and how to defend against them. In this course, bolster your understanding of how to combat threats as you study for the Cisco Certified Network Associate (CCNA) Security exam. Join security ambassador Lisa Bock as she prepares you for the Content and Endpoint Security section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa begins by reviewing the current state of cybersecurity and the importance of standards and regulations such as HIPAA and GDPR to ensure privacy. She outlines the COBIT framework and explains how it helps organizations provide information assurance, security, and risk mitigation. She covers web and email security concepts that include web filtering, along with email encryption and spam filtering. To wrap up, she shares best practices, such as leveraging antimalware protection and personal firewalls to prevent data loss in an organization. Umfang: 01:11:52.00
Inhalt: Earning a Cisco Certified Network Associate (CCNA) Security certification demonstrates that you have the specialized knowledge needed to secure Cisco networks. Join Lisa Bock as she prepares you to tackle the Security Concepts portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. In this course Lisa covers essential security terms, and discusses common security threats such as active and passive attacks, social engineering, and malware. She reviews cryptographic techniques such as encryption and digital signatures, and describes various network topologies such as campus area networks, wide area networks, and data centers. Umfang: 01:35:03.00
Inhalt: Validate your technical skills and ability to keep a Cisco network secure by earning the Cisco Certified Network Associate (CCNA) Security certification. Join security ambassador Lisa Bock as she prepares you for the Intrusion Prevention Systems (IPS) section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa provides an overview of intrusion detection and intrusion prevention systems (IDS/IPS) and explains how they detect and mitigate common attacks. She covers detection and signature engines, triggering actions and responses, and deploying an IOS-based IPS. In addition, she goes over some practical applications of these systems, including honeypot-based intrusion detection and the EINSTEIN system from the Department of Homeland Security. Umfang: 01:11:34.00
Inhalt: Administering a network means controlling access to network resources: granting, limiting, preventing, and revoking permissions as necessary. This course covers the topic of secure access, including in-band and out-of-band management, secure device access, and protocols such as NTP, SCP, and SNMP, as they relate to the Secure Access domain of Cisco Certified Network Associate (CCNA) Security exam 210-260. Security ambassador Lisa Bock introduces the three a's of triple-A security: authentication, authorization, and accounting. She compares RADIUS and TACACS+ authentication, and BYOD or bring your own device architecture. Plus, learn about mobile device management and security as it applies to the Internet of Things. These lessons will help you configure and manage Cisco devices, prepare for the CCNA Security exam, and properly secure your organization's infrastructure. Umfang: 01:25:11.00
Inhalt: A malicious person that gains access to a switch or router can modify system integrity to steal information or disrupt communications. Cisco Certified Network Associates (CCNAs)-and other qualified network administrators-should know how to prevent attacks by securing networking devices. This course covers secure routing and switching, including mitigation procedures and VLAN switching, as covered by CCNA Security certification exam 210-260. Lisa Bock, a security ambassador, explains the difference between the control, data, and management planes in networking, and provides to an overview of Layer 3 attacks and techniques for securing Cisco routers. Next, she addresses Layer 2 attacks and techniques to secure Cisco switches. She includes mitigation procedures such as dynamic ARP inspection and BPDU guard, and wraps up with a discussion of VLAN security. Umfang: 01:21:10.00
Inhalt: Boost your technical skill set by earning a Cisco Certified Network Associate (CCNA) Security certification. By passing the CCNA Security exam, you demonstrate to potential employers that you have the specialized knowledge needed to secure Cisco networks. In this course, join Lisa Bock as she prepares you to tackle the VPN portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. Lisa covers essential VPN concepts-including the different types of VPNs, topologies, and working with the Cisco Adaptive Security Appliance-which offers many functions to help secure networks. She also dives into the IPsec framework, VPN configuration, and how to prepare your site for an IPsec VPN. Umfang: 01:27:23.00
Inhalt: If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks. Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council's certification exam. This course maps to the 02 Footprinting and Reconnaissance domain. Umfang: 01:31:36.00
Inhalt: What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Umfang: 01:21:35.00
Inhalt: You've done everything you can to logically secure your systems, along with layering in user education and providing physical security. However, the only way to know if your defenses will hold is to test them. This course looks at one of the most important skills of any IT security professional: penetration testing. A key competency for the Certified Ethical Hacker exam, penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. Cybersecurity expert Lisa Bock reviews the steps involved in performing a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. She also defines the various types of "pen" tests-such as black, grey, and white box; announced vs. unannounced; and automated vs. manual testing-and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider's perspective to your IT security efforts. Umfang: 01:20:33.00
