EC-Council Certified Secure Programmer-.NET
|
|
|
- Lorraine Walton
- 9 years ago
- Views:
Transcription
1 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline EC-Cuncil Certified Secure Prgrammer-.NET Curse Outline Mdule 01: Intrductin t.net Applicatin Security Micrsft.NET Applicatin Security.NET Applicatin Security Need fr.net Applicatin Security.NET Applicatin Attack Statistics Understanding Applicatin Security End-t-End Security What is Secure Cding? Why are Security Mistakes Made? Key Elements f.net Framewrk Architecture Security.NET Security Features.NET Framewrk Security Namespaces ASP.NET Security Architecture Cmmn Security Threats n.net Web Applicatin Security Frame Cmmn Security Threats n.net OWASP Tp 10 Attacks n.net Security Miscnfiguratin Crss-Site Scripting (XSS) Attacks SQL Injectin Attacks Crss-Site Request Frgery (CSRF) Attack Failure t Restrict URL Access Insufficient Transprt Layer Prtectin Unvalidated Redirects and Frwards Insecure Direct Object References Brken Authenticatin and Sessin Management Insecure Cryptgraphic Strage Secure Develpment Lifecycle (SDL) Phases f SDL Page 1 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
2 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline SDL Prcess Integrating Security int the Develpment Lifecycle Security in the Design Stage: Threat Mdeling Threat Mdeling Prcess The STRIDE mdel The DREAD mdel Guidelines fr Applying Security in Implementatin Phase f SDL Security Testing Secure Cding Principles Guidelines fr Develping Secure Cdes Mdule 02:.NET Framewrk Security Intrductin t.net Framewrk.NET Framewrk Architecture Basic Cmpnents f.net Framewrk.Net Runtime Security.NET Framewrk Runtime Security Mdel Rle-Based Security Rle-Based Security: Windws Principal Rle-Based Security: Generic Principal Cde Access Security (CAS) Using Cde Access Security in ASP.NET Evidence-Based Security Permissins Cde Access Permissins Identity Permissins Rle-Based Security Permissins Permissins Classes in.net Type Safety SkipVerificatin Stack Walk Declarative and Imperative Security Syntax Islated Strage Page 2 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
3 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Data String Prcess in Islated Strage Managing Data Islatin using Stre s Identity Levels f Islatin Limitatins f Islated Strage Administering Islated Strage Granting Islated Strage Permissins with Mscrcfg.msc Granting Islated Strage Permissins with Caspl.exe Managing Existing Stres.NET Class Libraries Security Class Libraries Security Writing Secure Class Libraries Security Demands Link Demands Security Hles in Link Demands Inheritance Demands Overriding Security Checks Security Optimizatins.NET Assembly Security.NET Assembly Cmmn Threats t.net Assemblies Privileged Cde Secure Assembly Design Cnsideratins Secure Class Design Cnsideratins Securing Assemblies Using Strng Name Signing Securing Assemblies with Cde Access Attributes Securing Assemblies Against Decmpilatin Using Obfuscatin Dtfuscatr:.NET Obfuscatr Prtecting Assemblies Using Publisher Certificate Securing Assemblies Using Applicatin Dmain Permissins Vulnerability in Serializing Sensitive Objects Vulnerabilities in Multithreaded Assemblies Vulnerabilities in Static Class Methds/ Cnstructrs f Assemblies Vulnerability in Dispse Methds Page 3 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
4 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline.NET Security Tls Cde Access Security Plicy Tl: Caspl.exe Caspl.exe Parameters Sftware Publisher Certificate Test Tl: Cert2spc.exe Certificate Manager Tl: Certmgr.exe Optins in Certmgr.exe Certificate Creatin Tl: Makecert.exe Optins in Makecert.exe PEVerify Tl: Peverify.exe Optins in Peverify.exe.NET Security Anntatr Tl: SecAnntate.exe Sign Tl: SignTl.exe Strng Name Tl: Sn.exe Islated Strage Tl: Streadm.exe Best Practices fr.net Framewrk Security Mdule 03: Input Validatin and Output Encding Input Validatin Why Input Validatin? Input Validatin Input Validatin Specificatin Input Validatin Appraches Client-side Input Validatin Server-side Input Validatin Client-Server Input Validatin Reliability Input Filtering Input Filtering Technique: Black Listing Input Filtering Technique: White Listing Perfrm Input Validatin and Filtering using a Regular Expressin String Manipulatin and Cmparisn Data Type Cnversin ASP.NET Validatin Cntrls Set f ASP.NET Validatin Cntrls Page 4 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
