EC-Council Certified Secure Programmer-.NET

Size: px
Start display at page:

Download "EC-Council Certified Secure Programmer-.NET"

Transcription

1 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline EC-Cuncil Certified Secure Prgrammer-.NET Curse Outline Mdule 01: Intrductin t.net Applicatin Security Micrsft.NET Applicatin Security.NET Applicatin Security Need fr.net Applicatin Security.NET Applicatin Attack Statistics Understanding Applicatin Security End-t-End Security What is Secure Cding? Why are Security Mistakes Made? Key Elements f.net Framewrk Architecture Security.NET Security Features.NET Framewrk Security Namespaces ASP.NET Security Architecture Cmmn Security Threats n.net Web Applicatin Security Frame Cmmn Security Threats n.net OWASP Tp 10 Attacks n.net Security Miscnfiguratin Crss-Site Scripting (XSS) Attacks SQL Injectin Attacks Crss-Site Request Frgery (CSRF) Attack Failure t Restrict URL Access Insufficient Transprt Layer Prtectin Unvalidated Redirects and Frwards Insecure Direct Object References Brken Authenticatin and Sessin Management Insecure Cryptgraphic Strage Secure Develpment Lifecycle (SDL) Phases f SDL Page 1 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

2 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline SDL Prcess Integrating Security int the Develpment Lifecycle Security in the Design Stage: Threat Mdeling Threat Mdeling Prcess The STRIDE mdel The DREAD mdel Guidelines fr Applying Security in Implementatin Phase f SDL Security Testing Secure Cding Principles Guidelines fr Develping Secure Cdes Mdule 02:.NET Framewrk Security Intrductin t.net Framewrk.NET Framewrk Architecture Basic Cmpnents f.net Framewrk.Net Runtime Security.NET Framewrk Runtime Security Mdel Rle-Based Security Rle-Based Security: Windws Principal Rle-Based Security: Generic Principal Cde Access Security (CAS) Using Cde Access Security in ASP.NET Evidence-Based Security Permissins Cde Access Permissins Identity Permissins Rle-Based Security Permissins Permissins Classes in.net Type Safety SkipVerificatin Stack Walk Declarative and Imperative Security Syntax Islated Strage Page 2 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

3 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Data String Prcess in Islated Strage Managing Data Islatin using Stre s Identity Levels f Islatin Limitatins f Islated Strage Administering Islated Strage Granting Islated Strage Permissins with Mscrcfg.msc Granting Islated Strage Permissins with Caspl.exe Managing Existing Stres.NET Class Libraries Security Class Libraries Security Writing Secure Class Libraries Security Demands Link Demands Security Hles in Link Demands Inheritance Demands Overriding Security Checks Security Optimizatins.NET Assembly Security.NET Assembly Cmmn Threats t.net Assemblies Privileged Cde Secure Assembly Design Cnsideratins Secure Class Design Cnsideratins Securing Assemblies Using Strng Name Signing Securing Assemblies with Cde Access Attributes Securing Assemblies Against Decmpilatin Using Obfuscatin Dtfuscatr:.NET Obfuscatr Prtecting Assemblies Using Publisher Certificate Securing Assemblies Using Applicatin Dmain Permissins Vulnerability in Serializing Sensitive Objects Vulnerabilities in Multithreaded Assemblies Vulnerabilities in Static Class Methds/ Cnstructrs f Assemblies Vulnerability in Dispse Methds Page 3 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

4 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline.NET Security Tls Cde Access Security Plicy Tl: Caspl.exe Caspl.exe Parameters Sftware Publisher Certificate Test Tl: Cert2spc.exe Certificate Manager Tl: Certmgr.exe Optins in Certmgr.exe Certificate Creatin Tl: Makecert.exe Optins in Makecert.exe PEVerify Tl: Peverify.exe Optins in Peverify.exe.NET Security Anntatr Tl: SecAnntate.exe Sign Tl: SignTl.exe Strng Name Tl: Sn.exe Islated Strage Tl: Streadm.exe Best Practices fr.net Framewrk Security Mdule 03: Input Validatin and Output Encding Input Validatin Why Input Validatin? Input Validatin Input Validatin Specificatin Input Validatin Appraches Client-side Input Validatin Server-side Input Validatin Client-Server Input Validatin Reliability Input Filtering Input Filtering Technique: Black Listing Input Filtering Technique: White Listing Perfrm Input Validatin and Filtering using a Regular Expressin String Manipulatin and Cmparisn Data Type Cnversin ASP.NET Validatin Cntrls Set f ASP.NET Validatin Cntrls Page 4 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

5 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline RequiredField Validatin Cntrl Range Validatin Cntrl Cmparisn Validatin Cntrl RegularExpressin Validatin Cntrl Custm Validatin Cntrl Validatin Summary Cntrl Input Validatin Attacks Crss Site Scripting (XSS) Attack SQL Injectin Attacks HTML Tags Used in XSS Attack Defensive Techniques against XSS Attacks XSS Attack Defensive Techniques Need fr Securing Validatin Cntrls Securing RequiredField Validatin Cntrl Securing Range Validatin Cntrl Specifying the Crrect Data Type in Range Validatr Securing Cmparisn Validatin Cntrl Securing RegularExpressin Validatin Cntrl Securing Custm Validatin Cntrl Integrating Security fr Multiple Validatin Cntrls Defensive Techniques against SQL Injectin Attacks SQL Injectin Attack Defensive Techniques Using Parameterized Queries Using Parameterized Stred Prcedures Using Escape Rutines t Handle Special Input Characters Database Specific Escaping: Oracle Escaping Using a Least-Privileged Database Accunt Cnstraining Input Output Encding ASP.NET Cntrls with Encding Supprt Encding Unsafe Output using HtmlEncde Encding Unsafe Output using UrlEncde Anti-XSS Library Page 5 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

6 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Encding Output using Anti-XSS Library Sandbxing Sandbxing Sftware: Sandbxie Sandbxing Sftware: BufferZne Pr Sandbxing API in.net Framewrk Creating Sandbx fr Partial Trust Cde Best Practices Micrsft Cde Analysis Tl.NET (CAT.NET) Mdule 04:.NET Authrizatin and Authenticatin Intrductin t Authenticatin and Authrizatin Cmmn Threats with User Authenticatin and Authrizatin Authenticatin and Authrizatin in.net Web Applicatin Security Security Relatinship between IIS and ASP.NET Authenticatin ASP.NET Authenticatin ASP.NET Authenticatin Mdes Security Settings Matrix between IIS and ASP.NET Frms Authenticatin Passprt Authenticatin Implementing Passprt Authenticatin Custm Authenticatin Implementing Custm Authenticatin Scheme Windws Authenticatin Selecting an Apprpriate Authenticatin Methd Determining an Authenticatin Methd Enterprise Services Authenticatin SQL Server Authenticatin Authrizatin Identities, Principals, and Rles ASP.NET Authrizatin URL Authrizatin File Authrizatin Page 6 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

7 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline What is Impersnatin? Impersnatin Optins Delegatin Cde-based Authrizatin Declarative Authrizatin Imperative Authrizatin Explicit Authrizatin Authrizatin using ASP.NET Rles Enterprise Services Authrizatin SQL Server Authrizatin Authenticatin and Authrizatin Vulnerabilities Securing Frms Authenticatin Tickets Securing Hash Generatin using SHA1 Securing Encryptin using AES Securing Frms Authenticatin Ckies using SSL Securing Frms Authenticatin Credentials Preventing Sessin Hijacking using Ckieless Authenticatin Securing Authenticatin Tken Using Sliding Expiratin Aviding Frms Authenticatin Ckies frm Persisting Using DisplayRememberMe Prperty Aviding Frms Authenticatin Ckies frm Persisting Using RedirectFrmLginPage Methd Aviding Frm Authenticatin Ckies frm Persisting Using SetAuthCkie Methd Aviding Frm Authenticatin Ckies frm Persisting Using GetRedirectUrl Methd Aviding Frm Authenticatin Ckies frm Persisting Using FrmsAuthenticatinTicket Cnstructr Securing Passwrds with minrequiredpasswrdlength Securing Passwrds with minrequirednnalphanumericcharacters Securing Passwrds with passwrdstrengthregularexpressin Restricting Number f Failed Lgn Attempts Securing Applicatin by Using Abslute URLs fr Navigatin Securing Applicatins frm Authrizatin Bypass Attacks Creating Separate Flder fr Secure Pages in Applicatin Validating Passwrds n CreateUserWizard Cntrl using Regular Expressins Authenticatin and Authrizatin Best Practices Page 7 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

8 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Applicatin Categries Cnsideratins: Authenticatin-Frms Applicatin Categries Cnsideratins: Authrizatin Guidelines fr Secure Authenticatin and Authrizatin Cding Secure Develpment Checklists: Authenticatin Secure Develpment Checklists: Authrizatin Secure Develpment Checklists: User-Server Authenticatin Secure Cmmunicatin String Secrets Optins fr String Secrets in ASP.NET Mdule 05: Secure Sessin and State Management Sessin Management Basic Security Principles fr Sessin Management Tkens Cmmn Threats t Sessin Management Sessin Management Techniques in ASP.NET ASP.NET Sessin Management Techniques Client-Side State Management Client-Side State Management Using Ckies Client-Side State Management Using Hidden Fields Client-Side State Management Using View State Client-Side State Management Using Cntrl State Client-Side State Management Using Query Strings Server-Side State Management Server-Side State Management Using Applicatin Object Server-Side State Management Using Sessin Object Server-Side State Management Using Prfile Prperties Sessin Attacks and Its Defensive Techniques Sessin Hijacking Securing ASP.NET Applicatin frm Sessin Hijacking Implementing SSL t Encrypt Ckies Setting a Limited Time Perid fr Expiratin Avid using Ckieless Sessins Avid using UseUri Ckieless Sessins Page 8 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

9 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Avid Specifying Ckie Mdes t AutDetect Avid Specifying Ckie Mdes t UseDevicePrfile Enabling regenerateexpiredsessinid fr Ckieless Sessins Resetting the Sessin when User Lgs Out Tken Predictin Attack Generating Lengthy Sessin Keys t Prevent Guessing Sessin Replay Attack Defensive Techniques fr Sessin Replay Attack Sessin Fixatin Sessin Fixatin Attack Securing ASP.NET Applicatin frm Sessin Fixatin Attack Crss-Site Script Attack Preventing Crss-Site Scripting Attack using URL Rewriting Preventing Sessin Ckies frm Client-Side Scripts Attacks Crss-Site Request Frgery Attack Implementing the Sessin Tken t Mitigate CSRF Attacks Defensive Techniques fr Crss Site Request Frgery Attack Securing Ckie Based Sessin Management Ckie-Based Sessin Management Persistent Ckies Infrmatin Leakage Avid Setting the Expire Attribute t Ensure Ckie Security Ensuring Ckie Security using the Secure Attribute Ensuring Ckie Security using the HttpOnly Attribute Ensuring Ckie Security using the Dmain Attribute Ensuring Ckie Security using Path Attribute ViewState Security Cmmn Threats n ViewState ViewState Data Tampering Attack ViewState neclick Attacks Securing ViewState Securing ViewState with Hashing Securing ViewState with Encryptin Securing ViewState by Assigning User-Specific Key Page 9 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

10 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Guidelines fr Secure Sessin Management Mdule 06:.NET Cryptgraphy Intrductin t Cryptgraphy Cryptgraphic Attacks What Shuld Yu D t Keep the.net Applicatin Away frm Cryptgraphic Attacks? Cryptgraphy Functins f Cryptgraphy Cmmn Threats n Functins f Cryptgraphy and Their Mitigatin Techniques Types f Cryptgraphic Attacks in.net.net Cryptgraphy Namespaces.NET Cryptgraphic Class Hierarchy Symmetric Encryptin SymmetricAlgrithm Class Members f the SymmetricAlgrithm Class Prgramming Symmetric Data Encryptin and Decryptin in.net Securing Infrmatin with Strng Symmetric Encryptin Algrithm Cipher Functin Cipher Mdes Vulnerability in Using ECB Cipher Mde Padding Prblem with Zers Padding Symmetric Encryptin Keys Securing Symmetric Encryptin Keys frm Brute Frce Attacks Resisting Cryptanalysis Attack Using Large Blck Size Generating Nn-Predictable Cryptgraphic Keys using RNGCryptServicePrvider String Secret Keys and String Optins Prtecting Secret Keys with Access Cntrl Lists (ACLs) Prtecting Secret Keys with DPAPI Self Prtectin fr Cryptgraphic Applicatin Encrypting Data in the Stream using CryptStream Class Asymmetric Encryptin AsymmetricAlgrithm Class Page 10 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

11 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Hashing Members f the AsymmetricAlgrithm Class Prgramming Asymmetric Data Encryptin and Decryptin in.net Asymmetric Encryptin Algrithm Key Security Securing Asymmetric Encryptin using Large Key Size String Private Keys Securely Prblem with Exchanging Public Keys Exchanging Public Keys Securely Asymmetric Data Padding Prtecting Cmmunicatins with SSL Hashing Algrithms Class Hierarchy in.net Hashing in.net Members f the HashAlgrithm Class Prgramming Hashing fr Memry Data Prgramming Hashing fr Streamed Data Impsing Limits n Message Size fr Hash Cde Security Setting Prper Hash Cde Length fr Hash Cde Security Message Sizes and Hash Cde Lengths Supprted by the.net Framewrk Hashing Algrithms Securing Hashing Using Keyed Hashing Algrithms Digital Signatures Attacker's Target Area n Digital Signatures Security Features f Digital Signatures.NET Framewrk Digital Signature Algrithms Digital Certificates.NET Supprt fr Digital Certificates Prgramming Digital Signatures using Digital Certificates XML Signatures Need fr Securing XML Files Securing XML Files using Digital Signatures Prgramming a Digital Signature fr a Sample XML File Page 11 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

12 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Mdule 07:.NET Errr Handling, Auditing, and Lgging Errr Handling Parameters t be Cnsidered while Designing Secure Errr Messages! What is an Errr? What are Exceptins/Runtime Errrs? Need f Errr/Exceptin Handling Secure Exceptin Handling Exceptin Handling in ASP.NET Handling Exceptins in an Applicatin Class-Level Exceptin Handling Class-Level Exceptin Handling Vulnerabilities Generic Exceptin Thrwing Vulnerability Generic Exceptin Catching Vulnerability Vulnerability in Printing StackTrace Vulnerability in Exceptin.TString() Methd Vulnerability in Swallwing Exceptins Cleanup Cde Vulnerability Vulnerability in Re-Thrwing Exceptin Rules f Thumb fr Gd Exceptin Management Page-Level Exceptin Handling Applicatin-Level Exceptin Handling Handling Exceptin with Applicatin_Errr Event Handler Handling Exceptin with ASP.NET Errr Page Redirectin Mechanism Managing Unhandled Errrs Expsing Detailed Errr Messages Sensitive Infrmatin Leakage Vulnerability in Custm Errr Message Unbserved Exceptin Vulnerability Exceptin Handling Best Practices Best Practices fr Cding Exceptins Safely D s and Dn ts in Exceptin Handling Guidelines fr Prper Exceptin Handling Errr Handling Security Checklists Auditing and Lgging Page 12 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

13 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline What is Lgging and Auditing? Need f Secure Lgging and Auditing Cmmn Threats t Lgging and Auditing What Shuld be Lgged? What Shuld NOT be Lgged? Where t Perfrm Event Lgging? Perfrming Lg Thrttling in ASP.NET Health Mnitring System Windws Event Lg Preventing Windws Event Lg frm Denial f Service Attack Securing Windws Event lg Preventing Rgue Administratrs frm Tampering with Windws Event Lgs Centralizing Lgging and Cnfiguring its Security Tracing in.net Writing Trace Output t Windws Event Lg Using EventLgTraceListener Auditing and Lgging Best Practices Tracing Security Cncerns and Recmmendatins Secure Auditing and Lgging Best Practices: Prtecting Lg Recrds Secure Auditing and Lgging Best Practices: Fixing the Lgs Auditing and Lgging Security Checklists.NET Lgging Tls Apache Fundatin s lg4net SmartInspect NLg Lgview4net.NET Lgging Tls Mdule 08:.NET Secure File Handling File Handling System.IO Namespace Classes Attacks n File and Its Defensive Techniques Path Traversal Attack Prtecting Path Traversal Attack Pssible Methds t Prevent Path Traversal Page 13 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

14 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Cannicalizatin Cannicalizatin Attack Prtecting the Applicatins against Cannicalizatin Attacks Securing Files Securing the Static Files Adding Rle Checks t File Access Securing File I/O frm Untrusted File Input Securing File I/O with Abslute Path Cnstrain File I/O by Cnfiguring Cde Access Security Plicy Securing User-Specified Files with FileIOPermissin Virtual Path Mapping Using MapPath Preventing Crss-Applicatin Mapping Using MapPath Validating File Names using GetFullPath Securing User Upladed Files File Extensin Handling Active Server Pages (ASP) Directry Listing Creating Directry Listing Islated Strage Islated Strage - Get Stre/ Open Stre Islated Strage Rt Lcatin Strage Files Islated Strage Example File Access Cntrl Lists (ACLs) File ACLs Required.NET Access Cntrl Lists (ACLs) Checklist fr Securely Accessing Files Mdule 09:.NET Cnfiguratin Management and Secure Cde Review Cnfiguratin Management ASP.NET Cnfiguratin Files ASP.NET Cnfiguratin File Mdel ASP.NET Cnfiguratin File Lcatins Cnfiguratin Management Threats Machine Cnfiguratin File Page 14 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

15 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Machine Cnfiguratin File: Machine.cnfig Machine.cnfig Vulnerability Applicatin Cnfiguratin Files Applicatin Cnfiguratin File: Web.cnfig Web.cnfig Vulnerabilities: Default Errr Message Web.cnfig Vulnerabilities: Leaving Tracing Enabled in Web-Based Applicatins Web.cnfig Vulnerabilities: Leaving Debugging Enabled Web.cnfig Vulnerabilities: Ckies Accessible thrugh Client-Side Script Web.cnfig Vulnerabilities: Enabled Ckieless Sessin State Web.cnfig Vulnerabilities: Enabled Ckieless Authenticatin Web.cnfig Vulnerabilities: Failure t Require SSL fr Authenticatin Ckies Web.cnfig Vulnerabilities: Using Sliding Expiratin Web.cnfig Vulnerabilities: Using Nn-Unique Authenticatin Ckie Web.cnfig Vulnerabilities: Using Hardcded Credential Web.cnfig Vulnerabilities: Securing List-based Cntrls using EnableEventValidatin Web.cnfig Vulnerabilities: Securing Passwrds using PasswrdFrmat Web.cnfig Vulnerabilities: Changing Default Values f Membership Settings Web.cnfig Vulnerabilities: Securing Against XSS Attack Vulnerabilities Web.cnfig Vulnerabilities: Securing Against DS Attack Vulnerabilities Web.cnfig Vulnerabilities: Preventing ViewState frm Tampering Web.cnfig Vulnerabilities: Securing ViewState with SDL-apprved Cryptgraphic Algrithms Web.cnfig Vulnerabilities: Securing ViewState with Strng Validatin Key Web.cnfig Vulnerabilities: Securing ViewState using Encryptin Web.cnfig Vulnerabilities: Selecting Right Algrithm fr ViewState Encryptin Web.cnfig Vulnerabilities: Deplying Applicatin with Strng decryptin Key Web.cnfig Vulnerabilities: Ignring Validatin Errrs Applicatin Cnfiguratin Files: App.exe.cnfig App.exe.cnfig Vulnerabilities Cde Access Security Cnfiguratin Files Enterprise Plicy Cnfiguratin File: enterprisesec.cnfig Machine and User Plicy Cnfiguratin File: security.cnfig ASP. NET Plicy Cnfiguratin Files Page 15 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

16 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline.NET Framewrk Cnfiguratin Tl: Mscrcfg.msc Mscrcfg.msc Features Cde Access Security Plicy Tl: Caspl.exe Cnfiguratin Management Best Practices Secure Cde Review Why Secure Cde Review? Security Cde Review Apprach Step 1: Identify Security Cde Review Objectives Step 2: Perfrm Preliminary Scan Step 3: Review Cde fr Security Issues Step 4: Review fr Security Issues Unique t the Architecture Static Cde Analysis Tls Parasft dttest Micrsft FxCp StyleCp NDepend ReSharper Page 16 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.

Citrix XenApp 6.5 Basic Administration

Citrix XenApp 6.5 Basic Administration Citrix XenApp 6.5 Basic Administratin Descriptin: Days: 5 Prerequisites: Citrix XenApp 6.5 Basic Administratin training curse prvides the fundatin necessary fr administratrs t effectively centralize and

More information

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite AIMS Versin 9 System Requirements Versin 9 2603 Camin Ramn Suite 110 San Ramn, CA 94583 Phne: 800-609-8610 925-217-5170 FAX: 925-217-0853 Email: [email protected] Page

More information

CNS-205: Citrix NetScaler 11 Essentials and Networking

CNS-205: Citrix NetScaler 11 Essentials and Networking CNS-205: Citrix NetScaler 11 Essentials and Netwrking Overview The bjective f the Citrix NetScaler 11 Essentials and Netwrking curse is t prvide the fundatinal cncepts and skills necessary t implement,

More information

CXA-206-1 Citrix XenApp 6.5 Basic Administration

CXA-206-1 Citrix XenApp 6.5 Basic Administration CXA-206-1 Citrix XenApp 6.5 Basic Administratin Citrix XenApp 6.5 Basic Administratin training curse prvides the fundatin necessary fr administratrs t effectively centralize and manage applicatins in the

More information

CXA-300-1I: Advanced Administration for Citrix XenApp 5.0 for Windows Server 2008

CXA-300-1I: Advanced Administration for Citrix XenApp 5.0 for Windows Server 2008 CXA-300-1I: Advanced Administratin fr Citrix XenApp 5.0 fr Windws Server 2008 This curse prvides learners with the skills necessary t mnitr, maintain and trublesht netwrk envirnments running XenApp fr

More information

ScaleIO Security Configuration Guide

ScaleIO Security Configuration Guide ScaleIO Security Cnfiguratin Guide 1 Intrductin This sectin prvides an verview f the settings available in ScaleIO t ensure secure peratin f the prduct: Security settings are divided int the fllwing categries:

More information

Extending Microsoft Dynamics CRM 2013 Online Training

Extending Microsoft Dynamics CRM 2013 Online Training Extending Micrsft Dynamics CRM 2013 Online Training Curse Outline Plan the deplyment f Micrsft Dynamics CRM Describe the Micrsft Dynamics CRM applicatin framewrk Describe the Micrsft Dynamics CRM extensibility

More information

COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker.

COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker. COURSE DETAILS Intrductin t Ethical Hacking What is Hacking Wh is a Hacker Skills f a Hacker Types f Hackers Reasns fr Hacking Wh are at the risk f Hacking attacks Effects f Cmputer Hacking n an rganizatin

More information

LogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide

LogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide LgMeIn Rescue Web SSO via SAML 2.0 LgMeIn Rescue Web SSO via SAML 2.0 Cnfiguratin Guide 02-19-2014 Cpyright 2015 LgMeIn, Inc. 1 LgMeIn Rescue Web SSO via SAML 2.0 Cntents 1 Intrductin... 3 1.1 Dcument

More information

CXA-204-1I Basic Administration for Citrix XenApp 6

CXA-204-1I Basic Administration for Citrix XenApp 6 CXA-204-1I Basic Administratin fr Citrix XenApp 6 Basic Administratin fr Citrix XenApp 6 training curse prvides the fundatin necessary fr administratrs t effectively centralize and manage applicatins in

More information

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered

More information

Configuring, Managing and Maintaining Windows Server 2008 Servers MOC-6419

Configuring, Managing and Maintaining Windows Server 2008 Servers MOC-6419 Cnfiguring, Managing and Maintaining Windws Server 2008 Servers MOC-6419 Curse Descriptin: This curse prvides students with the cre skills required t cnfigure, manage and maintain a Micrsft Windws Server

More information

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved. Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

Developing secure applications for Windows Phone. SecureApps user group meeting 12/11/2014

Developing secure applications for Windows Phone. SecureApps user group meeting 12/11/2014 Develping secure applicatins fr Windws Phne SecureApps user grup meeting 12/11/2014 2 Overview Intrductin Windws n mbile devices Windws (Phne) 8.1 architecture Silverlight-based vs. WinRT-based apps WP

More information

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

The user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures.

The user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures. Learn Basic Single Sign-On Authenticatin Tale s Basic SSO applicatin grants Learn access t users withut requiring that they enter authenticatin lgin credentials (username and passwrd). The access pint

More information

WEB APPLICATION SECURITY TESTING

WEB APPLICATION SECURITY TESTING WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are

More information

Server 2008 R2 - Generic - Case

Server 2008 R2 - Generic - Case Server 2008 R2 - Generic - Case Day 1 Task 1 Install the fllwing machines: DC01 Server2008 R2 Standard Editin WEB01 Server 2008 R2 Standard Editin WEB02 Server 2003 File01 Server 2008 R2 Standard Editin

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

Configuring SSL and TLS Decryption in ngeniusone

Configuring SSL and TLS Decryption in ngeniusone Cnfiguring SSL and TLS Decryptin in ngeniusone The cnfigure SSL Decryptin feature supprts real-time capture f ASI and ASR traffic flws as well as decding f Secure Scket Link (SSL) and Transprt Layer Security

More information

Copyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.com/ We have attempted to make these documents complete, accurate, and

Copyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.com/ We have attempted to make these documents complete, accurate, and ii Cpyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.cm/ We have attempted t make these dcuments cmplete, accurate, and useful, but we cannt guarantee them t be perfect. When we

More information

CNS-205 Citrix NetScaler 10.5 Essentials and Networking

CNS-205 Citrix NetScaler 10.5 Essentials and Networking CNS-205 Citrix NetScaler 10.5 Essentials and Netwrking Descriptin: The bjective f the Citrix NetScaler 10.5 Essentials and Netwrking curse is t prvide the fundatinal cncepts and advanced skills necessary

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

Pronestor Room & Catering

Pronestor Room & Catering Prnestr Rm Prnestr Rm & Catering Mdule 1 Technical requirements & installatin - Prnestr Rm & Catering Page 1.0 1.5 A guide t all the necessary server preparatins fr the installatin f Prnestr Rm & Catering.

More information

ISAM TO SQL MIGRATION IN SYSPRO

ISAM TO SQL MIGRATION IN SYSPRO 118 ISAM TO SQL MIGRATION IN SYSPRO This dcument is aimed at assisting yu in the migratin frm an ISAM data structure t an SQL database. This is nt a detailed technical dcument and assumes the reader has

More information

Securely Managing Cryptographic Keys used within a Cloud Environment

Securely Managing Cryptographic Keys used within a Cloud Environment Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta [email protected] 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

SharePoint 2010 General Introduction Introduction to SharePoint SharePoint Installation and Administration SharePoint Site Hierarchy Website Email

SharePoint 2010 General Introduction Introduction to SharePoint SharePoint Installation and Administration SharePoint Site Hierarchy Website Email Deccansft Sftware Services SharePint 2010 Syllabus SharePint 2010 General Intrductin What is IIS IIS Website & Web Applicatin Steps t Create Multiple Website n Prt 80 What is Applicatin Pl What is AppDmain

More information

Helpdesk Support Tickets & Knowledgebase

Helpdesk Support Tickets & Knowledgebase Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate

More information

CallRex 4.2 Installation Guide

CallRex 4.2 Installation Guide CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Nex-Gen Web Load Balancer

Nex-Gen Web Load Balancer Nex-Gen Web Lad Balancer Pramati Enterprise prducts have served thusands f applicatins in many different verticals fr ver 10 years. Pramati Server was the first standards-based applicatin server t achieve

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

How To Upgrade A Crptocard To A 6.4 Migratin Tl (Cpl) For A 6Th Generation Of A Crntl (Cypercoder) On A Crperd (Cptl) 6.

How To Upgrade A Crptocard To A 6.4 Migratin Tl (Cpl) For A 6Th Generation Of A Crntl (Cypercoder) On A Crperd (Cptl) 6. BlackShield ID Upgrade and Migratin Guide Fr CRYPTO-Server 6.4 Users Cpyright 2010 CRYPTOCard Inc. website: http://www.cryptcard.cm Trademarks CRYPTOCard and the CRYPTOCard lg are registered trademarks

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin

More information

Mobile Device Manager Admin Guide. Reports and Alerts

Mobile Device Manager Admin Guide. Reports and Alerts Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview

More information

Datasheet. PV4E Management Software Features

Datasheet. PV4E Management Software Features PV4E Management Sftware Features PV4E is a field prven cmprehensive slutin fr real-time cntrl ver netwrk infrastructure and devices The new and refreshed Graphic User Interface (GUI) is nw even mre attractive,

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

IMT Standards. Standard number A000014. GoA IMT Standards. Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical

IMT Standards. Standard number A000014. GoA IMT Standards. Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical IMT Standards IMT Standards Oversight Cmmittee Gvernment f Alberta Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical Standard number A000014 Electrnic Signature Metadata

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Configuring BMC AREA LDAP Using AD domain credentials for the BMC Windows User Tool

Configuring BMC AREA LDAP Using AD domain credentials for the BMC Windows User Tool Cnfiguring BMC AREA LDAP Using AD dmain credentials fr the BMC Windws User Tl Versin 1.0 Cnfiguring the BMC AREA LDAP Plugin fr Dmain Username and Passwrds Intrductin...3 LDAP Basics...4 What is LDAP and

More information

IBM WPL93. Installation and Administration of IBM WebSphere Portal 8 on Linux

IBM WPL93. Installation and Administration of IBM WebSphere Portal 8 on Linux IBM WPL93. Installatin and Administratin f IBM WebSphere Prtal 8 n Linux This instructr led curse is designed fr system administratrs wh want t acquire r update their WebSphere Prtal administratin skills.

More information

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips X7500 Series, X4500 Scanner Series MFPs: LDAP Address Bk and Authenticatin Cnfiguratin and Basic Trubleshting Tips Lexmark Internatinal 1 Prerequisite Infrm atin In rder t cnfigure a Lexmark MFP fr LDAP

More information

Client Application Installation Guide

Client Application Installation Guide Remte Check Depsit Client Applicatin Installatin Guide Client Applicatin Installatin Guide Table f Cntents Minimum Client PC Requirements... 2 Install Prerequisites... 4 Establish a Trust t the Web Server...

More information

Security Support in Mobile Platforms (part I) Vincent Naessens - MSEC

Security Support in Mobile Platforms (part I) Vincent Naessens - MSEC Security Supprt in Mbile Platfrms (part I) Vincent Naessens - MSEC Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device

More information

Uninstalling and Reinstalling on a Server Computer. Medical Director / PracSoft

Uninstalling and Reinstalling on a Server Computer. Medical Director / PracSoft Uninstalling and Reinstalling n a Server Cmputer Medical Directr / PracSft This guide describes the prcess fr uninstalling and then reinstalling Medical Directr, PracSft, and/r SQL Instances n a cmputer

More information

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8 McAfee Enterprise Security Manager Data Surce Cnfiguratin Guide Data Surce: Infblx NIOS September 2, 2014 Infblx NIOS Page 1 f 8 Imprtant Nte: The infrmatin cntained in this dcument is cnfidential and

More information

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 170 - MULTIMEDIA SOFTWARE (3 CR.)

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 170 - MULTIMEDIA SOFTWARE (3 CR.) Revised 8/2012 NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 170 - MULTIMEDIA SOFTWARE (3 CR.) Curse Descriptin Explres technical fundamentals f creating multimedia prjects with related hardware and sftware.

More information

Microsoft Certified Database Administrator (MCDBA)

Microsoft Certified Database Administrator (MCDBA) Micrsft Certified Database Administratr (MCDBA) 460 hurs Curse Overview/Descriptin The MCDBA prgram and credential is designed fr individuals wh want t demnstrate that they have the necessary skills t

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages

More information

E-Biz Web Hosting Control Panel

E-Biz Web Hosting Control Panel 1 f 38 E-Biz Web Hsting Cntrl Panel This dcument has been created t give yu a useful insight in t the Hsting Cntrl Panel available with E-Biz hsting services. Please nte: Optins available are dependent

More information

Enterprise Security Management CIS 259

Enterprise Security Management CIS 259 Enterprise Security Management CIS 259 Prerequisites CIS 175 Descriptin This curse is designed t cver the managerial aspects f cmputer security and risk management fr enterprises. The student will attain

More information

STIOffice Integration Installation, FAQ and Troubleshooting

STIOffice Integration Installation, FAQ and Troubleshooting STIOffice Integratin Installatin, FAQ and Trubleshting Installatin Steps G t the wrkstatin/server n which yu have the STIDistrict Net applicatin installed. On the STI Supprt page at http://supprt.sti-k12.cm/,

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Instant Chime for IBM Sametime Quick Start Guide

Instant Chime for IBM Sametime Quick Start Guide Instant Chime fr IBM Sametime Quick Start Guide Fall 2014 Cpyright 2014 Instant Technlgies. All rights reserved. Cpyright and Disclaimer This dcument, as well as the sftware described in it, is furnished

More information

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers PENNSYLVANIA SURPLUS LINES ASSOCIATION Electrnic Filing System (EFS) Frequently Asked Questins and Answers 1 What changed in Release 2.0?...2 2 Why was my accunt disabled?...3 3 Hw d I inactivate an accunt?...4

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

Implementation Guide for PCI Compliance. Microsoft Dynamics AX 2012 R3

Implementation Guide for PCI Compliance. Microsoft Dynamics AX 2012 R3 Implementatin Guide fr PCI Cmpliance Micrsft Dynamics AX 2012 R3 April 2014 Micrsft Dynamics is a line f integrated, adaptable business management slutins that enables yu and yur peple t make business

More information

Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Web Applications and Data Servers

Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Web Applications and Data Servers Ethical Hacking & Cuntermeasure Specialist Curse Title: Ethical Hacking & Cuntermeasure Specialist: Web Applicatins and Data Servers Page 1 f 15 Web Applicatins and Data Servers Cpyright by EC-Cuncil All

More information

Interworks Cloud Platform Citrix CPSM Integration Specification

Interworks Cloud Platform Citrix CPSM Integration Specification Citrix CPSM Integratin Specificatin Cntents 1. Intrductin... 2 2. Activatin f the Integratin Layer... 3 3. Getting the Services Definitin... 4 3.1 Creating a Prduct Type per Lcatin... 5 3.2 Create Instance

More information

BackupAssist SQL Add-on

BackupAssist SQL Add-on WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

JAVA/J2EE Course Syllabus

JAVA/J2EE Course Syllabus JAVA/J2EE Curse Syllabus Intrductin t Java What is Java? Backgrund/Histry f Java The Internet and Java's place in it Java Virtual Machine Byte cde - nt an executable cde Prcedure-Oriented vs. Object-Oriented

More information

The Acunetix Web Vulnerability Scanner

The Acunetix Web Vulnerability Scanner The Acunetix Web Vulnerability Scanner Website security is pssibly tday's mst verlked aspect f securing the enterprise and shuld be a pririty in any rganizatin. Increasingly, hackers are cncentrating their

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

TechAge Labs Pvt. Ltd. Address : C-46, GF, Sector 2, Noida Phone 1 : 0120-4540894 Phone 2 : 0120-6495333. MagentoTraining

TechAge Labs Pvt. Ltd. Address : C-46, GF, Sector 2, Noida Phone 1 : 0120-4540894 Phone 2 : 0120-6495333. MagentoTraining Magent Training TechAge Labs Pvt. Ltd. Address : C-46, GF, Sectr 2, Nida Phne 1 : 0120-4540894 Phne 2 : 0120-6495333 TechAge Labs 2014 versin 1.0 MagentTraining Magent Training Curse Chapter 1 Cre Develpment

More information

Learn More Cloud Extender Requirements Cheat Sheet

Learn More Cloud Extender Requirements Cheat Sheet MaaS360.cm > Learn Mre Learn Mre Clud Extender Requirements Cheat Sheet OVERVIEW This dcument defines all requirements t ensure a successfully installatin f the Clud Extender t enable use f ActiveSync

More information

Click Studios. Passwordstate. RSA SecurID Configuration

Click Studios. Passwordstate. RSA SecurID Configuration Passwrdstate RSA SecurID Cnfiguratin This dcument and the infrmatin cntrlled therein is the prperty f Click Studis. It must nt be reprduced in whle/part, r therwise disclsed, withut prir cnsent in writing

More information

CryptoMate64. USB Cryptographic Token. Technical Specifications V1.03. Subject to change without prior notice. [email protected] www.acs.com.

CryptoMate64. USB Cryptographic Token. Technical Specifications V1.03. Subject to change without prior notice. info@acs.com.hk www.acs.com. CryptMate64 USB Cryptgraphic Tken Technical Specificatins V1.03 Subject t change withut prir ntice [email protected] www.acs.cm.hk Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 2.1. Cryptgraphic

More information

Planning, Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Environment for an MCSE on Windows 2000 Course No.

Planning, Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Environment for an MCSE on Windows 2000 Course No. Micrsft Windws Server 2003 Envirnment fr an MCSE n Windws 2000 Curse N. MS2297 5 Days COURSE OVERVIEW This five-day, instructr-led curse prvides students with the knwledge and new skills that they need

More information