Windows - Other

SIS[ org]

  • Download 5x Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -
SIS[ org]

Anonymous and Direct Download 300GB+ free


Torrent info

Name:SIS[ org]

Total Size: 3.35 GB

Magnet: Magnet Link

Seeds: 0

Leechers: 0

Stream: Watch Online @ Movie4u

Last Updated: 2010-01-23 07:35:37 (Update Now)

Torrent added: 2009-08-28 01:58:33

Alternatives:SIS[ org] Torrents




Torrent Files List


info.txt (Size: 3.35 GB) (Files: 4)

 info.txt

9.24 KB

 SISDVD1.iso

1.71 GB

 SISDVD2.iso

1.25 GB

 SISDVD3.iso

396.91 MB
 

Announce URL: http://www.seedmore.org/announce.php?passkey=smpk420110802e147eecf9b07912dee8

Torrent description

~ Seedmore ~

Hi m8! Were you thinking about joining a private tracker, well what are you waiting for!! we are a Italian Mob theme website with a new twist ;)
we are focused on fast uploads, new content, and above all: user security ;)
are you also tired of malware and Hit & Runners,:(
Are you an experienced uploader Huh, See forums for how to apply.
well what are you waiting for doors will not be open for long so start typing to join: http://tinyurl.com/seedmore NOW!!!!!!

I want to see you at Seedmore.org :)




http://www.careeracademy.com/index.asp?PageAction=VIEWPROD&ProdID=265

Security Certified Network Professional (SCNP) - Strategic Infrastructure Security (SIS) Training



SIS[ org] preview 0





Security Certified Network Professional (SCNP) - Strategic Infrastructure Security (SIS) Train



The Strategic Infrastructure Security course picks up right where Tactical Perimeter Defense leaves off. The second course in the SCP line-up leads to a certification of Security Certified Network Professional (SCNP). It will give a network administrator the additional hands on skills needed to protect their network from the inside out. This course teaches you about prevention techniques as well as giving the candidate an understanding of risk analysis and security policy creation in a blended technology environment. The up-to-date security lessons and intense, hands-on labs bring a real world network security to training candidates.



The is the official training for the SCNP exam and is designed to validate the foundational skills required by security professionals. These skills include, but are not limited to: Cryptography, Hardening Linux Computers, Hardening Windows Computers, Ethical Hacking Techniques, Security on the Internet and World Wide Web, Performing a Risk Analysis, Creating a Security Policy and Analyzing Packet Signatures. Strategic Infrastructure Security replaces Network Defense and Countermeasures with updated technology and intense, hands- on labs.



Warren Peterson is the President, and co-founder of the Security Certified Program (SCP). In addition to his role as President, Warren also functions as the lead author for instructional content, and has written nine leading IT security books, including all current SCP courses.



In 1999, it was Warrens vision to create a program that addressed IT security, and the SCP was born. Warren has overseen the companys growth from delivering security programs in one Chicago classroom to SCP courses delivered on a global scale.

Lesson 1 - Cryptogaphy and Data Security



Cryptogaphy and Data Security

History of Cryptography

The number lock analogy

Cryptography Terminology

Caesar and Character Substitution

Linguistic Patterns: frequency

Polyalphabetic Ciphers

Vigenre chart, to be used with a keyword

Other Ciphers

Others

Rotor Machines

Lessons learned from cracking Enigma

Introduction to CrypTool

Demo - Installing Cryptool

Demo - Classical Encryption Analysis

Topic 1B: Math and Algorithms

Relatively Prime

Mod Math

Mod Math Examples

Logic Operations

Topic 1C: Private Key Exchange

Keys

Symmetric Keys

DES in CBC mode

Feistel structure

Symmetric Algorithms

Digital Encryption Standard (DES)

DES Modes of Operation

Demo - DES ECB and CBC Analysis

Triple DES

Advanced Encryption Standard: Rijndael

Key Management

Topic 1D: Public Key Exchange

Asymmetric key cryptography

The basic process of asymmetric key cryptography

Public key cryptography requirements

What is computationally infeasible?

Asymmetric vs. Symmetric - Comparison

Diffie-Hellman

Diffie-Hellman Example

RSA

RSA Example

RSA Example, encrypt

Demo - Create Your RSA Key Pair

Demo - Creating RSA Keys

Demo - Encrypting and Decrypting with RSA

Demo - Cracking an RSA Encrypted Message

Public Key Management

Topic 1E: Message Authentication

Lesson 1 Review



Lesson 2 - Hardening LINUX



Hardening LINUX

Demo - Navigating in Linux

Demo - Exploring YaST

Topic 2B - Investigate Process Management in Linux

Demo - Viewing System Information

Demo - Modifying Process Behavior

System Startup / Shutdown Security

Demo - Password Protection of Linux Startup

Topic 2B - Investigate Process Management in Linux (Cont.)

Demo - Stopping Unneeded Services

Demo - Modifying Process Runlevels

Topic 2B - Investigate Process Management in Linux (Cont..)

Demo - Mounting a Device

Topic 2B - Investigate Process Management in Linux (Cont)

Demo - Installing Webmin via RPM

Demo - Installing John the Ripper from Source Code

Topic 2C Manage Linux User and Filesystem Security

Demo - Creating and Modifying Users and Groups

Topic 2C Manage Linux User and Filesystem Security (Cont.)

Demo - Changing User Contexts With SU

Topic 2C Manage Linux User and Filesystem Security (Cont..)

Shadow Password File

Managing Passwords

Demo - Viewing the Password Files

Demo - Managing Passwords

Topic 2C Manage Linux User and Filesystem Security (Cont...)

Demo - Viewing File Details

File and Directory Permissions

Five characters in the permission fields

Binary, Octal Numbers, and Permissions

Topic 2C Manage Linux User and Filesystem Security (Cont....)

Demo - Creating Object Ownership

Demo - Assigning Permissions

Demo - Verifying Permissions

umask Settings

Demo - Configuring umask Settings

Topic 2C Manage Linux User and Filesystem Security (Cont..)

Demo - Using PAM with vsFTP

Topic 2C - Manage Linux User and Filesystem Security (Cont...)

Demo - Logging Recent Login Activity

Topic 2D - Manage Linux Security

Demo - Configuring Network Interfaces

Topic 2D - Manage Linux Security (Cont.)

Demo - Managing Telnet with Xinetd

Topic 2D - Manage Linux Security (Cont..)

Demo - Controlling Access with TCP Wrappers

Topic 2D - Manage Linux Security (Cont...)

Demo - Configuring an SSH Server

Demo - Configuring an SSH Client

Topic 2D - Manage Linux Security (Cont....)

Demo - Using SCP to Securely Transfer Files

Demo - Preventing root SSH logins by Modifying the sshd_config file

Securing Network Services

Demo - Sharing Data with NFS

Topic 2D - Manage Linux Security (Cont.....)

Demo - Verifying Export Permissions

Topic 2D - Manage Linux Security (Cont......)

Demo - Configuring the Samba Server

Topic 2E - Create Scripts for Linux

Demo - I/O Redirection

Shell scripts

Simple script examples

Demo -Writing Simple Shell Scripts

Topic 2F - Harden Linux

Demo - Installing and Exploring Bastille

Topic 2E - Create Scripts for Linux (Cont.)

Lesson 2 Review



Lesson 3 - Hardening Windows



Hardening Windows

Topic 3A Examine the concepts of Windows 2003 infrastructure security

Demo - Configuring a Custom MMC and GPO

Demo - Editing a GPO

Topic 3B Examine the fundamentals of authentication in Windows 2003

Demo - Configuring NTLMv2 Authentication

Topic 3C Implement Windows 2003 security configuration tools

Demo - Securing Administrator Account Access

Demo - Testing Administrative Access

Group Policies

Demo - Verifying Password Requirements

Security Templates

Demo - Analyzing Default Password Settings of Security Templates

Demo - Creating a Custom Security Template

Topic 3C - Implement Windows 2003 security configuration tools (Cont.)

Demo - Investigating the Security Configuration and Analysis Snap-In

Demo - Implementing the Template

Demo - Analyzing the Current Security Settings of the Local System

Topic 3D Secure Windows 2003 resources

Demo - Setting Registry Permissions

Demo - Exporting Registry Information

Demo - Blocking Registry Access

Topic 3D Secure Windows 2003 resources (Cont.)

Demo - Installing Security Configuration Wizard

Demo - Using the Security Configuration Wizard

Topic 3E Configure Windows 2003 auditing and logging

Demo - Enabling Auditing

Demo - Logging SAM Registry Access

Topic 3E Configure Windows 2003 auditing and logging (Cont.)

Demo - Viewing the Registry Audit

Topic 3E - Configure Windows 2003 auditing and logging (Cont..)

Demo - Creating Events

Demo - Viewing Event Logs

Topic 3F - Examine and configure EFS on Windows 2003

Demo - Encrypting Files

Topic 3G - Examine the methods of securing networ communications in a Windows 2003 network

Demo - Configuring TCP/IP in the Registry

Topic 3G - Examine the methods of securing network communications in a Windows 2003 network (Cont.)

Demo - Configuring Port and Protocol Filtering

Topic 3G - Examine the methods of securing network communications in a Windows 2003 network (Cont..)

Demo - Enabling Windows Firewall

Demo - Configuring Windows Firewall

Demo - Configure Server 2003

Lesson 3 Review



Lesson 4 - Attack Technique



Attack Techniques

Topic 4A - Network Reconnaissance

Information Learned in the Whois Lookup

Topic 4B - Mapping the Network

Demo - Using Windows Tracing Tools

Using Graphical Tracing Tools

Demo - Using VisualRoute

Topic 4C: Sweeping the Network

Ping Sweep Tools

SuperScan 3.0 in default mode, before a scan begins

Demo - Using Super Scan

Topic 4D: Scanning the Network

Demo - Installing Linux Tools

Demo - Using Nmap

Demo - Using SuperScan

Identifying the Operating System and O/S Version

Demo - Using Nmap to Identify an Operating System

Demo - Using Nmap Front End

Topic 4E - Perform Vulnerability Scanning

Demo - Installing Nessus

Topic 4E - Perform Vulnerability Scanning (Cont.)

Demo - Configuring Nessus Scan

Demo - Custom Nessus Scanning

Demo - Network Scanning

Topic 4F - Viruses, Worms, & Trojan Horses

The Trojan Horse

Famous Trojans

Topic 4G - Gain Control over a Network System

Demo -Windows to Windows Netcat

Demo - Linux to Windows Netcat

Topic 4H - Record Keystrokes

Demo - Using Software Keystroke Logging

Topic 4I - Crack Encrypted Passwords

Topic 8J: Reveal Hidden Passwords

Demo - Revealing Hidden Passwords

Topic 4K: Social Engineering

Topic 4L: Perform a Denial of Service

Demo - Flooding with Udpflood

Lesson 4 Review

related torrents

Torrent name

health leech seeds Size
 


comments (0)

Main Menu