COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker.

Size: px
Start display at page:

Download "COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker."

Transcription

1 COURSE DETAILS Intrductin t Ethical Hacking What is Hacking Wh is a Hacker Skills f a Hacker Types f Hackers Reasns fr Hacking Wh are at the risk f Hacking attacks Effects f Cmputer Hacking n an rganizatin Netwrk Security Challenges Elements f Infrmatin Security The Security, Functinality & Usability Triangle What is Ethical Hacking Why Ethical Hacking is Necessary Scpe & Limitatins f Ethical Hacking What is Penetratin Testing What is Vulnerability Auditing FtPrinting What is FtPrinting Objectives f FtPrinting Finding a cmpany s details Finding a cmpany s dmain name Finding a cmpany s Internal URLs Finding a cmpany s Public and Restricted URLs Finding a cmpany s Server details Finding the details f dmain registratin Finding the range f IP Address

2 Finding the DNS infrmatin Finding the services running n the server Finding the lcatin f servers Tracerute analysis Tracking cmmunicatins Scanning What is netwrk scanning Objectives f netwrk scanning Finding the live hsts in a netwrk Finding pen prts n a server Finding the services n a server OS fingerprinting Server Banner grabbing tls What is a Vulnerability Scanning Vulnerability Scanner tls Finding mre details abut a vulnerability What is a prxy server Hw des prxy server wrk Types f prxy servers Hw t find prxy servers Why d hackers use prxy servers What is a TOR netwrk Why hackers prefer t use TOR netwrks Hacking Web Servers & Web Applicatins What is a web server Different webserver applicatins in use Why are webservers hacked & its cnsequences Directry traversal attacks Website defacement

3 Website passwrd brute frcing Hw t defend against web server hacking Sessin Hijacking What is sessin hijacking Dangers f sessin hijacking attacks Sessin hijacking techniques Crss-Site scripting attack Sessin hijacking tls Hw t defend against sessin hijacking SQL Injectin What is SQL Injectin Effects f SQL Injectin attacks Types f SQL Injectin attacks SQL Injectin detectin tls Evading Firewalls, IDS & Hneypts What is a Firewall What are the functins f a Firewall What is an IDS Hw des an IDS wrk SPAN IDS tls What is a hneypt Types f hneypts Hneypt tls Hneypt detectin tls Buffer Overflw What is a buffer Understanding usage f buffers in applicatins

4 What is buffer verflw Simple buffer verflw in C prgramming Hw t detect a buffer verflw Hw t defend against buffer verflw attacks Denial f Service What is a DS attack What is a DDS attack Symptms f a Ds attack DS attack techniques What is a Btnet Defending DS attacks Cryptgraphy What is Cryptgraphy Types f cryptgraphy Cipher algrithms Public key infrastructure What is a Hash Cryptgraphy attacks System Hacking What is system Hacking Gals f System Hacking Passwrd Cracking Passwrd cmplexity Finding the default passwrds f netwrk devices and sftwares Passwrd cracking methds Online passwrd cracking Man-in-the-middle attack Passwrd guessing

5 Offline passwrd cracking Brute frce cracking Dictinary based cracking Hybrid attack USB passwrd stealers Elcmsft Distributed passwrd recvery tls Active passwrd changer What is a keylgger Hw t deply a keylgger t a remte pc Hw t defend against a keylgger Sniffers What is a sniffer Hw sniffer wrks Types f sniffing Active sniffing Passive Sniffing What is prmiscuus mde Hw t put a PC int prmiscuus mde What is ARP ARP pisn attack Threats f ARP pisn attack Hw MAC spfing wrks MAC Flding What is a CAM Table Hw t defend against MAC Spfing attacks Hw t defend against Sniffers in netwrk Malware What is malware Types f malware

6 Virus What is a virus prgram What are the prperties f a virus prgram Hw des a cmputer get infected by virus Types f virus Virus making tls Hw t defend against virus attacks Wrm What is a wrm prgram Hw wrms are different frm virus Trjan What is a Trjan hrse Hw des a Trjan perate Types f Trjans Identifying Trjan infectins Hw t defend against Trjans Spyware What is a spyware Types f spywares Hw t defend against spyware Rtkits What is a Rtkit Types f Rtkits Hw des Rtkit perate Hw t defend against Rtkits Wireless Hacking Types f wireless netwrks Wi-Fi usage statistics Finding a Wi-Fi netwrk Types f Wi-Fi authenticatins

7 Using a centralized authenticatin server Using lcal authenticatin Types f Wi-Fi encryptin methds WEP WPA WPA2 Hw des WEP wrk Weakness f WEP encryptin Hw des WPA wrk Hw des WPA2 wrk Hardware and sftware required t crack Wi-Fi netwrks Hw t crack WEP encryptin Hw t crack WPA encryptin Hw t crack WPA2 encryptin Hw t defend against Wi-Fi cracking attacks Penetratin Testing What is Penetratin Testing Types f Penetratin Testing What is t be tested Testing the netwrk devices fr mis-cnfiguratin Testing the servers and hsting applicatins fr mis-cnfiguratin Testing the servers and hsting applicatins fr vulnerabilities Testing wireless netwrks Testing fr Denial f Service attacks Cunter Measure Techniques fr Netwrk level attacks Types f Firewall Packet Filtering Firewall Circuit-Level Gateway Firewall Applicatin-Level Firewall

8 Stateful Multilayer Inspectin Firewall Limitatins f a Firewall IDS / IPS What is an IDS What is a IPS Difference between IDS & IPS Placement f IDS in the Netwrk Cnfiguring an IDS in the Netwrk Placement f IPS in the Netwrk Cnfiguring an IPS in the Netwrk UTM / Next-Generatin Firewall What is a UTM Features f UTM Difference between a Firewall & a UTM Placement f UTM in the Netwrk Cnfiguring a UTM in the Netwrk Mnitring attacks using UTM Cnfiguring IPS mdule in UTM t detect and stp attacks Cunter Measure Techniques fr Lcal Systems Identifying the Vulnerabilities f a system Understanding the Vulnerabilities f a system CVE ID Bugtraq ID Patch Management Identifying the patch fr a Vulnerability Dwnlading the Patch Testing the patch fr stability in test envirnment Deplying the patch t Live Netwrk Finding the missing updates in an Operating System

9 Micrsft Baseline Security Analyzer Belarc Advisr Cunter Measure Techniques fr Malware Attacks Scanning systems fr Malware infectins Types f anti-malwares Anti-Virus Anti-Wrm Anti-Trjan Anti-Rtkit Internet Security Suites HIDS HIPS

Who Should attend? Application Developers,Network Engineers, IT Professionals, Engineering Students, Professors

Who Should attend? Application Developers,Network Engineers, IT Professionals, Engineering Students, Professors Natinal Technlgy Awareness Campaign (Asia s Largest Campaign fr Autmbile and IT Technlgy) Organized By: SGT Internatinal, Metawing Technlgies (P) Ltd Initiative f Hack Track Andrid and Applicatin Develpment

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

Outpost Pro PC security products

Outpost Pro PC security products Outpst PRO security prducts Datasheet versin 8.0 Page 1 [EN] Outpst Pr PC security prducts Antivirus, Firewall, Security Suite Versin 8.0 The Outpst Pr prduct line, including Outpst Antivirus Pr, Outpst

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online

More information

Server 2008 R2 - Generic - Case

Server 2008 R2 - Generic - Case Server 2008 R2 - Generic - Case Day 1 Task 1 Install the fllwing machines: DC01 Server2008 R2 Standard Editin WEB01 Server 2008 R2 Standard Editin WEB02 Server 2003 File01 Server 2008 R2 Standard Editin

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

CallRex 4.2 Installation Guide

CallRex 4.2 Installation Guide CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex

More information

CSC 421 COURSE COMPACT

CSC 421 COURSE COMPACT CSC 421 COURSE COMPACT Curse Cde: CSC 421 Curse Title: Cmputer Security Status: Cmpulsry Curse Unit: 2 Cntact Details Lecturer s Data Lecture perid: Tw hurs lectures per week fr 15 weeks (30 hurs) Name:

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

CNS-205: Citrix NetScaler 11 Essentials and Networking

CNS-205: Citrix NetScaler 11 Essentials and Networking CNS-205: Citrix NetScaler 11 Essentials and Netwrking Overview The bjective f the Citrix NetScaler 11 Essentials and Netwrking curse is t prvide the fundatinal cncepts and skills necessary t implement,

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Configuring, Managing and Maintaining Windows Server 2008 Servers MOC-6419

Configuring, Managing and Maintaining Windows Server 2008 Servers MOC-6419 Cnfiguring, Managing and Maintaining Windws Server 2008 Servers MOC-6419 Curse Descriptin: This curse prvides students with the cre skills required t cnfigure, manage and maintain a Micrsft Windws Server

More information

Name. Description. Rationale

Name. Description. Rationale Cmplliiance Cmpnentt Descriptin Ratinale Benefits List the Dmain List the Discipline List the Technlgy Area List Prduct Cmpnent Dcument the Cmpliance Cmpnent Type Cmpnent Sub-type DEEFFI INITION Hst-Based

More information

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Professional Penetration Testing Techniques and Vulnerability Assessment ... Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment

More information

Course Outline (70-413)

Course Outline (70-413) Curse Outline (70-413) Mdule 1: Planning Server Upgrade and Migratin This mdule explains hw t plan a server upgrade and migratin strategy. Upgrade and Migratin Cnsideratins Creating a Server Upgrade and

More information

Retail Security and Compliance Where On Earth is it Headed?

Retail Security and Compliance Where On Earth is it Headed? Retail Security and Cmpliance Where On Earth is it Headed? An verview f the retail sectr s IT threats and hw t be mre effective in preventing them. Agenda Intrductin Retail in the news Why cyber security

More information

Ethical Hacking Course Layout

Ethical Hacking Course Layout Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type

More information

EC-Council. Ethical Hacking and Countermeasures (version 8) (Exam-312-50)

EC-Council. Ethical Hacking and Countermeasures (version 8) (Exam-312-50) EC-Cuncil Ethical Hacking and Cuntermeasures (versin 8) Duratin: 5 Days Curse Descriptin: This class will immerse the students int an interactive envirnment where they will be shwn hw t scan, test, hack

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

WEB APPLICATION SECURITY TESTING

WEB APPLICATION SECURITY TESTING WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are

More information

[CEH]: Ethical Hacking and Countermeasures

[CEH]: Ethical Hacking and Countermeasures [CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators,

More information

Securely Managing Cryptographic Keys used within a Cloud Environment

Securely Managing Cryptographic Keys used within a Cloud Environment Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta sarbari@electrsft-inc.cm 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

Cisco IT Essentials v4.1. Course Overview. Total Hours: 240

Cisco IT Essentials v4.1. Course Overview. Total Hours: 240 PC Hardware and Sftware Teacher Resurce Cisc Essentials v4.1 Curse Overview Ttal Hurs: 240 Fundamental Chapters 1-10 Chapter 1: Intrductin t the Persnal Cmputer Hurs: 14.00 Gal: Chapter 2: The chapter

More information

Topic Outline. Page 2 of 5

Topic Outline. Page 2 of 5 C O U R S E D E S C R I P T I O N CTX-1258AI Citrix Presentatin Server 4.0: Supprt This curse prvides learners with the skills necessary t mnitr, maintain and trublesht netwrk envirnments running Citrix

More information

CenterPoint Accounting for Agriculture Network (Domain) Installation Instructions

CenterPoint Accounting for Agriculture Network (Domain) Installation Instructions CenterPint Accunting fr Agriculture Netwrk (Dmain) Installatin Instructins Dcument # Prduct Mdule Categry 2257 CenterPint CenterPint Installatin This dcument describes the dmain netwrk installatin prcess

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

Certified Ethical Hacker version 8

Certified Ethical Hacker version 8 Hackers will hit yu frm anywhere Certified Ethical Hacker versin 8 Ethical Hacking & Cunter Measures 5-days Instructr Led Training/Wrkshp Overview T beat a hacker, yu need t think like ne! This is exactly

More information

SMART Active Directory Migrator 9.0.2. Requirements

SMART Active Directory Migrator 9.0.2. Requirements SMART Active Directry Migratr 9.0.2 January 2016 Table f Cntents... 3 SMART Active Directry Migratr Basic Installatin... 3 Wrkstatin and Member Server System... 5 Netwrking... 5 SSL Certificate... 6 Service

More information

CXA-300-1I: Advanced Administration for Citrix XenApp 5.0 for Windows Server 2008

CXA-300-1I: Advanced Administration for Citrix XenApp 5.0 for Windows Server 2008 CXA-300-1I: Advanced Administratin fr Citrix XenApp 5.0 fr Windws Server 2008 This curse prvides learners with the skills necessary t mnitr, maintain and trublesht netwrk envirnments running XenApp fr

More information

Certified Ethical Hacker

Certified Ethical Hacker Certified Ethical Hacker Authrized EC Cuncil Versin 9 Class Descriptin This class will immerse the students int an interactive envirnment where they will be shwn hw t scan, test, hack and secure their

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information

Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Web Applications and Data Servers

Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Web Applications and Data Servers Ethical Hacking & Cuntermeasure Specialist Curse Title: Ethical Hacking & Cuntermeasure Specialist: Web Applicatins and Data Servers Page 1 f 15 Web Applicatins and Data Servers Cpyright by EC-Cuncil All

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

Citrix XenApp 6.5 Basic Administration

Citrix XenApp 6.5 Basic Administration Citrix XenApp 6.5 Basic Administratin Descriptin: Days: 5 Prerequisites: Citrix XenApp 6.5 Basic Administratin training curse prvides the fundatin necessary fr administratrs t effectively centralize and

More information

ISAM TO SQL MIGRATION IN SYSPRO

ISAM TO SQL MIGRATION IN SYSPRO 118 ISAM TO SQL MIGRATION IN SYSPRO This dcument is aimed at assisting yu in the migratin frm an ISAM data structure t an SQL database. This is nt a detailed technical dcument and assumes the reader has

More information

IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH)

IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH) IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH) COURSE DESCRIPTION: SWITCH includes extensive hands-n labs t help yu learn t plan, cnfigure, and verify the implementatin f cmplex enterprise switching

More information

Ten Steps for an Easy Install of the eg Enterprise Suite

Ten Steps for an Easy Install of the eg Enterprise Suite Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Introducing Microsoft Antimalware Technologies

Introducing Microsoft Antimalware Technologies Intrducing Micrsft Antimalware Technlgies June 2011 Intrducing Micrsft Antimalware Technlgies This dcument is fr infrmatinal purpses nly. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY,

More information

ABELMed Platform Setup Conventions

ABELMed Platform Setup Conventions ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require

More information

Microsoft Certified Database Administrator (MCDBA)

Microsoft Certified Database Administrator (MCDBA) Micrsft Certified Database Administratr (MCDBA) 460 hurs Curse Overview/Descriptin The MCDBA prgram and credential is designed fr individuals wh want t demnstrate that they have the necessary skills t

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Linux, Macintosh and Mobile Systems

Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Linux, Macintosh and Mobile Systems Ethical Hacking & Cuntermeasure Specialist Curse Title: Ethical Hacking & Cuntermeasure Specialist: Linux, Macintsh and Mbile Systems Page 1 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil

More information

CareLink Connectivity Options Introduction and Comparison Updated June 2013

CareLink Connectivity Options Introduction and Comparison Updated June 2013 CareLink Cnnectivity Optins Intrductin and Cmparisn Updated June 2013 There are fur cnnectivity ptins available fr CareLink, each f which has certain advantages and disadvantages. It is imprtant t think

More information

CNS-205 Citrix NetScaler 10.5 Essentials and Networking

CNS-205 Citrix NetScaler 10.5 Essentials and Networking CNS-205 Citrix NetScaler 10.5 Essentials and Netwrking Descriptin: The bjective f the Citrix NetScaler 10.5 Essentials and Netwrking curse is t prvide the fundatinal cncepts and advanced skills necessary

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

MANAGED VULNERABILITY SCANNING

MANAGED VULNERABILITY SCANNING Abut SensePst SensePst is an independent and bjective rganisatin specialising in infrmatin security cnsulting, training, security assessment services and IT Vulnerability Management. SensePst is abut security.

More information

Pronestor Room & Catering

Pronestor Room & Catering Prnestr Rm Prnestr Rm & Catering Mdule 1 Technical requirements & installatin - Prnestr Rm & Catering Page 1.0 1.5 A guide t all the necessary server preparatins fr the installatin f Prnestr Rm & Catering.

More information

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is

More information

PBX Remote Line Extension using Mediatrix 4104 and 1204 June 22, 2011

PBX Remote Line Extension using Mediatrix 4104 and 1204 June 22, 2011 PBX Remte Line Extensin using Mediatrix 4104 and 1204 June 22, 2011 Prprietary 2011 Media5 Crpratin Table f Cntents Intrductin... 3 Applicatin Scenari... 3 Running the Unit Manager Netwrk Sftware... 4

More information

Planning, Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Environment for an MCSE on Windows 2000 Course No.

Planning, Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Environment for an MCSE on Windows 2000 Course No. Micrsft Windws Server 2003 Envirnment fr an MCSE n Windws 2000 Curse N. MS2297 5 Days COURSE OVERVIEW This five-day, instructr-led curse prvides students with the knwledge and new skills that they need

More information

Implementing CiscoWorks LMS

Implementing CiscoWorks LMS Implementing CiscWrks LMS Curse CWLMS v4.0; 5 Days, Instructr-led Curse Descriptin Implementing CiscWrks LMS (CWLMS) v4.0 teaches learners hw t use the CiscWrks LAN Management Slutin (LMS) 4.0 t manage

More information

Understand Business Continuity

Understand Business Continuity Understand Business Cntinuity Lessn Overview In this lessn, yu will learn abut: Business cntinuity Data redundancy Data availability Disaster recvery Anticipatry Set What methds can be emplyed by a system

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9] CH EHC EC-Council Ethical Hacking and [v.9] Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Intermediate Ethical Hacking Core Delivery

More information

Department of CSIT Organizes a 2-Day Skill Development Workshop On Basic Networking Tools and Concepts. On 14-15 March 2016

Department of CSIT Organizes a 2-Day Skill Development Workshop On Basic Networking Tools and Concepts. On 14-15 March 2016 Department f CSIT Organizes a 2-Day Skill Develpment Wrkshp On Basic Netwrking Tls and Cncepts On 14-15 March 2016 In Jint Cllabratin With Skill Develpment Cell Guru Ghasidas Vishwavidyalaya, Bilaspur

More information

INFORMATION SECURITY TRAINING

INFORMATION SECURITY TRAINING INFORMATION SECURITY TRAINING Course Duration: 45 days Pre-Requisite: Basic Knowledge of Internet Course Content Course Fee: 15,000 ( Online Examination Fee, Books, Certification, Tools & Software's Included

More information

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning Course Outline: Certified Ethical Hacker v8 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 35 hrs Overview: This class will immerse the students into an interactive environment

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages

More information

FSP-201: Ethical Hacking & IT Security

FSP-201: Ethical Hacking & IT Security FSP-201: Ethical Hacking & IT Security Session 2015-16 OVERVIEW ABOUT SIFS INDIA COURSE INTRODUCTION ENTRY REQUIREMENTS HOW TO APPLY FEE STRUCTURE COURSE MODULES CAREER PROSPECTS LIBRARY TRAINING & INTERNSHIP

More information

Datasheet. PV4E Management Software Features

Datasheet. PV4E Management Software Features PV4E Management Sftware Features PV4E is a field prven cmprehensive slutin fr real-time cntrl ver netwrk infrastructure and devices The new and refreshed Graphic User Interface (GUI) is nw even mre attractive,

