Bạn có muốn phản ứng với tin nhắn này? Vui lòng đăng ký diễn đàn trong một vài cú nhấp chuột hoặc đăng nhập để tiếp tục.
Welcome muare.forum-viet.com

[Multi]Train Signal CompTIA Security Plus Disk-1 1466027_a28518e0bb72af535fc0

Latest topics
» Bạn nên biết điều kiện du học Hàn Quốc có
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyMon 05 Oct 2015, 7:51 pm by giaychuotkhoet

» Hộp đựng đa năng trong phòng tắm và các đồ dụng tiện llợi khác
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyWed 22 Jul 2015, 1:23 am by aloonline1987

» gel bôi trơn ấm áp warm lovin
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyTue 19 May 2015, 4:24 pm by shopnguoilon_sg

» màng film tránh thai vcf dành cho chị em
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyTue 19 May 2015, 4:19 pm by shopnguoilon_sg

» màng film tránh thai vcf dành cho chị em
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyTue 19 May 2015, 4:17 pm by shopnguoilon_sg

» stud 100 khẳng định đẳng cấp phái mạnh
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyFri 15 May 2015, 11:25 am by shopnguoilon_sg

» Lover aider máy mát xa dành cho nữ
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyFri 15 May 2015, 11:23 am by shopnguoilon_sg

» cung cấp máy ép dĩa chất lượng
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyFri 17 Apr 2015, 2:15 pm by huyenrio

» Máy in hình lên ly
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyWed 25 Mar 2015, 2:44 pm by huyenrio

» Máy in hình lên áo
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyWed 25 Mar 2015, 2:43 pm by huyenrio

»  trang trí cây thông noel ở vinh,cho thuê cây thông noel ở vinh,chuyển quà noel ở vinh
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyFri 28 Nov 2014, 8:44 am by sunflowerhn83

» Máy in hạn sử dụng DMJ-B chính hãng, giá sốc
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyThu 02 Oct 2014, 9:40 am by phamlinhnd1010

» Dạy cắm hoa chuyên nghiệp,dạy cắm hoa nghệ thuật,dạy cắt tỉa của quả ở T.p Vinh Nghệ An
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyTue 30 Sep 2014, 10:10 am by haiha131276

» công ty Yên Phát chuyên phân phối, lắp đặt camera chính hãng giá rẻ nhất miền Bắc.
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyFri 26 Sep 2014, 10:57 am by phamlinhnd1010

» HOT! Chung cư mini Xuân Đỉnh ở ngay giá chỉ từ 690 triệu 1 căn
[Multi]Train Signal CompTIA Security Plus Disk-1 EmptyFri 26 Sep 2014, 10:44 am by xuantruong23


[Multi]Train Signal CompTIA Security Plus Disk-1

Go down

[Multi]Train Signal CompTIA Security Plus Disk-1 Empty [Multi]Train Signal CompTIA Security Plus Disk-1

Bài gửi by Nguyen Trung Hoa Sun 22 Aug 2010, 6:51 am

[Multi]Train Signal CompTIA Security Plus Disk-1 2w2q2pe
Type : Trainsignal
Size : 2.67 GB (2,869,886,976 Bytes)

