Free Ebook Video Training

Friday, May 15, 2009

Learnkey Security+ 4cd's 1.60 GB






Develop your understanding of network administration by gaining a certifiable knowledge of Security+ by CompTIA. Learn how to secure and manage all facets of your network from CPU cycles to software used by individuals or across a network. Security+ is the next level to attain certification for every IT network administrator. This course will prepare you to pass the CompTIA® Security+ certification exam SY0-201.

Benefits

Implement and maintain an effective security strategy within your company’s network infrastructure
Our courses meet or exceed all CompTIA® certification objectives for exam SY0-201
Learn the knowledge of systems security, network infrastructure, access control, assessments and audits

Session 1
Section A: Introduction
· Prerequisites
· Knowledge Domains
· Security Importance
· Applications

Section B: Security Requirements
· Requirements
· Classification
· Due Care
· Due Diligence
· Due Process
· User Education
· HR Security

Section C: Security Threats
· Understanding Threats
· Viruses and Worms
· Trojans, Spyware, and Malware
· Rootkits
· Spam Filtering
· Botnets

Section D: Privilege Escalation
· Initial Entry
· Escalation Methods
· After Escalation
· Performing a Logic Bomb

Section E: Hardware Security Risks
· BIOS
· USB Devices
· Removable Storage
· Cell Phones

Section F: Network Vulnerabilities
· Vulnerable Devices
· Weak Passwords
· Backdoors
· Denial of Service
· Vampire Taps

Section G: Infrastructure Risks
· Old Protocols
· TCP/IP Issues
· Null Sessions
· Spoofing
· Man-in-the-Middle
· Replay Attacks
· DDoS
· DNS Vulnerabilities
· ARP Poisoning
Session 2
Section A: Wireless Vulnerabilities
· Wireless LANs
· Wi-Fi
· Data Emanation
· War Driving
· Default Behaviors
· Rogue APs
· Hijacking

Section B: Wireless Encryption
· Encryption Cracking
· WEP
· Authentication
· Understanding WEP
· WEP Key Problems
· Weak Initialization Vectors

Section C: Personal Device Security
· Portable Devices
· Bluejacking
· Bluesnarfing
· Blackjacking
· Laptops

Section D: Authentication Fundamentals
· Identification
· Authentication
· One Factor
· Multiple Factors
· Single Sign-On

Section E: Authentication Hardware
· Thumb Scanners
· FAR and FRR
· Smart Cards
· RFID

Section F: Authentication Protocols
· Understanding Protocols
· PAP and CHAP
· LAN Manager
· NTLM
· NTLMv2

Section G: Advanced Authentication Protocols
· Kerberos
· Kerberos Tickets
· Kerberos Access
· LDAP
· 802.1X/RADIUS
· TACACS
· RAS

Section H: Users, Groups, and Roles
· Active Directory
· Users
· Groups
· Group Strategy
· Guidelines
· Roles

Section I: Authorization Models
· Group Policy Editor
· Password Policies
· Lockout Policies
· Creating Accounts
· Account Parameters
Session 3
Section A: ACLs
· Managing Folder Access
· Network Resource Permissions

Section B: Access Control Methods
· MAC
· DAC
· RBAC
· Least Privilege
· Implicit Deny
· Duty Separation

Section C: Remote Access Security
· Remote Access
· RA Encryption
· RA Authentication
· Enabling RAS
· RAS Authentication Options

Section D: Physical Security
· Understanding Physical Security
· Affecting Factors
· Access Control
· Facility Access Checklist
· Internal Access Checklist
· Network Access Checklist

Section E: OS Hardening
· Patches
· Service Packs
· Patch Management
· Linux Hardening
· Windows Hardening
· Creating Security Templates
· Security Analysis

Section F: Application Security
· Buffer Overflows
· Dependencies
· Stack-Based Overflows
· Heap-Based Overflows
· After the Attack
· Countermeasures
· Instant Messaging
· P2P Networks

Section G: Web Application Security
· Web Servers
· Communications
· Common Attacks
· Web Applications
· ActiveX and Java
· XSS
· Browser Options
· Cookies
· Input Validation

Section H: E-mail Security
· E-mail Protocols
· E-mail Threats
· E-mail Authentication
· Confidentiality
· SMTP Relay
· Spam Solutions


Session 4
Section A: Client Security Solutions
· avast Software
· Spam Filtering
· Pop-Up Blocking
· Personal Firewalls
· HIDS

Section B: Virtualization and Security
· Virtualization Defined
· Benefits
· Scenarios
· Virtual PC
· Hyper-V
· VMware
· Planning
· Security Issues

Section C: Network Firewalls
· Understanding Firewalls
· Firewall Types
· Firewall Installation
· Well Known Ports
· Port Blocking

Section D: Network Security Design
· Subnetting
· Virtual LANs
· Connecting Networks
· DMZ
· NAT
· NAC

Section E: Telephony Security
· Traditional PBX
· VoIP
· SIP Security
· H.323 Security

Section F: Intrusion Detection and Prevention
· Intrusion Monitoring
· IDS Solutions
· Detection Methods
· IPS Solutions
· IPS Detection States
· Intrusion Indications
· IDS Implementations
· Intrusion Responses
· Honeypots

