Sale!

Easy Learning LEARN HACKING TECHNIQUES FOR IT PROFESSIONALS VIDEO TRAINING DVD(DVD)

Check Price on Amazon

SKU: 53918 Category:

Description

Section 1: Security PoliciesLecture 1 Security policies – introduction 01:56Lecture 2 What is security? 03:53Lecture 3 Information security 04:13Lecture 4 Information security – level up 04:04Lecture 5 Security issues 04:50Lecture 6 Why are security solutions fallible? 05:42Lecture 7 Security policy issues 04:50Lecture 8 Introduction to threat modelling and classification 05:14Lecture 9 Threat modelling – STRIDE 04:06Lecture 10 STRIDE: Spoofing identity 05:03Lecture 11 STRIDE: Tampering with Data 04:28Lecture 12 STRIDE: Denial of Service 03:51Lecture 13 Threat Modelling and Classification – notes for the examination19 pagesSection 2: Risk ManagmentLecture 14 Introduction to Risk Management 01:27Lecture 15 Attack Methods 06:42Lecture 16 Local attacks 02:56Lecture 17 Target scanning and enumeration techniques #1 05:52Lecture 18 Target scanning and enumeration techniques #2 03:30Lecture 19 Passive scanning 02:06Lecture 20 Attack Methodologies – notes for the examinationLecture 21 Introduction to risk assessment 06:20Lecture 22 DREAD: Risk assessment model 04:50Lecture 23 DREAD: Exploitability 05:24Lecture 24 EXERCISE: Risk Assessment 07:17Lecture 25 Risk Assessment – notes for the examinationLecture 26 Introduction to Social Engineering and rogue software 04:19Lecture 27 Manipulation tactics 09:01Lecture 28 EXERCISE: Engineering attacks 06:44Lecture 29 SE with BackTrack 07:06Lecture 30 Rogue Software02:28Lecture 31 Fraud tools #10 7:10Lecture 32 Fraud tools #2 06:32Lecture 33 Social Engineering and Rogue Software – notes for the examinationSection 3: Defence in DepthLecture 34 Introduction to Defence in depth 01:32Lecture 35 How to use Defence in depth model? 05:45Lecture 36 DiD: OS and LAN layers 06:39Lecture 37 DiD: Perimeter and Physical Access Layers 06:06Lecture 38 DiD: Demonstration 02:48Lecture 39 Automated attack targeting a service 05:23Lecture 40 Automated user-targeting attack 04:31Lecture 41 The Defence in Depth Model – notes for the examination25 pagesLecture 42 Introduction to Immutable laws of security – Law #1 04:35Lecture 43 Law #2 02:56Lecture 44 Law #3 02:23Lecture 45 Law #401:52Lecture 46 Law #5 03:28Lecture 47 Law #6 02:07Lecture 48 Law #7 01:11Lecture 49 Law #801:43Lecture 50 Law #903:57Lecture 51 Law #1000:48Lecture 52 Laws for administrators 05:59Lecture 53 Immutable Laws of Security – notes for the examination21 pagesSection 4: Disaster RecoveryLecture 54 Introduction to Disaster Recovery 01:33Lecture 55 How to reduce losses? 05:24Lecture 56 Ensuring continous availability 04:08Lecture 57 Threat discovery #1 04:28Lecture 58 Threat discovery #2 03:40Lecture 59 Audit users and keep control accounts05:18Lecture 60 High risk users 03:23Lecture 61 Collecting and analysing evidence 07:13Lecture 62 Forensics example 03:52Lecture 63 CONFICKER: CASE STUDY 07:11Lecture 64 How to reduce losses – notes for the examination31 pagesSection 5: Application SecurityLecture 65 Introduction to Application Security 08:18Lecture 66 Attacks on applications 10:18Lecture 67 SQL Injection 08:10Lecture 68 EXERCISE: Analyze the application13:31Lecture 69 Blind SQL Injection 09:33Lecture 70 Automated SQL Injection 11:44Lecture 71 Cross-site scripting – XSS10:10Lecture 72 Application Attacks – notes for the examination29 pagesLecture 73 Program security assessment 05:10Lecture 74 Unsafe applications 10:11Lecture 75 Program Security Assessment – notes for the examination10 pagesSection 6: Application Security – Configuration and ManagmentLecture 76 Heres what youll learn in this module 01:05Lecture 77 Managing applicaltions08:26Lecture 78 Software updates 02:39Lecture 79 MS Update 06:53Lecture 80 System Center Configuration Manager 02:46Lecture 81 Blocking applications 07:35Lecture 82 Software restrictions policies 05:57Lecture 83 EXERCISE: Application control rules12:11Lecture 84 Isolating applications 06:30Lecture 85 How to protect users without interrupting their work – notes for the examination25 pagesSection 7: CryptographyLecture 86 Introduction to cryptography 09:42Lecture 87 History of ciphers 10:57Lecture 88 Symmetric and asymmetric ciphers 06:13Lecture 89 Symmetric-key algorithms 05:49Lecture 90 Block ciphers 06:01Lecture 91 Data encryption standard 06:51Lecture 92 DES-X 07:35Lecture 93 Advanced encryption standards 05:28Lecture 94 Block cipher modes 07:16

Additional information

Weight 0.5 kg
Subjects

Computers

Chapters

LEARN HACKING TECHNIQUES FOR IT PROFESSIONALS

Sales Package

DVD-ROM

Model Name

LEARN HACKING TECHNIQUES FOR IT PROFESSIONALS VIDEO TRAINING DVD

Classes

Applicable For All

Num Of Disks

1

Model Id

easylearning_226

Education Board

General

Brand

Easy Learning

Hard Drive

5 GG

Operating System

Windows & MAC

Reviews

There are no reviews yet.

Be the first to review “Easy Learning LEARN HACKING TECHNIQUES FOR IT PROFESSIONALS VIDEO TRAINING DVD(DVD)”

Your email address will not be published. Required fields are marked *