Inhalt: After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Scanning is where they dive deeper into the system to look for valuable data and services in a specific IP address range. Network scans are also a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organization's infrastructure and data. This course investigates the scanning tools and techniques used to obtain information from a target system, including specially crafted packets, TCP flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can identify live systems via protocols, blueprint a network, and perform a vulnerability scan to find weaknesses. She also introduces some of the tools and techniques that hackers use to counter detection via evasion, concealment, and spoofing. In addition, learn how to reduce the threat of tunneling, a method hackers use to circumvent network security. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Umfang: 01:54:44.00
Inhalt: Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a sniffer is, and how hackers use it to intercept network traffic. She reviews the seven-layer OSI model, active vs. passive attacks, and the different types of protocol attacks, including MAC and macof attacks, DNS caching and forgery, DHCP denial-of-service attacks, and ARP cache poisoning. Learn how ethical hackers have an arsenal of tools to emulate these attacks and techniques, from examining headers and URLs to capturing images. Lisa relies on Wireshark, a network protocol analyzer for Unix and Windows, but also introduces other sniffing tools, including TShark, tcpdump, and CloudShark. Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:20:58.00
Inhalt: Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"-how hackers use charm, power, and influence to penetrate an organization-and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks. Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:25:56.00
Inhalt: System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking-password cracking, privilege escalation, spyware installation, and keylogging-and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools. These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:25:19.00
Inhalt: In order to assess-and ultimately, decrease-an organization's risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you're working to strengthen network security at your organization, it's essential to have a solid grasp of the processes, methodologies, and tools needed to assess vulnerabilities. In this course, security expert Lisa Bock takes a deep dive into the topic of vulnerability scanning, covering what you need to know to find and address weaknesses that attackers might exploit. Lisa goes over the basics of managing organizational risk, discusses vulnerability analysis methodologies, and shows how to work with vulnerability assessment tools, including Nikto and OpenVAS. Plus, she shares tools and strategies for defending the LAN. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10. Umfang: 01:09:34.00
Inhalt: Computing and internet security are everyone''s business, but it''s especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. These topics are also key components of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). This beginner-level, Windows-based course covers core security concepts and introduces risks such as social engineering, malware, and spyware as it prepares you for exam 98-367. IT Security Foundations series creator Lisa Bock also goes over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption. Umfang: 01:35:47.00
Inhalt: Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within. Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information. Umfang: 01:37:18.00
Inhalt: Network security is an important component of the Microsoft Technology Associate (MTA), Security Fundamentals exam (98-367). In this course, Lisa Bock covers one of the main topics of the exam: securing an organization''s network, to keep interconnected systems and data safe. The course introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, and implement software restriction policies. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building''s perimeter and the hardware within. Note: Learn more about the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367) at https://www.microsoft.com/learning/en-us/exam-98-367.aspx. Umfang: 02:00:07
Inhalt: The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is also a key component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this course, instructor Lisa Bock details what's actually involved in securing an operating system. Lisa reviews user authentication, the structure of Active Directory, and how to assign permissions and create audit policies. In addition, she covers various cryptographic techniques, as well as how to protect servers and email. Umfang: 01:38:41.00
Inhalt: Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and provides a demonstration of a typical SSL transaction. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Umfang: 01:45:09.00
Inhalt: Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and discusses practical ways to apply cryptography to ensure data security and integrity. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Umfang: 02:03:46
Inhalt: Ransomware, a form of malware, is a threat to everyone. It spreads through phishing or other methods that get the victim to click a link. To avoid an attack, good security practices are important, both at home and at the office. The course provides an overview of the types of ransomware, including onion and mobile ransomware, and covers ways of safeguarding a Windows computer from risks. It is designed not just for IT pros, but anyone who wants to protect against ransomware and other types of cyberattacks. Security professional Lisa Bock covers best practices for securing routers, updating your software, strengthening passwords, identifying spam and other forms of social engineering, and reporting ransomware attacks to authorities. She closes with some simple ways that you can prevent your network from becoming infected, including a tabletop exercise to help your organization test your response to attacks. Umfang: 01:37:04.00
Programm Findus Internet-OPAC findus.pl V20.235/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 08.05.2024, 13:43 Uhr. 748 Zugriffe im Mai 2024. Insgesamt 510.978 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral