Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Friday, 4 May 2018

Learn Cisco ASA Firewall Video Course DVD



Duration : 5 hours 43 minutes
63 Video Lessons
And Working Files

01 - Welcome To The Course
02 - About The Author
03 - How To Access Your Working Files
04 - ASA Hardware Models
05 - CLI Basics Part - 1
06 - CLI Basics Part - 2
07 - Interface Configuration
08 - 5505 Switchports
09 - Security Levels
10 - Same Security Level
11 - The Course Lab Environment
12 - Implementing Access Lists Part - 1
13 - Implementing Access Lists Part - 2
14 - Introduction To NAT
15 - Fixup Protocol ICMP
16 - Management Access Part - 1
17 - Management Access Part - 2
18 - Firewall Local DHCP Server
19 - A Basic Firewall Configuration Part - 1
20 - A Basic Firewall Configuration Part - 2
21 - An Introduction To ASDM Part - 1
22 - An Introduction To ASDM Part - 2
23 - Network Address Translation Part - 1
24 - Network Address Translation Part - 2
25 - Network Address Translation Part - 3
26 - Network Address Translation Part - 4
27 - NAT And Access Lists
28 - Two Types Of VPN Connections
29 - Two Types Of VPN Clients
30 - SSL Certificates Part - 1
31 - SSL Certificates Part - 2
32 - Download Anyconnect Files From Cisco
33 - Upload .Pkg Files To ASA
34 - Default Licenses In ASA
35 - Configuring The .Pkg-Files To Use
36 - Activating Anyconnect (Enabling)
37 - Logging And Debugging Anyconnect
38 - Connecting But No Traffic Flow
39 - Fix NAT To Make It Work
40 - Internet Access Via The Tunnel
41 - Split Tunneling
42 - Making The User Select Connection Profile
43 - VPN Filter
44 - Client Profile Editor
45 - LDAP Authentication Of Users
46 - Dynamic Access Policies Part - 1
47 - Dynamic Access Policies Part - 2
48 - The Life Of An IPSEC-Tunnel
49 - Information Needed
50 - Configuring Phase 1 Parameters
51 - Configuring Phase 2 Parameters
52 - Proxy ACL And Crypto Map Configuration
53 - Finalising The VPN Configuration
54 - Testing The Tunnel
55 - Modifying NAT To Make The Tunnel Work
56 - Logging And Debugging
57 - Packet Tracer
58 - Packet Capture
59 - Transparent Mode
60 - Multi Context
61 - Failover
62 - Trunks And Etherchannels
63 - Wrap Up And Thank You

Wireless Network Hacking and Penetration Testing Video Course DVD


Duration: 5 hours 
80 Video Lessons

0101 Introduction And About The Author  
0102 What We Will Cover  
0103 System Requirements  
0104 Legal Issues  
0105 Penetration Testing  
0201 802.11 Basics  
0202 Frequencies  
0203 Access Points  
0204 Ad-Hoc Versus Infrastructure Mode  
0205 Wireless Modes - ABGN  
0206 SSID, ESSID And BSSID  
0207 MAC Address  
0208 Associations  
0209 Beaconing And Broadcasting  
0210 Access Point Basics  
0211 Enterprise Networks  
0212 WiFi In Windows  
0213 WiFi In Mac OS  
0214 WiFi In Linux  
0301 Authentication  
0302 802.1X  
0303 Radius  
0304 Encryption  
0305 WEP  
0306 WPA  
0307 WPA2  
0308 WPS  
0309 EAP  
0310 Hiding Your Network  
0311 Filtering  
0312 Network Segmentation  
0313 Default Configurations  
0401 Built-In Tools  
0402 Kali Linux  
0403 Kismet  
0404 Aircrack-Ng  
0405 WiFi Explorer  
0406 Wireshark  
0407 Wireless Attack Toolkit  
0408 NetStumbler  
0409 Ettercap  
0410 Dsniff  
0411 Airpwn  
0412 Aireplay-Ng  
0413 Fern  
0414 WiFi Tap  
0415 Cowpatty  
0416 WiFi-Honey  
0501 Using Wireshark  
0502 Capturing Network Packets  
0503 Monitor Mode  
0504 Investigating Packets  
0505 Filtering  
0506 Radio Traffic  
0507 War Driving  
0508 Frame Injection  
0509 RADIUS Replay  
0510 SSL Stripping  
0511 De-Authentication  
0512 Airodump  
0513 Fake Authentication  
0601 Replay Attacks  
0602 Cracking WEP - Part 1  
0603 Cracking WEP - Part 2  
0604 Cracking WPA  
0605 Rogue Access Points  
0606 Man In The Middle Attacks  
0607 MAC Changes  
0701 Bluetooth Overview  
0702 Bluetooth Authentication  
0703 Bluetooth Profiles  
0704 Bluesnarfer  
0705 Blueranger  
0706 BT Scanner  
0707 Protecting Bluetooth  
0708 Other Tools  
0801 WiMax  
0802 Near Field Communication  
0803 ZigBee  
0804 RFID  
0901 What Have We Covered  
0902 Next Steps  
0903 Conclusion