->
Oreilly - SSCP Video Course Domain 6 - Networking and Telecom - 9780789741967
Oreilly - SSCP Video Course Domain 6 - Networking and Telecom
by | Released May 2009 | ISBN: 9780789741967


Networking and TelecomShon HarrisThe fast, powerful way to prepare for your SSCP exam!Get all the hands-on training you need to pass (ISC)²'s tough SSCP exam, get certified, and move forward in your IT security career! In this online video, the world's #1 information security trainer walks you through every skill and concept you'll need to master. This online video contains almost seven hours of training adapted from Shon Harris's legendary five-day SSCP boot camps–including realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-world settings!Comprehensive coverage of SSCP domains of knowledge:     .    Data Encapsulation     .    Cabling Types     .    Network Technologies     .    Network Configurations     .    Firewall Types     .    WAN TechnologiesAbout the Shon Harris Security SeriesThis online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris's unsurpassed experience in teaching IT security professionals.Category: SecuritySystem RequirementsOPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers COMPUTER: 500MHz or higher CPU; 128MB RAM or more Show and hide more
  1. Course Introduction 00:17:17
  2. Domain 6 - Networking and Telecom 00:00:38
  3. Agenda 1 00:00:31
  4. OSI Model 00:01:39
  5. OSI Layers 00:00:59
  6. Networking Communications 00:00:40
  7. An Older Model 00:01:40
  8. Data Encapsulation 00:02:02
  9. Application Layer 00:02:33
  10. Presentation Layer 00:01:21
  11. OSI - Presentation Layer 00:01:16
  12. OSI - Session Layer 00:01:00
  13. Client/Server Model 00:00:56
  14. Client/Server Session Layer 00:01:15
  15. Transport Layer 00:03:00
  16. OSI - Network Layer 00:00:56
  17. Here to There 00:01:06
  18. Network Layer 00:00:44
  19. OSI - Data Link 00:01:49
  20. Data Link 00:02:05
  21. Sublayers 00:01:58
  22. OSI - Physical Layer 00:00:20
  23. Physical Layer 00:01:13
  24. Layers Working Together 00:00:29
  25. Protocols at Each Layer 00:05:53
  26. Devices Work at Different Layers 00:02:17
  27. Types of Networks 00:01:27
  28. Network Topologies - Physical Layer 00:00:37
  29. Topology Type - Bus 00:00:52
  30. Topology Type - Ring 00:01:46
  31. Topology Type - Star 00:00:55
  32. Network Topologies - Mesh 00:01:49
  33. Summary of Topologies 00:01:11
  34. Agenda 2 00:01:10
  35. Media Access 00:00:53
  36. One Goal of Media Access Technologies 00:00:42
  37. Collision Domain 00:00:58
  38. Back Off, Buddy 00:01:30
  39. Carrier Sense Multiple Access 00:01:11
  40. CSMA/Collision Avoidance (CSMA/CA) 00:01:24
  41. Media Access Technologies - Ethernet 00:02:09
  42. Media Access Technologies - Token Passing 00:02:55
  43. Token's Role 00:00:46
  44. Other Technologies 00:01:07
  45. Media Access Technologies - Polling 00:01:02
  46. Agenda 3 00:01:39
  47. Cabling Types - Twisted Pair 00:01:29
  48. Cable Types 00:00:56
  49. Multimode versus Single Mode 00:01:12
  50. Signal and Cable Issues 00:00:52
  51. Signaling Issues 00:01:04
  52. Transmission Types - Analog and Digital 00:01:53
  53. Transmission Types - Synchronous 00:00:57
  54. Asynchronous 00:00:42
  55. Transmission Types 00:02:08
  56. Cabling Issues - Plenum-Rated 00:01:57
  57. Transmission Types - Number of Receivers 00:02:30
  58. Internet Group Management Protocol 00:00:54
  59. Multicasting 00:00:52
  60. Network Technologies 00:01:14
  61. Extranet 00:00:42
  62. Network Technologies (Cont.) 00:01:14
  63. EDI Evolution 00:00:38
  64. Networking Devices 00:04:04
  65. Forwarding Table Example 00:01:21
  66. Network Devices - Switch 00:00:55
  67. Virtual LAN 00:01:24
  68. VLAN 00:00:53
  69. Interfaces and VLANs 00:02:14
  70. Sniffers 00:03:13
  71. Networking Devices - Router 00:02:15
  72. Hops 00:00:56
  73. Routers 00:00:49
  74. Bridges Compared to Routers 00:01:29
  75. Network Devices - Gateway 00:00:54
  76. Agenda 4 00:02:09
  77. Client Ports 00:01:34
  78. Conceptual Use of Ports 00:00:47
  79. TCP/IP Suite 00:01:09
  80. UDP versus TCP 00:02:29
  81. TCP Segment 00:00:50
  82. SYN Flood 00:03:29
  83. Teardrop Attack 00:02:05
  84. Source Routing 00:01:03
  85. Source Routing Types 00:00:52
  86. IP Address Ranges 00:02:56
  87. IPv6 00:02:35
  88. Protocols - ARP 00:01:09
  89. IP to MAC Mapping 00:00:50
  90. How ARP Works 00:01:27
  91. ARP Poisoning 00:01:13
  92. ICMP Packets 00:01:22
  93. A Way Hackers Use ICMP 00:01:19
  94. Ping Steps 00:01:30
  95. Protocols - SNMP 00:00:49
  96. SNMP in Action 00:03:20
  97. SNMP 00:01:48
  98. SNMP Output 00:00:58
  99. POP3 and SMTP 00:00:47
  100. Protocols - SMTP 00:02:33
  101. Protocols - FTP, TFTP, Telnet 00:02:36
  102. Protocols - RARP and BootP 00:01:18
  103. DHCP - Dynamic Host Configuration Protocol 00:01:04
  104. Agenda 5 00:01:49
  105. Network Configurations 00:01:07
  106. DMZ Configurations 00:01:05
  107. Firewall Comparisons 00:00:44
  108. Network Devices - Firewalls 00:02:25
  109. Packet Filtering Firewall 00:01:56
  110. Packet Filtering Firewall Weaknesses 00:00:57
  111. Packet Filtering 00:00:35
  112. Rule Set Example 00:01:22
  113. Firewall Types 00:07:37
  114. Application-Layer Proxy Advantages 00:00:44
  115. Application-Layer Proxy Disadvantages 00:01:01
  116. Dedicated Proxy Servers 00:00:57
  117. Firewall Types - Stateful 00:04:42
  118. State Table 00:03:59
  119. Firewall Types - Kernel Proxies 00:01:31
  120. Firewall Based VPN Devices 00:00:51
  121. Best Practices 00:02:58
  122. Firewall Placement 00:01:18
  123. Packet Filtering (Cont.) 00:00:36
  124. Screened Host 00:01:14
  125. Firewall Architecture Types - Multi- or Dual-Homed 00:01:24
  126. Screened Subnet 00:02:25
  127. Agenda 6 00:00:47
  128. Dial-Up Protocol - SLIP 00:00:46
  129. Dial-Up Protocol - PPP 00:01:01
  130. PPP 00:00:51
  131. PPP versus SLIP 00:01:31
  132. Authentication Protocols - PAP 00:00:45
  133. Authentication Protocols - CHAP 00:02:15
  134. Authentication Protocol - EAP 00:01:24
  135. Data Inspection 00:03:44
  136. Virtual Private Network Technologies 00:01:18
  137. Analogy 00:01:01
  138. Tunneling Protocols - Examples 00:00:58
  139. Tunneling Protocols - PPTP 00:01:08
  140. Tunneling Protocols - L2TP 00:02:35
  141. L2TP Encapsulation 00:00:30
  142. Tunneling Protocols - IPSec 00:00:48
  143. IPSec Basic Features 00:03:55
  144. IPSec Modes 00:00:35
  145. Security Associations (SAs) 00:04:01
  146. Combining Sas 00:02:14
  147. Iterated Tunnelling 00:00:28
  148. Agenda 7 00:01:20
  149. Layer 3 at Layer 2 00:00:59
  150. MPLS 00:01:09
  151. Multiprotocol Label Switching 00:01:13
  152. Quality of Service (QoS) 00:01:48
  153. QoS Services 00:00:49
  154. Autonomous Systems 00:02:04
  155. Routing Protocols 00:02:16
  156. Routing 00:01:51
  157. Routing Protocols (Cont.) 00:02:04
  158. OSPF 00:01:22
  159. IGRP 00:00:40
  160. BGP 00:02:39
  161. Routing Protocol Attacks 00:00:54
  162. MAN Technologies 00:04:03
  163. Connecting Networks 00:01:30
  164. Network Services 00:02:47
  165. Name Resolving Steps 00:03:32
  166. Split DNS 00:01:03
  167. Host Name Resolution Attacks 00:03:37
  168. Network Service - NAT 00:04:26
  169. NIS 00:00:43
  170. Storing Data 00:00:45
  171. NIS+ Authentication 00:00:38
  172. Agenda 8 00:01:10
  173. PSTN 00:00:58
  174. Circuit Switching 00:00:41
  175. Steps of Connections 00:00:45
  176. Multiplexing 00:01:40
  177. Types of Multiplexing 00:00:53
  178. TDM Process 00:01:44
  179. FDM 00:01:25
  180. Packet Switching 00:02:28
  181. Circuit versus Packet Switching 00:01:24
  182. WAN Technologies - Packet Switched 00:00:17
  183. WAN Technologies - X.25 00:00:54
  184. X.25 00:01:09
  185. WAN Technologies - Frame Relay 00:01:47
  186. WAN Example 00:00:44
  187. Frame Relay 00:05:34
  188. WAN Technologies - ISDN 00:02:10
  189. WAN Technologies - DSL 00:02:38
  190. WAN Technologies - Cable Modem 00:01:37
  191. Cable Modems 00:00:54
  192. Cable Network 00:00:32
  193. Satellites 00:00:39
  194. Hybrid Connection 00:00:52
  195. Satellite Coverage 00:00:40
  196. Network Perimeter Security 00:01:03
  197. Complexity Only Increases 00:01:04
  198. A Layered Approach 00:00:37
  199. Agenda 9 00:00:44
  200. PSTN (Cont.) 00:01:54
  201. Private Branch Exchange 00:01:50
  202. PBX Vulnerabilities 00:01:33
  203. PBX Best Practices 00:01:44
  204. Voice Over IP 00:03:36
  205. Media Gateways 00:00:33
  206. PBX and VoIP 00:00:52
  207. Voice over 00:00:27
  208. IP Telephony Issues 00:01:15
  209. Telephony Protection Mechanisms 00:00:36
  210. Telephony Security 00:02:39
  211. IP Telephony with Wireless 00:00:32
  212. IP Phones Security 00:02:13
  213. Mobile Technology Generations 00:01:55
  214. Mobile Phone Security 00:01:23
  215. Mobile Device Security 00:01:22
  216. Cell Phone 00:02:40
  217. Agenda 10 00:02:18
  218. Wireless Frequencies 00:01:10
  219. Alphabet Soup of Standards 00:06:01
  220. Spread Spectrum 00:05:50
  221. OFDM 00:00:42
  222. Where Does Spread Spectrum Work? 00:02:10
  223. 802.11n 00:01:09
  224. Wireless Technologies - Access Point (Cont.) 00:01:01
  225. Architectures 00:00:46
  226. Wireless Technologies - Service Set ID 00:01:46
  227. Authenticating to an AP 00:01:03
  228. 802.11 Authentication 00:02:27
  229. Wireless Technologies - WEP 00:01:58
  230. Wireless Technologies - More WEP Woes 00:02:41
  231. Lack of Integrity 00:00:33
  232. WEP Security Issues 00:01:11
  233. Frequency Management 00:01:19
  234. 802.11 Security Solutions 00:04:12
  235. 802.1x 00:01:20
  236. 802.1x Authentication 00:05:08
  237. Types of 802.11 Security 00:01:22
  238. IEEE 802.11i Standard 00:02:07
  239. Wireless EAP 00:05:51
  240. Wireless Technologies - Common Attacks 00:07:29
  241. Wireless Reconnaissance Output 00:00:34
  242. Warchalking 00:01:33
  243. Countermeasures 00:04:56
  244. Wireless Attacks 00:02:10
  245. Wormhole Attack 00:00:48
  246. Wireless Technologies - WAP 00:00:44
  247. Wireless Technologies - WTLS 00:01:31
  248. i-mode 00:00:36
  249. Bluetooth 00:01:01
  250. Instant Messaging 00:03:02
  251. Domain 6 Review 00:01:22
  252. Show and hide more

    Oreilly - SSCP Video Course Domain 6 - Networking and Telecom


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss