الامان الكامل لجهازك مع Security Plus Video Tutorial

Security Plus Video Tutorial

nehhh yang doyan security N hacking sapa tawu berminat… apa sih dalemnya :

01. Overview
**1. Covered in This Course.mov
**2. Information Security.mov

02. Risk Assessment
**1. Risk Assessment Key Concepts.mov
**2. Asset Control Pt.1.mov
**3. Asset Control Pt.2.mov
**4. Vulnerability Assessment.mov
**5. Threat Profiling Pt.1.mov
**6. Threat Profiling Pt.2.mov
**7. Risk Assessment Pt.1.mov
**8. Risk Assessment Pt.2.mov

03. Organizational Security
**01. Organizational Security.mov
**02. Security Best Practices.mov
**03. Password Policy Example.mov
**04. Security Organization Pt.1.mov
**05. Security Organization Pt.2.mov
**06. Incident Response Pt.1.mov
**07. Incident Response Pt.2.mov
**08. Forensics Overview.mov
**09. Forensics Investigation.mov
**10. Change Management and Auditing.mov

04. Infrastructure Security
**1. Infrastructure Key Concepts.mov
**2. Physical Security.mov
**3. Physical Security Continued.mov
**4. Disaster Recovery + Business Continuity Pt.1.mov
**5. Disaster Recovery + Business Continuity Pt.2.mov

05. Access Control or Authentication
**01. Access Control Key Concepts.mov
**02. MAC+DAC+RBAC Pt.1.mov
**03. MAC+DAC+RBAC Pt.2.mov
**04. RADIUS and TCACS Pt.1.mov
**05. RADIUS and TCACS Pt.2.mov
**06. Username+Password and Kerberos.mov
**07. CHAP and Digital Certificates.mov
**08. Tokens and Biometrics Pt.1.mov
**09. Tokens and Biometrics Pt.2.mov
**10. Multifactor & Mutual Authentication Pt.1.mov
**11. Multifactor & Mutual Authentication Pt.2.mov

06. Network Security
**01. Network Security Overview.mov
**02. Network Devices Pt.1.mov
**03. Network Devices Pt.2.mov
**04. Remote Access Devices and Services Pt.1.mov
**05. Remote Access Devices and Services Pt.2.mov
**06. Wireless and Mobile Technologies Pt.1.mov
**07. Wireless and Mobile Technologies Pt.2.mov
**08. Virtual Private Networks.mov
**09. Secure Network Architecture Pt.1.mov
**10. Secure Network Architecture Pt.2.mov

07. Server and Host Security
**01. Server Host Key Terms.mov
**02. E-Mail Services Pt.1.mov
**03. E-Mail Services Pt.2.mov
**04. Web Services.mov
**05. Directory Services.mov
**06. File Transfer Services.mov
**07. Terminal and Instant Messaging Pt.1.mov
**08. Terminal and Instant Messaging Pt.2.mov
**09. Baseline and Hardening Pt.1.mov
**10. Baseline and Hardening Pt.2.mov

08. Monitoring and IDS
**01. Monitoring, IDS R Key Concepts.mov
**02. Monitoring FCAPS.mov
**03. Monitoring SNMP Pt.1.mov
**04. Monitoring SNMP Pt.2.mov
**05. Intrusion Detection Systems.mov
**06. Network IDS.mov
**07. Host IDS.mov
**08. Honeypots.mov
**09. Installing Snort for Windows Pt.1.mov
**10. Installing Snort for Windows Pt.2.mov

09. Cryptography and PKI
10. Threats and Attacks
11. Resources
12. Credits

DOWNLOAD LINK:

RapidShare Link Part1
RapidShare Link Part2

2 comments so far,Add yours