5 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline RequiredField Validatin Cntrl Range Validatin Cntrl Cmparisn Validatin Cntrl RegularExpressin Validatin Cntrl Custm Validatin Cntrl Validatin Summary Cntrl Input Validatin Attacks Crss Site Scripting (XSS) Attack SQL Injectin Attacks HTML Tags Used in XSS Attack Defensive Techniques against XSS Attacks XSS Attack Defensive Techniques Need fr Securing Validatin Cntrls Securing RequiredField Validatin Cntrl Securing Range Validatin Cntrl Specifying the Crrect Data Type in Range Validatr Securing Cmparisn Validatin Cntrl Securing RegularExpressin Validatin Cntrl Securing Custm Validatin Cntrl Integrating Security fr Multiple Validatin Cntrls Defensive Techniques against SQL Injectin Attacks SQL Injectin Attack Defensive Techniques Using Parameterized Queries Using Parameterized Stred Prcedures Using Escape Rutines t Handle Special Input Characters Database Specific Escaping: Oracle Escaping Using a Least-Privileged Database Accunt Cnstraining Input Output Encding ASP.NET Cntrls with Encding Supprt Encding Unsafe Output using HtmlEncde Encding Unsafe Output using UrlEncde Anti-XSS Library Page 5 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
6 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Encding Output using Anti-XSS Library Sandbxing Sandbxing Sftware: Sandbxie Sandbxing Sftware: BufferZne Pr Sandbxing API in.net Framewrk Creating Sandbx fr Partial Trust Cde Best Practices Micrsft Cde Analysis Tl.NET (CAT.NET) Mdule 04:.NET Authrizatin and Authenticatin Intrductin t Authenticatin and Authrizatin Cmmn Threats with User Authenticatin and Authrizatin Authenticatin and Authrizatin in.net Web Applicatin Security Security Relatinship between IIS and ASP.NET Authenticatin ASP.NET Authenticatin ASP.NET Authenticatin Mdes Security Settings Matrix between IIS and ASP.NET Frms Authenticatin Passprt Authenticatin Implementing Passprt Authenticatin Custm Authenticatin Implementing Custm Authenticatin Scheme Windws Authenticatin Selecting an Apprpriate Authenticatin Methd Determining an Authenticatin Methd Enterprise Services Authenticatin SQL Server Authenticatin Authrizatin Identities, Principals, and Rles ASP.NET Authrizatin URL Authrizatin File Authrizatin Page 6 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
7 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline What is Impersnatin? Impersnatin Optins Delegatin Cde-based Authrizatin Declarative Authrizatin Imperative Authrizatin Explicit Authrizatin Authrizatin using ASP.NET Rles Enterprise Services Authrizatin SQL Server Authrizatin Authenticatin and Authrizatin Vulnerabilities Securing Frms Authenticatin Tickets Securing Hash Generatin using SHA1 Securing Encryptin using AES Securing Frms Authenticatin Ckies using SSL Securing Frms Authenticatin Credentials Preventing Sessin Hijacking using Ckieless Authenticatin Securing Authenticatin Tken Using Sliding Expiratin Aviding Frms Authenticatin Ckies frm Persisting Using DisplayRememberMe Prperty Aviding Frms Authenticatin Ckies frm Persisting Using RedirectFrmLginPage Methd Aviding Frm Authenticatin Ckies frm Persisting Using SetAuthCkie Methd Aviding Frm Authenticatin Ckies frm Persisting Using GetRedirectUrl Methd Aviding Frm Authenticatin Ckies frm Persisting Using FrmsAuthenticatinTicket Cnstructr Securing Passwrds with minrequiredpasswrdlength Securing Passwrds with minrequirednnalphanumericcharacters Securing Passwrds with passwrdstrengthregularexpressin Restricting Number f Failed Lgn Attempts Securing Applicatin by Using Abslute URLs fr Navigatin Securing Applicatins frm Authrizatin Bypass Attacks Creating Separate Flder fr Secure Pages in Applicatin Validating Passwrds n CreateUserWizard Cntrl using Regular Expressins Authenticatin and Authrizatin Best Practices Page 7 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
8 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Applicatin Categries Cnsideratins: Authenticatin-Frms Applicatin Categries Cnsideratins: Authrizatin Guidelines fr Secure Authenticatin and Authrizatin Cding Secure Develpment Checklists: Authenticatin Secure Develpment Checklists: Authrizatin Secure Develpment Checklists: User-Server Authenticatin Secure Cmmunicatin String Secrets Optins fr String Secrets in ASP.NET Mdule 05: Secure Sessin and State Management Sessin Management Basic Security Principles fr Sessin Management Tkens Cmmn Threats t Sessin Management Sessin Management Techniques in ASP.NET ASP.NET Sessin Management Techniques Client-Side State Management Client-Side State Management Using Ckies Client-Side State Management Using Hidden Fields Client-Side State Management Using View State Client-Side State Management Using Cntrl State Client-Side State Management Using Query Strings Server-Side State Management Server-Side State Management Using Applicatin Object Server-Side State Management Using Sessin Object Server-Side State Management Using Prfile Prperties Sessin Attacks and Its Defensive Techniques Sessin Hijacking Securing ASP.NET Applicatin frm Sessin Hijacking Implementing SSL t Encrypt Ckies Setting a Limited Time Perid fr Expiratin Avid using Ckieless Sessins Avid using UseUri Ckieless Sessins Page 8 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
9 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Avid Specifying Ckie Mdes t AutDetect Avid Specifying Ckie Mdes t UseDevicePrfile Enabling regenerateexpiredsessinid fr Ckieless Sessins Resetting the Sessin when User Lgs Out Tken Predictin Attack Generating Lengthy Sessin Keys t Prevent Guessing Sessin Replay Attack Defensive Techniques fr Sessin Replay Attack Sessin Fixatin Sessin Fixatin Attack Securing ASP.NET Applicatin frm Sessin Fixatin Attack Crss-Site Script Attack Preventing Crss-Site Scripting Attack using URL Rewriting Preventing Sessin Ckies frm Client-Side Scripts Attacks Crss-Site Request Frgery Attack Implementing the Sessin Tken t Mitigate CSRF Attacks Defensive Techniques fr Crss Site Request Frgery Attack Securing Ckie Based Sessin Management Ckie-Based Sessin Management Persistent Ckies Infrmatin Leakage Avid Setting the Expire Attribute t Ensure Ckie Security Ensuring Ckie Security using the Secure Attribute Ensuring Ckie Security using the HttpOnly Attribute Ensuring Ckie Security using the Dmain Attribute Ensuring Ckie Security using Path Attribute ViewState Security Cmmn Threats n ViewState ViewState Data Tampering Attack ViewState neclick Attacks Securing ViewState Securing ViewState with Hashing Securing ViewState with Encryptin Securing ViewState by Assigning User-Specific Key Page 9 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
10 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Guidelines fr Secure Sessin Management Mdule 06:.NET Cryptgraphy Intrductin t Cryptgraphy Cryptgraphic Attacks What Shuld Yu D t Keep the.net Applicatin Away frm Cryptgraphic Attacks? Cryptgraphy Functins f Cryptgraphy Cmmn Threats n Functins f Cryptgraphy and Their Mitigatin Techniques Types f Cryptgraphic Attacks in.net.net Cryptgraphy Namespaces.NET Cryptgraphic Class Hierarchy Symmetric Encryptin SymmetricAlgrithm Class Members f the SymmetricAlgrithm Class Prgramming Symmetric Data Encryptin and Decryptin in.net Securing Infrmatin with Strng Symmetric Encryptin Algrithm Cipher Functin Cipher Mdes Vulnerability in Using ECB Cipher Mde Padding Prblem with Zers Padding Symmetric Encryptin Keys Securing Symmetric Encryptin Keys frm Brute Frce Attacks Resisting Cryptanalysis Attack Using Large Blck Size Generating Nn-Predictable Cryptgraphic Keys using RNGCryptServicePrvider String Secret Keys and String Optins Prtecting Secret Keys with Access Cntrl Lists (ACLs) Prtecting Secret Keys with DPAPI Self Prtectin fr Cryptgraphic Applicatin Encrypting Data in the Stream using CryptStream Class Asymmetric Encryptin AsymmetricAlgrithm Class Page 10 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
11 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Hashing Members f the AsymmetricAlgrithm Class Prgramming Asymmetric Data Encryptin and Decryptin in.net Asymmetric Encryptin Algrithm Key Security Securing Asymmetric Encryptin using Large Key Size String Private Keys Securely Prblem with Exchanging Public Keys Exchanging Public Keys Securely Asymmetric Data Padding Prtecting Cmmunicatins with SSL Hashing Algrithms Class Hierarchy in.net Hashing in.net Members f the HashAlgrithm Class Prgramming Hashing fr Memry Data Prgramming Hashing fr Streamed Data Impsing Limits n Message Size fr Hash Cde Security Setting Prper Hash Cde Length fr Hash Cde Security Message Sizes and Hash Cde Lengths Supprted by the.net Framewrk Hashing Algrithms Securing Hashing Using Keyed Hashing Algrithms Digital Signatures Attacker's Target Area n Digital Signatures Security Features f Digital Signatures.NET Framewrk Digital Signature Algrithms Digital Certificates.NET Supprt fr Digital Certificates Prgramming Digital Signatures using Digital Certificates XML Signatures Need fr Securing XML Files Securing XML Files using Digital Signatures Prgramming a Digital Signature fr a Sample XML File Page 11 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