Section G: Controlling Internet Access
· Proxy Servers
· Internet Filters
· Creating a Firewall Rule

Section H: Protocol Analyzers
· Installing Wireshark
· Capturing E-mail Logon
· Creating HTTP Filter
· Viewing Passwords
Session 5
Section A: Wireless Network Security
· War Driving
· SSID Issues
· Rogue APs
· Weak Encryption
· Configuring WPA

Section B: Monitoring Systems
· Performance Tools
· Task Manager
· Performance Snap-In
· Baselines
· Creating a Baseline
· Creating a Second Baseline
· Comparing Baselines with Excel

Section C: Scanning the Network
· Port Scanning
· Angry IP Scanner
· Scanning Devices
· Service Enumeration
· Configuring Zenmap GUI
· Nmap Scanning

Section D: Vulnerability Scanning
· Sectools.org
· OVAL
· National Vulnerability Database
· Password Cracker
· Pen Testing

Section E: Logging and Auditing
· Importance of Logs
· DNS Logs
· System Logs
· Performance Logs
· Access Logs
· Firewall Logs
· Antivirus Logs
· Auditing

Section F: Cryptography 101
· Encryption
· Simple Encryption
· CIA
· Non-Repudiation
· Whole Disk
· Key Management
· Steganography
· Encryption Testing
· TPM

Section G: Encryption Algorithms
· Encryption Types
· Key Factors
· DES
· 3DES
· RSA
· ECC
· PGP
· AES
· RC4
· Secure Transfer
· One-Time Pad
Session 6
Section A: Encryption Protocols and Hashing
· Hashing
· Hashing Protocols
· Digital Signatures
· SSL/TLS
· TLS Goals
· SSL Operations
· PPTP
· L2TP
· IPSec
· HTTP Solutions
· SSH

Section B: Public Key Cryptography
· Certificates
· PK Cryptography
· PKI Components
· PKI Processes

Section C: Risk Assessments
· Risk Management
· Asset Identification
· Threat Identification
· Risk Assessment
· Risk Tracking

Section D: Redundancy Planning
· Failure Points
· RAID
· Spare Parts
· Redundant Servers
· Redundant ISP
· Power Supply
· Spare Sites

Section E: Incident Response
· Incident Defined
· IR Process
· First Responders
· Computer Forensics
· Chain of Custody
· Reporting
· Damage Control

Section F: Disaster Recovery
· Planning
· Backup Practices
· Backup Methods
· Backup Types
· Media Rotation
· Restoration
· DR Exercises

Section G: Social Engineering
· Definition
· Example Attacks
· Dumpster Diving
· Passive Attacks
· Inside/Outside Attacks
· Reverse
· Phishing Attacks

Section H: Security Policies
· Importance
· General Policies
· Functional Policies
· sans.org

Download
http://rapidshare.com/files/231974764/BM_Learnkey_Security_CD1_UDS.part1.rar
http://rapidshare.com/files/231974592/BM_Learnkey_Security_CD1_UDS.part2.rar
http://rapidshare.com/files/231974467/BM_Learnkey_Security_CD1_UDS.part3.rar

http://rapidshare.com/files/231974748/BM_Learnkey_Security_CD2_UDS.part1.rar
http://rapidshare.com/files/231974600/BM_Learnkey_Security_CD2_UDS.part2.rar
http://rapidshare.com/files/231974507/BM_Learnkey_Security_CD2_UDS.part3.rar

http://rapidshare.com/files/231974657/BM_Learnkey_Security_CD3_UDS.part1.rar
http://rapidshare.com/files/231974706/BM_Learnkey_Security_CD3_UDS.part2.rar
http://rapidshare.com/files/231974398/BM_Learnkey_Security_CD3_UDS.part3.rar

http://rapidshare.com/files/231974601/BM_Learnkey_Security_CD4_UDS.part1.rar
http://rapidshare.com/files/231974695/BM_Learnkey_Security_CD4_UDS.part2.rar

http://rapidshare.com/files/231974364/BM_Learnkey_Security_Upgrade_Patch_UDS.rar

Readme
Password : ut@updatesofts.com

12 comments:

Suneet said...

how to extraxt the contains...
I tried Winrar after renaming the files to .7z but no go... Help

Anonymous said...

yes.. Me too tried all softwares i could get... plz help...

geekyogi said...

http://sourceforge.net/project/downloading.php?groupname=k7z&filename=S7Z-0.7.5-1.win32.exe&use_mirror=nchc

will solve this prob..

Suneet said...

Test....

Thanks a ton... it worked....:)

Anonymous said...

Links are dead. Any possibility of getting new links. It would be much appreciated.

nobihai said...

New links were updated.

Anonymous said...

what's the pass? winrar says 'booktraining.net' is not valid

youzhny said...

Try to use pass: www.updatesofts.com

Anonymous said...

Do not waste your time downloading these files.

The archive is corrupt!

The password does not work!

DO NOT DOWNLOAD !!!

nobihai said...

Sorry for missing. I updated working password.
Password : ut@updatesofts.com

Anonymous said...

Reupload please.

nobihai said...

Because of dead links. I updated new.

This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us at youzhny197@gmail.com, we will immediately respond to you.