More information

Email Setup PPD IT How-to Guides June 2010

Email Setup PPD IT How-to Guides June 2010 Email Setup Cntents Email Infrmatin... 2 IMAP and POP3 settings... 2 Cnfiguring Micrsft Outlk 2007... 2 Archiving mail... 3 Cnfiguring AutArchive in Micrsft Outlk 2007... 3 Access frm ff site... 4 Cnfiguring

More information

Risk Reduction and Compliance through Vulnerability Management

Risk Reduction and Compliance through Vulnerability Management Risk Reductin and Cmpliance thrugh Vulnerability Management Vulnerability Management / Overview Intercnnected netwrks between cmpanies and their custmers, suppliers and business partners ffer significant

More information

Have some knowledge of how queries execute. Must be able to read a query execution plan and understand what is happening.

Have some knowledge of how queries execute. Must be able to read a query execution plan and understand what is happening. Curse 2786B: Designing a Micrsft SQL Server 2005 Infrastructure Abut this Curse This tw-day instructr-led curse prvides database administratrs wrking in enterprise envirnments with the knwledge and skills

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2. Oracle s Hyperin Data Integratin Management Release 9.2.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 Intrductin t Data Integratin Management... 1 Data Integratin Management Adapters...

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,

More information

CXA-206-1 Citrix XenApp 6.5 Basic Administration

CXA-206-1 Citrix XenApp 6.5 Basic Administration CXA-206-1 Citrix XenApp 6.5 Basic Administratin Citrix XenApp 6.5 Basic Administratin training curse prvides the fundatin necessary fr administratrs t effectively centralize and manage applicatins in the

More information

Provisioning Services Architecture Overview. User Account Context / Service Account Context

Provisioning Services Architecture Overview. User Account Context / Service Account Context This article prvides a descriptin abut hw the Prvisining Services cmpnents interact with each ther and hw they shuld be cnfigured t grant adequate permissins. Prvisining Services Architecture Overview

More information

Hardware Requirements

Hardware Requirements Pre-Installatin Checklist Management Cnsle Prir t Installatin: Verify hardware meets requirements Install prerequisite sftware and verify functinality Hardware Requirements CPU: 2.0 GHz r higher; Dual

More information

Configuring and Integrating LDAP

Configuring and Integrating LDAP Cnfiguring and Integrating LDAP The Basics f LDAP 3 LDAP Key Terms and Cmpnents 3 Basic LDAP Syntax 4 The LDAP User Experience Mnitr 6 This dcument includes infrmatin abut LDAP and its rle with SlarWinds

More information

Help Desk Level Competencies

Help Desk Level Competencies Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar

More information

webnetwork Pre-Installation Configuration Checklist

webnetwork Pre-Installation Configuration Checklist webnetwrk Pre-Installatin Cnfiguratin Checklist Stneware, Inc. Prduct: webnetwrk versin 6.2 and higher Dcument revisin: 2-10-2015 1 Intrductin This dcument is intended t prvide infrmatin that will assist

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Corporate Profile, 2014

Corporate Profile, 2014 Cpyright 2014 IT-Serve.cm All rights reserved. IT-Serve.cm Crprate Prfile, 2014 Internatinal experience, Reginal reach, Lcal understanding Dubai Abu Dhabi Sharjah Oman Qatar Saudi Arabia IT-Serve.cm PO

More information

Learn More Cloud Extender Requirements Cheat Sheet

Learn More Cloud Extender Requirements Cheat Sheet MaaS360.cm > Learn Mre Learn Mre Clud Extender Requirements Cheat Sheet OVERVIEW This dcument defines all requirements t ensure a successfully installatin f the Clud Extender t enable use f ActiveSync

More information

CNS-300-2I Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

CNS-300-2I Advanced Administration for Citrix NetScaler 9.0 Platinum Edition CNS-300-2I Advanced Administratin fr Citrix NetScaler 9.0 Platinum Editin This curse prvides the fundatin t manage, cnfigure and mnitr advanced features and cmpnents f Citrix NetScaler 9.0 Platinum Editin.

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

Remote Setup and Configuration of the Outlook Email Program Information Technology Group

Remote Setup and Configuration of the Outlook Email Program Information Technology Group Remte Setup and Cnfiguratin f the Outlk Email Prgram Infrmatin Technlgy Grup The fllwing instructins will help guide yu in the prper set up f yur Outlk Email Accunt. Please nte that these instructins are

More information

Network Defense Specialist. Course Title: Network Defense Specialist: Security and Vulnerability Assessment

Network Defense Specialist. Course Title: Network Defense Specialist: Security and Vulnerability Assessment Curse Title: Netwrk Defense Specialist: Security and Vulnerability Assessment Page 1 f 11 Curse Descriptin The Netwrk Defense Series frm EC-Cuncil Press is cmprised f 5 bks designed t educate learners

More information

CallRex 4.3 Installation Guide

CallRex 4.3 Installation Guide This dcument describes hw t install CallRex 4.3. It cvers the fllwing: CallRex 4.3 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex Services. Trubleshting.

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

CXA-204-1I Basic Administration for Citrix XenApp 6

CXA-204-1I Basic Administration for Citrix XenApp 6 CXA-204-1I Basic Administratin fr Citrix XenApp 6 Basic Administratin fr Citrix XenApp 6 training curse prvides the fundatin necessary fr administratrs t effectively centralize and manage applicatins in

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Security Guidance ArcGIS Server 9.3 Windows Security Requirements

Security Guidance ArcGIS Server 9.3 Windows Security Requirements Envirnmental Systems Research Institute, Inc., 380 New Yrk St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-307-3014 Security Guidance ArcGIS Server 9.3 Windws Security Requirements Versin 1.0

More information

Mac-Lab/CardioLab Anti-Virus Information Software version 6.9.6

Mac-Lab/CardioLab Anti-Virus Information Software version 6.9.6 Mac-Lab/CardiLab Anti-Virus Infrmatin Sftware versin 6.9.6 Prduct Grup: Prducts: Subject: Date: Interventinal Invasive Prducts Mac-Lab IT/XT/XTi, CardiLab IT/XT/XTi, SpecialsLab and CmbLab IT/XT/XTi Recrding

More information

Fidelis Threat Advisory #1014. Document Status: 1.0 Last Revised: 2014-12-11

Fidelis Threat Advisory #1014. Document Status: 1.0 Last Revised: 2014-12-11 Fidelis Threat Advisry #1014 Bts, Machines, and the Matrix Dec 12, 2014 Dcument Status: 1.0 Last Revised: 2014-12-11 Executive Summary In the recent past, a Fidelis XPS user reprted seeing detectins f

More information

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

More information

The Secret Life of Data: Protecting Sensitive Information, Mobile to Cloud

The Secret Life of Data: Protecting Sensitive Information, Mobile to Cloud SESSION ID: CDS-R02 The Secret Life f Data: Prtecting Sensitive Infrmatin, Mbile t Clud Dan Griffin President JW Secure, Inc. @JWSdan WWNSAD? Intelligence agencies have been public abut: Inevitability

More information

UBC Incident Response Plan V1.5

UBC Incident Response Plan V1.5 UBC Incident Respnse Plan V1.5 Cntents 1. Ratinale... 2 2. Objective... 2 3. Applicatin... 2 4. Reprting a Cmputer Security Incident... 2 5. Managing the Security Incident... 2 5.1. All Incidents... 2

More information

City of Dublin Education & Training Board. Programme Module for. Network Security. leading to. Level 6 QQI. Network Security 6N0720

City of Dublin Education & Training Board. Programme Module for. Network Security. leading to. Level 6 QQI. Network Security 6N0720 City f Dublin Educatin & Training Bard City f Dublin Educatin & Training Bard Prgramme Mdule fr Netwrk Security leading t Level 6 QQI Netwrk Security 6N0720 Netwrk Security 6N0720 City f Dublin Educatin

More information

webnetwork Pre-Installation Configuration Checklist

webnetwork Pre-Installation Configuration Checklist webnetwrk Pre-Installatin Cnfiguratin Checklist Stneware, Inc. Date: Oct 3rd 2012 Prduct: webnetwrk versin 6.0 sp9 and 6.1 Dcument revisin: 10-3-2012 1 Intrductin This dcument is intended t prvide infrmatin

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information