12 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Mdule 07:.NET Errr Handling, Auditing, and Lgging Errr Handling Parameters t be Cnsidered while Designing Secure Errr Messages! What is an Errr? What are Exceptins/Runtime Errrs? Need f Errr/Exceptin Handling Secure Exceptin Handling Exceptin Handling in ASP.NET Handling Exceptins in an Applicatin Class-Level Exceptin Handling Class-Level Exceptin Handling Vulnerabilities Generic Exceptin Thrwing Vulnerability Generic Exceptin Catching Vulnerability Vulnerability in Printing StackTrace Vulnerability in Exceptin.TString() Methd Vulnerability in Swallwing Exceptins Cleanup Cde Vulnerability Vulnerability in Re-Thrwing Exceptin Rules f Thumb fr Gd Exceptin Management Page-Level Exceptin Handling Applicatin-Level Exceptin Handling Handling Exceptin with Applicatin_Errr Event Handler Handling Exceptin with ASP.NET Errr Page Redirectin Mechanism Managing Unhandled Errrs Expsing Detailed Errr Messages Sensitive Infrmatin Leakage Vulnerability in Custm Errr Message Unbserved Exceptin Vulnerability Exceptin Handling Best Practices Best Practices fr Cding Exceptins Safely D s and Dn ts in Exceptin Handling Guidelines fr Prper Exceptin Handling Errr Handling Security Checklists Auditing and Lgging Page 12 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
13 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline What is Lgging and Auditing? Need f Secure Lgging and Auditing Cmmn Threats t Lgging and Auditing What Shuld be Lgged? What Shuld NOT be Lgged? Where t Perfrm Event Lgging? Perfrming Lg Thrttling in ASP.NET Health Mnitring System Windws Event Lg Preventing Windws Event Lg frm Denial f Service Attack Securing Windws Event lg Preventing Rgue Administratrs frm Tampering with Windws Event Lgs Centralizing Lgging and Cnfiguring its Security Tracing in.net Writing Trace Output t Windws Event Lg Using EventLgTraceListener Auditing and Lgging Best Practices Tracing Security Cncerns and Recmmendatins Secure Auditing and Lgging Best Practices: Prtecting Lg Recrds Secure Auditing and Lgging Best Practices: Fixing the Lgs Auditing and Lgging Security Checklists.NET Lgging Tls Apache Fundatin s lg4net SmartInspect NLg Lgview4net.NET Lgging Tls Mdule 08:.NET Secure File Handling File Handling System.IO Namespace Classes Attacks n File and Its Defensive Techniques Path Traversal Attack Prtecting Path Traversal Attack Pssible Methds t Prevent Path Traversal Page 13 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
14 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Cannicalizatin Cannicalizatin Attack Prtecting the Applicatins against Cannicalizatin Attacks Securing Files Securing the Static Files Adding Rle Checks t File Access Securing File I/O frm Untrusted File Input Securing File I/O with Abslute Path Cnstrain File I/O by Cnfiguring Cde Access Security Plicy Securing User-Specified Files with FileIOPermissin Virtual Path Mapping Using MapPath Preventing Crss-Applicatin Mapping Using MapPath Validating File Names using GetFullPath Securing User Upladed Files File Extensin Handling Active Server Pages (ASP) Directry Listing Creating Directry Listing Islated Strage Islated Strage - Get Stre/ Open Stre Islated Strage Rt Lcatin Strage Files Islated Strage Example File Access Cntrl Lists (ACLs) File ACLs Required.NET Access Cntrl Lists (ACLs) Checklist fr Securely Accessing Files Mdule 09:.NET Cnfiguratin Management and Secure Cde Review Cnfiguratin Management ASP.NET Cnfiguratin Files ASP.NET Cnfiguratin File Mdel ASP.NET Cnfiguratin File Lcatins Cnfiguratin Management Threats Machine Cnfiguratin File Page 14 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
15 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline Machine Cnfiguratin File: Machine.cnfig Machine.cnfig Vulnerability Applicatin Cnfiguratin Files Applicatin Cnfiguratin File: Web.cnfig Web.cnfig Vulnerabilities: Default Errr Message Web.cnfig Vulnerabilities: Leaving Tracing Enabled in Web-Based Applicatins Web.cnfig Vulnerabilities: Leaving Debugging Enabled Web.cnfig Vulnerabilities: Ckies Accessible thrugh Client-Side Script Web.cnfig Vulnerabilities: Enabled Ckieless Sessin State Web.cnfig Vulnerabilities: Enabled Ckieless Authenticatin Web.cnfig Vulnerabilities: Failure t Require SSL fr Authenticatin Ckies Web.cnfig Vulnerabilities: Using Sliding Expiratin Web.cnfig Vulnerabilities: Using Nn-Unique Authenticatin Ckie Web.cnfig Vulnerabilities: Using Hardcded Credential Web.cnfig Vulnerabilities: Securing List-based Cntrls using EnableEventValidatin Web.cnfig Vulnerabilities: Securing Passwrds using PasswrdFrmat Web.cnfig Vulnerabilities: Changing Default Values f Membership Settings Web.cnfig Vulnerabilities: Securing Against XSS Attack Vulnerabilities Web.cnfig Vulnerabilities: Securing Against DS Attack Vulnerabilities Web.cnfig Vulnerabilities: Preventing ViewState frm Tampering Web.cnfig Vulnerabilities: Securing ViewState with SDL-apprved Cryptgraphic Algrithms Web.cnfig Vulnerabilities: Securing ViewState with Strng Validatin Key Web.cnfig Vulnerabilities: Securing ViewState using Encryptin Web.cnfig Vulnerabilities: Selecting Right Algrithm fr ViewState Encryptin Web.cnfig Vulnerabilities: Deplying Applicatin with Strng decryptin Key Web.cnfig Vulnerabilities: Ignring Validatin Errrs Applicatin Cnfiguratin Files: App.exe.cnfig App.exe.cnfig Vulnerabilities Cde Access Security Cnfiguratin Files Enterprise Plicy Cnfiguratin File: enterprisesec.cnfig Machine and User Plicy Cnfiguratin File: security.cnfig ASP. NET Plicy Cnfiguratin Files Page 15 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
16 EC-Cuncil Certified Secure Prgrammer Exam Curse Outline.NET Framewrk Cnfiguratin Tl: Mscrcfg.msc Mscrcfg.msc Features Cde Access Security Plicy Tl: Caspl.exe Cnfiguratin Management Best Practices Secure Cde Review Why Secure Cde Review? Security Cde Review Apprach Step 1: Identify Security Cde Review Objectives Step 2: Perfrm Preliminary Scan Step 3: Review Cde fr Security Issues Step 4: Review fr Security Issues Unique t the Architecture Static Cde Analysis Tls Parasft dttest Micrsft FxCp StyleCp NDepend ReSharper Page 16 EC-Cuncil Certified Secure Prgrammer Cpyright by EC-Cuncil All Rights Reserved. Reprductin Is Strictly Prhibited.
Citrix XenApp 6.5 Basic Administration
Citrix XenApp 6.5 Basic Administratin Descriptin: Days: 5 Prerequisites: Citrix XenApp 6.5 Basic Administratin training curse prvides the fundatin necessary fr administratrs t effectively centralize and
Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp
Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is
Avatier Identity Management Suite
Avatier Identity Management Suite AIMS Versin 9 System Requirements Versin 9 2603 Camin Ramn Suite 110 San Ramn, CA 94583 Phne: 800-609-8610 925-217-5170 FAX: 925-217-0853 Email: [email protected] Page
CNS-205: Citrix NetScaler 11 Essentials and Networking
CNS-205: Citrix NetScaler 11 Essentials and Netwrking Overview The bjective f the Citrix NetScaler 11 Essentials and Netwrking curse is t prvide the fundatinal cncepts and skills necessary t implement,
CXA-206-1 Citrix XenApp 6.5 Basic Administration
CXA-206-1 Citrix XenApp 6.5 Basic Administratin Citrix XenApp 6.5 Basic Administratin training curse prvides the fundatin necessary fr administratrs t effectively centralize and manage applicatins in the
CXA-300-1I: Advanced Administration for Citrix XenApp 5.0 for Windows Server 2008
CXA-300-1I: Advanced Administratin fr Citrix XenApp 5.0 fr Windws Server 2008 This curse prvides learners with the skills necessary t mnitr, maintain and trublesht netwrk envirnments running XenApp fr
ScaleIO Security Configuration Guide
ScaleIO Security Cnfiguratin Guide 1 Intrductin This sectin prvides an verview f the settings available in ScaleIO t ensure secure peratin f the prduct: Security settings are divided int the fllwing categries:
Extending Microsoft Dynamics CRM 2013 Online Training
Extending Micrsft Dynamics CRM 2013 Online Training Curse Outline Plan the deplyment f Micrsft Dynamics CRM Describe the Micrsft Dynamics CRM applicatin framewrk Describe the Micrsft Dynamics CRM extensibility
COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker.
COURSE DETAILS Intrductin t Ethical Hacking What is Hacking Wh is a Hacker Skills f a Hacker Types f Hackers Reasns fr Hacking Wh are at the risk f Hacking attacks Effects f Cmputer Hacking n an rganizatin
LogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide
LgMeIn Rescue Web SSO via SAML 2.0 LgMeIn Rescue Web SSO via SAML 2.0 Cnfiguratin Guide 02-19-2014 Cpyright 2015 LgMeIn, Inc. 1 LgMeIn Rescue Web SSO via SAML 2.0 Cntents 1 Intrductin... 3 1.1 Dcument
CXA-204-1I Basic Administration for Citrix XenApp 6
CXA-204-1I Basic Administratin fr Citrix XenApp 6 Basic Administratin fr Citrix XenApp 6 training curse prvides the fundatin necessary fr administratrs t effectively centralize and manage applicatins in
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Configuring, Managing and Maintaining Windows Server 2008 Servers MOC-6419
Cnfiguring, Managing and Maintaining Windws Server 2008 Servers MOC-6419 Curse Descriptin: This curse prvides students with the cre skills required t cnfigure, manage and maintain a Micrsft Windws Server
Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.
Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and
Cloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
Developing secure applications for Windows Phone. SecureApps user group meeting 12/11/2014
Develping secure applicatins fr Windws Phne SecureApps user grup meeting 12/11/2014 2 Overview Intrductin Windws n mbile devices Windws (Phne) 8.1 architecture Silverlight-based vs. WinRT-based apps WP
Integrating With incontact dbprovider & Screen Pops
Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint
The user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures.
Learn Basic Single Sign-On Authenticatin Tale s Basic SSO applicatin grants Learn access t users withut requiring that they enter authenticatin lgin credentials (username and passwrd). The access pint
WEB APPLICATION SECURITY TESTING
WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are
Server 2008 R2 - Generic - Case
Server 2008 R2 - Generic - Case Day 1 Task 1 Install the fllwing machines: DC01 Server2008 R2 Standard Editin WEB01 Server 2008 R2 Standard Editin WEB02 Server 2003 File01 Server 2008 R2 Standard Editin
MaaS360 Cloud Extender
MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument
Configuring SSL and TLS Decryption in ngeniusone
Cnfiguring SSL and TLS Decryptin in ngeniusone The cnfigure SSL Decryptin feature supprts real-time capture f ASI and ASR traffic flws as well as decding f Secure Scket Link (SSL) and Transprt Layer Security
Copyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.com/ We have attempted to make these documents complete, accurate, and
ii Cpyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.cm/ We have attempted t make these dcuments cmplete, accurate, and useful, but we cannt guarantee them t be perfect. When we
CNS-205 Citrix NetScaler 10.5 Essentials and Networking
CNS-205 Citrix NetScaler 10.5 Essentials and Netwrking Descriptin: The bjective f the Citrix NetScaler 10.5 Essentials and Netwrking curse is t prvide the fundatinal cncepts and advanced skills necessary
Installation Guide Marshal Reporting Console
Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling
Deployment Overview (Installation):
Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int
Pronestor Room & Catering
Prnestr Rm Prnestr Rm & Catering Mdule 1 Technical requirements & installatin - Prnestr Rm & Catering Page 1.0 1.5 A guide t all the necessary server preparatins fr the installatin f Prnestr Rm & Catering.
ISAM TO SQL MIGRATION IN SYSPRO
118 ISAM TO SQL MIGRATION IN SYSPRO This dcument is aimed at assisting yu in the migratin frm an ISAM data structure t an SQL database. This is nt a detailed technical dcument and assumes the reader has
Securely Managing Cryptographic Keys used within a Cloud Environment
Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta [email protected] 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin
Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008
Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,
GUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
SharePoint 2010 General Introduction Introduction to SharePoint SharePoint Installation and Administration SharePoint Site Hierarchy Website Email
Deccansft Sftware Services SharePint 2010 Syllabus SharePint 2010 General Intrductin What is IIS IIS Website & Web Applicatin Steps t Create Multiple Website n Prt 80 What is Applicatin Pl What is AppDmain
Helpdesk Support Tickets & Knowledgebase
Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate
CallRex 4.2 Installation Guide
CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex
Session 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
Nex-Gen Web Load Balancer
Nex-Gen Web Lad Balancer Pramati Enterprise prducts have served thusands f applicatins in many different verticals fr ver 10 years. Pramati Server was the first standards-based applicatin server t achieve
Serv-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U
SBClient and Microsoft Windows Terminal Server (Including Citrix Server)
SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance
How To Upgrade A Crptocard To A 6.4 Migratin Tl (Cpl) For A 6Th Generation Of A Crntl (Cypercoder) On A Crperd (Cptl) 6.
BlackShield ID Upgrade and Migratin Guide Fr CRYPTO-Server 6.4 Users Cpyright 2010 CRYPTOCard Inc. website: http://www.cryptcard.cm Trademarks CRYPTOCard and the CRYPTOCard lg are registered trademarks
Installation Guide Marshal Reporting Console
INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin
Mobile Device Manager Admin Guide. Reports and Alerts
Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview
Datasheet. PV4E Management Software Features
PV4E Management Sftware Features PV4E is a field prven cmprehensive slutin fr real-time cntrl ver netwrk infrastructure and devices The new and refreshed Graphic User Interface (GUI) is nw even mre attractive,
Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008
Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,
IMT Standards. Standard number A000014. GoA IMT Standards. Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical
IMT Standards IMT Standards Oversight Cmmittee Gvernment f Alberta Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical Standard number A000014 Electrnic Signature Metadata
COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015
A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY
Configuring BMC AREA LDAP Using AD domain credentials for the BMC Windows User Tool
Cnfiguring BMC AREA LDAP Using AD dmain credentials fr the BMC Windws User Tl Versin 1.0 Cnfiguring the BMC AREA LDAP Plugin fr Dmain Username and Passwrds Intrductin...3 LDAP Basics...4 What is LDAP and
IBM WPL93. Installation and Administration of IBM WebSphere Portal 8 on Linux
IBM WPL93. Installatin and Administratin f IBM WebSphere Prtal 8 n Linux This instructr led curse is designed fr system administratrs wh want t acquire r update their WebSphere Prtal administratin skills.
X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips
X7500 Series, X4500 Scanner Series MFPs: LDAP Address Bk and Authenticatin Cnfiguratin and Basic Trubleshting Tips Lexmark Internatinal 1 Prerequisite Infrm atin In rder t cnfigure a Lexmark MFP fr LDAP
Client Application Installation Guide
Remte Check Depsit Client Applicatin Installatin Guide Client Applicatin Installatin Guide Table f Cntents Minimum Client PC Requirements... 2 Install Prerequisites... 4 Establish a Trust t the Web Server...
Security Support in Mobile Platforms (part I) Vincent Naessens - MSEC
Security Supprt in Mbile Platfrms (part I) Vincent Naessens - MSEC Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device
Uninstalling and Reinstalling on a Server Computer. Medical Director / PracSoft
Uninstalling and Reinstalling n a Server Cmputer Medical Directr / PracSft This guide describes the prcess fr uninstalling and then reinstalling Medical Directr, PracSft, and/r SQL Instances n a cmputer
McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8
McAfee Enterprise Security Manager Data Surce Cnfiguratin Guide Data Surce: Infblx NIOS September 2, 2014 Infblx NIOS Page 1 f 8 Imprtant Nte: The infrmatin cntained in this dcument is cnfidential and
NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 170 - MULTIMEDIA SOFTWARE (3 CR.)
Revised 8/2012 NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 170 - MULTIMEDIA SOFTWARE (3 CR.) Curse Descriptin Explres technical fundamentals f creating multimedia prjects with related hardware and sftware.
Microsoft Certified Database Administrator (MCDBA)
Micrsft Certified Database Administratr (MCDBA) 460 hurs Curse Overview/Descriptin The MCDBA prgram and credential is designed fr individuals wh want t demnstrate that they have the necessary skills t
2. When logging is used, which severity level indicates that a device is unusable?
Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages
E-Biz Web Hosting Control Panel
1 f 38 E-Biz Web Hsting Cntrl Panel This dcument has been created t give yu a useful insight in t the Hsting Cntrl Panel available with E-Biz hsting services. Please nte: Optins available are dependent
Enterprise Security Management CIS 259
Enterprise Security Management CIS 259 Prerequisites CIS 175 Descriptin This curse is designed t cver the managerial aspects f cmputer security and risk management fr enterprises. The student will attain
STIOffice Integration Installation, FAQ and Troubleshooting
STIOffice Integratin Installatin, FAQ and Trubleshting Installatin Steps G t the wrkstatin/server n which yu have the STIDistrict Net applicatin installed. On the STI Supprt page at http://supprt.sti-k12.cm/,
Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
Instant Chime for IBM Sametime Quick Start Guide
Instant Chime fr IBM Sametime Quick Start Guide Fall 2014 Cpyright 2014 Instant Technlgies. All rights reserved. Cpyright and Disclaimer This dcument, as well as the sftware described in it, is furnished
PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers
PENNSYLVANIA SURPLUS LINES ASSOCIATION Electrnic Filing System (EFS) Frequently Asked Questins and Answers 1 What changed in Release 2.0?...2 2 Why was my accunt disabled?...3 3 Hw d I inactivate an accunt?...4
State of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
Ensuring end-to-end protection of video integrity
White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring
Implementation Guide for PCI Compliance. Microsoft Dynamics AX 2012 R3
Implementatin Guide fr PCI Cmpliance Micrsft Dynamics AX 2012 R3 April 2014 Micrsft Dynamics is a line f integrated, adaptable business management slutins that enables yu and yur peple t make business
Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Web Applications and Data Servers
Ethical Hacking & Cuntermeasure Specialist Curse Title: Ethical Hacking & Cuntermeasure Specialist: Web Applicatins and Data Servers Page 1 f 15 Web Applicatins and Data Servers Cpyright by EC-Cuncil All
Interworks Cloud Platform Citrix CPSM Integration Specification
Citrix CPSM Integratin Specificatin Cntents 1. Intrductin... 2 2. Activatin f the Integratin Layer... 3 3. Getting the Services Definitin... 4 3.1 Creating a Prduct Type per Lcatin... 5 3.2 Create Instance
BackupAssist SQL Add-on
WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system
Junos Pulse Instructions for Windows and Mac OS X
Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.
JAVA/J2EE Course Syllabus
JAVA/J2EE Curse Syllabus Intrductin t Java What is Java? Backgrund/Histry f Java The Internet and Java's place in it Java Virtual Machine Byte cde - nt an executable cde Prcedure-Oriented vs. Object-Oriented
The Acunetix Web Vulnerability Scanner
The Acunetix Web Vulnerability Scanner Website security is pssibly tday's mst verlked aspect f securing the enterprise and shuld be a pririty in any rganizatin. Increasingly, hackers are cncentrating their
HIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
TechAge Labs Pvt. Ltd. Address : C-46, GF, Sector 2, Noida Phone 1 : 0120-4540894 Phone 2 : 0120-6495333. MagentoTraining
Magent Training TechAge Labs Pvt. Ltd. Address : C-46, GF, Sectr 2, Nida Phne 1 : 0120-4540894 Phne 2 : 0120-6495333 TechAge Labs 2014 versin 1.0 MagentTraining Magent Training Curse Chapter 1 Cre Develpment
Learn More Cloud Extender Requirements Cheat Sheet
MaaS360.cm > Learn Mre Learn Mre Clud Extender Requirements Cheat Sheet OVERVIEW This dcument defines all requirements t ensure a successfully installatin f the Clud Extender t enable use f ActiveSync
Click Studios. Passwordstate. RSA SecurID Configuration
Passwrdstate RSA SecurID Cnfiguratin This dcument and the infrmatin cntrlled therein is the prperty f Click Studis. It must nt be reprduced in whle/part, r therwise disclsed, withut prir cnsent in writing
CryptoMate64. USB Cryptographic Token. Technical Specifications V1.03. Subject to change without prior notice. [email protected] www.acs.com.
CryptMate64 USB Cryptgraphic Tken Technical Specificatins V1.03 Subject t change withut prir ntice [email protected] www.acs.cm.hk Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 2.1. Cryptgraphic
Planning, Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Environment for an MCSE on Windows 2000 Course No.
Micrsft Windws Server 2003 Envirnment fr an MCSE n Windws 2000 Curse N. MS2297 5 Days COURSE OVERVIEW This five-day, instructr-led curse prvides students with the knwledge and new skills that they need