Description:
Video 1 Getting Started With CompTIA Security+ TrainingIn this introduction video you will learn about what?s in the course, what areas of security are covered, and a little about your instructor.
What Will We Be Doing?
Who is Your Instructor?
What Areas of Security Are Covered?
How to Use This Course
Video 2 The Course ScenarioIn this video you will be introduced to the course scenario that you will work with throughout the course.
Meet Globomantics Inc.
Globomantics Security Challenges
Video 3 Security OverviewIn this video you will learn what security is and you will do a high level overview of the history of IT security.
What is Security?
Risk Management
How Did We Get Here?
Security Activities
Organizational Security
Network Security
System Security
Access Control
Assessments and Audits
Security in Layers
Video 4 Redundancy and Fault ToleranceIn this video you will learn to eliminate single points of failures by implementing fault tolerance and redundancy.
Single Points of Failure
Fault Tolerance
Redundant Array of Inexpensive Disk (RAID)
Heating Ventilation and Air Conditioning (HVAC)
Fire Suppression
Redundancy
Server Redundancy
Network Redundancy
Redundant Sites
Environmental Components
Video 5 Implementing Disaster RecoveryIn this video you will learn to prepare a disaster recovery plan. Plus, you will work hands-on to implement your own disaster recovery program.
Disaster Recovery Planning
System & Data Backup & Restore - Types of Backup Jobs
System & Data Backup & Restore - Rotation Schemes
Disaster Recovery Exercise
Video 6 Incident ResponseIn this video you will learn how to utilize forensics to protect the integrity of potential evidence of an IT security breach, as it?s being collected. Plus, you will work hands-on to implement incident response procedures when a network or system attack occurs, so that you are ready to take the appropriate actions before systems or data are compromised.
Forensics
Incident Response
Chain of Custody
Collection of Evidence
Video 7 Social EngineeringIn this video you will learn how to combat several different types of social engineering attacks.
Globomantics Scenario
Social Engineering
Social Engineering Tactics
Phishing
Hoaxes
Dumpster Diving
Tail Gating
Shoulder Surfing
User Education and Awareness
Video 8 Organizational PoliciesIn this video you will learn how to create an IT security policy document that includes outlining a security policy for IT components, information and data.
Globomantics Scenario
Policies Overview
Due Care, Due Diligence, and Due Process
Security Controls
IT Security Policy Components
Regulatory Compliance
Risk Management
Separation of Duties
Change Management
Security Related HR Policies
Management Involvement in IT Security
Video 9 System Scanning and MonitoringIn this video you will learn how to identify the types of monitoring that your IT department has in place. Plus, you will learn the details of several different monitoring strategies so that you will be able to recommend the best monitoring system for your IT environment.
Globomantics Scenario
System Monitors
Agent Based System Monitors
Simple Network Management Protocol (SNMP) System Monitors
Performance Monitoring
Network Tools
Port Scanner
Protocol Analyzer
Network Mapper
Vulnerability Scanner
Intrusion Detection System (IDS)
Network-based vs. Host-based IDS
Signature-based IDS vs. Anomaly-based IDS
Passive vs. Reactive IDS
Penetration Testing
Video 10 Logging and AuditingIn this video you will learn how to take advantage of logging and how to properly use the information in logs to benefit your company. Plus, you will learn how to continually audit user access and rights to assess the potential level of risk that is posed to the company by client computer useage.
Globomantics Scenario
Logging
Logging and Log Management
Centralized vs. Distributed Logging
Log Rotation and Retention
System Logs
Application Logs
Security Logs
Auditing
User Access and Rights Review
Risk Assessment and Mitigation
Logging Demonstration
Video 11 Network Design ComponentsIn this video you will learn about the network design considerations you should examine when designing a network. Plus, you will discover how to utilize security zones to design different areas of your network with different security requirements.
Globomantics Scenario
N-Tier Architecture
Network Access Control (NAC)
Network Access Translation (NAT)
Security Zones
Demilitarized Zones (DMZ)
Intranet
Extranet
VLAN
Video 12 Networking ComponentsIn this video you will learn about the different types of network cabling, the various speeds of different network cables, and the security implications as they apply to these network cables. Plus, you will discover the pros and cons of several different network devices and the differences between three different types of firewalls.
Coaxial Cable
Twisted Pair Cable
Fiber Optic Cable
Network Devices
Hubs
Switches
Routers
Modems and Remotes Access Server (RAS)
Packet Filtering Firewalls
Application Layer Firewalls
Stateful Inspection Firewalls
Video 13 Networking Protocols and ExploitationsIn this video you will learn about different networking protocols, especially the most common networking protocol, TCP/IP. Plus, you will discover several different protocol exploits that can be used by hackers to take advantage of the weak points of your IT security.
OSI 7 Layer Model
Networking Protocols
TCP/IP
Globomantics Scenario
Spoofing
Man In The Middle (MITM)
TCP/IP Hijacking
Null Session
Replay Attacks
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
DNS Poisoning
Video 14 Remote Access SecurityIn this video you will learn how to secure private data on a public network using the different types of Virtual Private Networks. Plus, you will examine the various Remote Access Protocols, how they differ from each other, and different security issues that these protocols face.
Virtual Private Network (VPN)
Globomantics Scenario
VPN Tunneling Protocols
Point to Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Internet Protocol Security (IPSec)
Tunneling Protocol Comparison
Secure Shell (SSH)
802.1X
Video 15 Wireless NetworksIn this video you will learn about the different types of wireless protocols that allow wireless communication to occur. Plus, you will discover the several different wireless exploits used by hackers to take advantage of and use your own wireless network against your company.
Wireless Communications Overview
Wireless Access Points
Wireless Transport Layer Security
IEEE Wireless Standards
Protecting Wireless Networks
Passive and Active Attacks
Wardriving
Bluetooth Vulnerabilities and Protection
Site Survey
Video 16 System SecurityIn this video you will learn how to secure your system hardware, which will include focusing on how USB drives can be a critical security threat. Plus, you will work hands-on with a server baseline security checklist to prevent these hardware vulnerabilities.
Securing BIOS
Securing USB Devices
Securing Directly Attached Storage
Security Templates
Configuration Baseline
Hotfixes, Patches and Service Packs
Patch Management
System Hardening
Video 17 System Security ThreatsIn this video you will learn about the different types of malware that can attack your servers. Plus, you will discover the steps you can take to make sure you can keep these threats from adversely effecting your IT environment.
Default Accounts and Passwords
Password Strength
Back Doors
Privilege Escalation
Malware
Root Kits
Trojan Horses
Viruses
Worms
Spyware
Spam
Logic Bombs
Video 18 Security ApplicationsIn this video you will learn how to apply different security applications to your environment to improve your overall IT security.
Globomantics Scenario
Personal Software Firewalls
Host-Based Intrusion Detection Systems
Proxy Servers
Honey Pots
Virtualization Security Considerations
Video 19 Email SecurityIn this video you will learn how email works so that you can better understand how to secure your email messaging system. Plus, you will discover some email vulnerabilities and how you can address them in your own infrastructure.
Background Vocabulary
Globomantics Scenario
E-Mail Overview
E-Mail Protocols
Multipurpose Internet Mail Extensions (MIME)
Secure Multipurpose Internet Mail Extensions (S/MIME)
Pretty Good Privacy (PGP)
E-Mail Vulnerabilities: SMTP Open Relays and Human Behavior
Video 20 Web SecurityIn this video you will learn how to lock down your web servers to make sure they are secure when being deployed as public facing web servers.
Web Server Security
Building Secure Web Services
Web Services Description Language (WSDL)
Content Filters
Browser Protocols
Instant Messaging
Video 21 Web Based VulnerabiltiesIn this video you will learn how to improve your IT security by utilizing various programming languages that can be used in specific situations. Plus, you will learn about different web vulnerabilities and how you can properly deal with these vulnerabilities in you IT environment.
Globomantics Scenario
Browser Vulnerabilities and Hardening
Java
Code Signing
ActiveX
Common Gateway Interface (CGI)
Buffer Overflow
Cross Site Scripting (XSS)
Cookies
Video 22 File Transfer Protocol (FTP) SecurityIn this video you will learn how to securely access an FTP server. Plus, you will examine the various FTP vulnerabilities and how you can deal with these to securely transfer files within your organization.
Globomantics Scenario
File Transfer Protocol (FTP) Overview
FTP Access
FTP Authentication
FTP Vulnerabilities
Securing File Transfer
Video 23 Access Control ModelsIn this video you will walk through the steps you need to take to properly apply access controls to the resources in your server environment.
Access Control Overview
Classification of Information
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Role Base Access Control (RBAC)
Video 24 Logical and Physical Access ControlsIn this video you will work hands-on to establish an access control model on your computer systems using logical access controls. Plus, you will examine how to secure your physical environment by implementing physical access controls.
Logical Access Controls
User Names and Passwords
Logon Time Restrictions
Account Expiration
Group Policy
Tokens
Physical Access Controls
Identification
Physical Access Logs and Lists
Man-Trap
Door Access Systems
Video Surveillance
Video 25 Authentication ModelsIn this video you will learn how the different types of authentication models can be applied to your server environment to bolster your security from an authentication standpoint.
Identification vs. Authentication
Multi-Tiered Authentication
Single Sign-on
Kerberos
Mutual Authentication
Lightweight Directory Access Protocol (LDAP)
Terminal Access Control Access Control System (TACACS)
Remote Access Dial In User Service (RADIUS)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocols (CHAP)
Video 26 Cryptographic AlgorithmsIn this video you will learn the basic concepts of cryptographic algorithms and how encryption uses these technologies to provide security to your IT environment.
Cryptography
Ciphers
Substitution Ciphers
Transposition Cipher
Block Ciphers
Stream Ciphers
Symmetric Keys
Symmetric Key Algorithms
Asymmetric Keys
Asymmetric Key Algorithms
Hashing
Hashing Algorithms
Video 27 Using CryptographyIn this video you will learn how to utilize cryptography to secure your IT environment. Plus, you will delve into the practice of steganography, which allows you to hide data in file so that people cannot detect that the extra data exists.
Cryptographic Key Pair Usage
X.509
Digital Certificates
Single vs. Dual Sided Certificates
Digital Signatures
Data Encryption
Steganography
Video 28 Public Key Infrastructure (PKI)In this video you will learn about the building blocks of PKI and how you can use PKI to manage every aspect of digital certificates.
Public Key Infrastructure (PKI)
Trust Models
Hierarchical Trust Model
Certificate Revocation
Key Management
Video 29 Preparing for Your CompTIA Security+ SY0-201 Certification ExamIn this video you will learn Paul?s inside tips and pointers on the exam certification process and other things you should consider before taking the exam.
Exam Overview
Exam Objectives
Study Recommendations
Exam Preparation
Video 30 Next StepsReaching the end of the course does not mean the learning has to end! In this video you will discover the "next steps" for continuing your growth in the field of IT Security.

Hotfile:

Code:

http://hotfile.com/dl/54194109/37f176c/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part01.rar.html
http://hotfile.com/dl/54193340/f69e700/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part02.rar.html
http://hotfile.com/dl/54193330/a99665d/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part03.rar.html
http://hotfile.com/dl/54192652/88ecae9/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part04.rar.html
http://hotfile.com/dl/54192628/1439bd2/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part05.rar.html
http://hotfile.com/dl/54192562/5c0c3b2/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part06.rar.html
http://hotfile.com/dl/54192516/c1b1a56/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part07.rar.html
http://hotfile.com/dl/54192474/2a28c3d/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part08.rar.html
http://hotfile.com/dl/54191878/7269afe/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part09.rar.html
http://hotfile.com/dl/54191747/a21b5cf/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part10.rar.html
http://hotfile.com/dl/54191505/b09414d/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part11.rar.html
http://hotfile.com/dl/54191057/147c961/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part12.rar.html
http://hotfile.com/dl/54191046/e501be9/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part13.rar.html
http://hotfile.com/dl/54190680/c5003c4/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part14.rar.html
OR
Letitbit.net:
Code:

http://letitbit.net/download/9158.9d3914707867ea43650c93dd95302551/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.rar.html
OR
Rapidshare:

Code:

http://rapidshare.com/files/406375040/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part01.rar
http://rapidshare.com/files/406375036/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part02.rar
http://rapidshare.com/files/406374993/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part03.rar
http://rapidshare.com/files/406374983/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part04.rar
http://rapidshare.com/files/406374964/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part05.rar
http://rapidshare.com/files/406374957/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part06.rar
http://rapidshare.com/files/406374956/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part07.rar
http://rapidshare.com/files/406374950/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part08.rar
http://rapidshare.com/files/406374945/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part09.rar
http://rapidshare.com/files/406374937/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part10.rar
http://rapidshare.com/files/406374938/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part11.rar
http://rapidshare.com/files/406374876/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part12.rar
http://rapidshare.com/files/406374859/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part13.rar
http://rapidshare.com/files/406374843/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.part14.rar
OR
Code:

http://shareflare.net/download/94392.9d3914707867ea43650c93dd95302551/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.rar.html

OR
Code:

http://x7.to/w7hpx5/TRAIN.SIGNAL.COMPTIA_SECURITY_PLUS.DISK_1.rar

Enjoy, and Please say thanks! Password:
Code:
tactools.org
Nguyen Trung Hoa
Nguyen Trung Hoa
Admin

Đánh giá tốt! : 24

Nam
Goat
Tổng số bài gửi : 51033
Birthday : 09/10/1979
Tuổi : 44
Địa chỉ: : Lô L14-4 Khu Phố FBS - Phường 9 - Tp Tuy Hoà - Phú Yên
Điện thoại: : Mobile: 0985017089 ; 0918 957 282
Điểm : 181641
Ngày đăng ký : 13/10/2007

https://muare.forum-viet.com

Về Đầu Trang Go down

Về Đầu Trang

- Similar topics

 
Permissions in this forum:
Bạn không có quyền trả lời bài viết