Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Linux, Macintosh and Mobile Systems

Size: px
Start display at page:

Download "Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Linux, Macintosh and Mobile Systems"

Transcription

1 Ethical Hacking & Cuntermeasure Specialist Curse Title: Ethical Hacking & Cuntermeasure Specialist: Linux, Macintsh and Mbile Systems Page 1 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

2 Ethical Hacking & Cuntermeasure Specialist Curse Descriptin This certificatin cvers a plethra f ffensive security tpics ranging frm hw perimeter defenses wrk t scanning and attacking the simulated netwrks. A wide variety f tls, viruses, and malware is presented in this and the ther fur bks, prviding a cmplete understanding f the tactics and tls used by hackers. By gaining a thrugh understanding f hw hackers perate, an Ethical Hacker will be able t set up strng cuntermeasures and defensive systems t prtect an rganizatin's critical infrastructure and infrmatin. CertificateInf Ethical Hacking & Cuntermeasure Specialist: Linux, Macintsh and Mbile Systems Wh Shuld Attend This curse will significantly benefit security fficers, auditrs, security prfessinals, site administratrs, and anyne wh is cncerned abut the integrity f the netwrk infrastructure. Curse Duratin 2 days (9:00AM 5:00PM) CPE/ECE Qualificatin 16 ECE Credits awarded fr attendance (1 fr each classrm hur) Suggested Retail: $799 USD Page 2 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

3 Ethical Hacking & Cuntermeasure Specialist Required Curseware: Visit and click n Training Wrkshps fr rdering details. What s included? Physical Curseware 1 year Access T EC-Cuncil Student LMS fr Practical Labs (if applicable), testing, and Certificate Curse + Supplement Cst: See the Training Wrkshps sectin at fr current pricing infrmatin. Related Certificates: Ethical Hacking & Cuntermeasure Specialist: Attack Phases Ethical Hacking and Cuntermeasures: Threats and Defense Mechanisms Ethical Hacking and Cuntermeasures: Web Applicatins and Data Servers Ethical Hacking and Cuntermeasures: Secure Netwrk Infrastructures Page 3 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

4 Ethical Hacking & Cuntermeasure Specialist Curse Briefing 1. Linux Hacking Chapter Brief: The advent f Linux was the true genesis f the pen surce mvement. Backed by prgrammers wh believed in breaking away frm the prprietary mvement fr the right reasns, Linux made inrads int the crprate wrld cmputing. While Linux has evlved t a rbust perating system, the cmplex structure f Linux paves the way fr the security-related threats. Tday, several servers arund the glbe are hsted n the Linux servers. One f the primary reasns behind this is the inherent security ffered by the platfrm. Hwever, tday there is as much vulnerability in Linux as in prprietary systems leading t their cmprmise by attackers. This mdule deals with hacking n the Linux Operating System. It explains the basic cmmands in Linux, Linux file structure, and Linux security and vulnerabilities. It shws the Linux IP chains, Linux Rtkits, and Linux intrusin detectin systems. It lists the Linux hacking tls and the security cuntermeasures. 2. Mac OS X Hacking Chapter Brief: Mac OS X is a develpment platfrm, bringing a 32-bit and 64-bit architecture and multiprcessr capability t the desktp and server arenas. It prvides a prductive prgramming envirnment in Cca, the full pwer f real UNIX, and a hst f pen surce web, scripting, database, and develpment technlgies. MAC OS X may be hacked using the vulnerabilities in the perating system. This mdule explains abut Macintsh perating system, vulnerabilities in MAC OS X such as Crafted URL, CreText Uninitialized Pinter, ImageIO Integer verflw, DirectryService, ichat UPnP buffer verflw, and hw they can be used t hack the OS. The mdule als discusses viruses and wrms that may affect the perating system. MAC OS X security tls DrStp X Firewall, Integ NetBarrier, Integ CntentBarrier and Flying Buttress are presented in this mdule. These security tls and cunter measures prevent an attacker frm attacking. 3. Hacking Ruters, Cable Mdems, and Firewalls Chapter Brief: Cmputer netwrking devices transfer the data frm ne cmputer in a netwrk t anther.. The netwrk devices include ruters, cable mdems, firewalls, etc. The attacker may try t hack the netwrk devices t snp n the infrmatin being transferred n the netwrk. This mdule intrduces the cmputer netwrking devices such as Ruter, mdems, and cables and explains hw an attacker hacks them. This mdule explains the different vulnerabilities in the ruter and hw t explit these vulnerabilities. After cmpletin f this mdule, yu wuld have an idea abut hw t cllect the ruter passwrd by using different passwrd cracking tls. The mdule als deals with different ruter attacks, hw they ccur, and hw t prevent them. Page 4 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

5 Ethical Hacking & Cuntermeasure Specialist 4. Hacking Mbile Phnes, PDAs, and Handheld Devices Chapter Brief: With individuals and rganizatins increasingly reliant n the handheld devices fr cmmunicatin and business, the threat t these devices nly grws. Mbile malware has seen pandemic increase in the recent years. The malware is aimed at sabtage and financial gain. These attacks finally can lead t denial f mbile resurces, data theft r destructin, and fraud. This mdule discusses abut hacking varius types f mbile devices such as BlackBerry, PDA, ipd, and iphne. This mdule als talks abut the perating systems used in mbile phnes. This mdule explains abut the threats t mbile devices, vulnerabilities in the mbile devices, and attacks against mbile devices. It als intrduces PDA security tls which are used t prevent mbile attacks. 5. Bluetth Hacking Chapter Brief: Bluetth is ne f the applicatins that help the cell phne users share/ send the infrmatin frm ne cell phne t the ther irrespective f the service prvider. It is a feature that is getting ppular and being widely used by every cmmn man in their rutine. As it is widely used, the vulnerabilities in it are explited t attack the device. The mdule Bluetth Hacking explains abut the different ways that a Bluetth device can be hacked and the security measures t prevent the devices frm being hacked. It explains the different techniques that can be used t attack Bluetth devices (Example: Bluejacking, BlueSpam, BlueSnarfing, BlueBug Attack, Blueprinting and mre). It lists the tls that are used t hack the Bluetth devices. This mdule discusses the wrms and viruses that can be used t infect the Bluetth devices. 6. RFID Hacking Chapter Brief: Radi Frequency Identificatin (RFID) is a system that transmits the identity f an bject using radi waves. The identity f the bjects is stred and retrieved using RFID tags and transpnders. It transmits the identity f the bjects in the frm f a unique serial number with the help f radi waves. This mdule describes RFID technlgy, the different cmpnents f RFID and their cllisins, RFID risks such as Business Prcess Risk, Business Intelligence Risk, Privacy Risk and Externality Risk, privacy issues f RFID. This mdule discusses RFID security and privacy threats and hw t prtect against RFID attacks. Writing a simple but pwerful RFID virus and wrm are shwcased in this mdule. The mdule als discusses the vulnerabilities in RFID-enabled credit cards and RFID security cntrls. 7. Hacking USB Devices Chapter Brief: Universal Serial Bus (USB) flash drives are remvable and rewritable devices. These devices can be cnnected r discnnected if the system is running as they are pluggable. This mdule discusses abut USB devices and hw they affect privacy. The mdule discusses electrical and sftware attacks, USB Attack n Windws, viruses, and wrms which spread thrugh USB devices. The tls that help in hacking USB devices are discussed. The mdule als talks abut tls such as MyUSBnly, USBDeview, USB-Blcker, USB CpyNtify, USB File Page 5 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

6 Ethical Hacking & Cuntermeasure Specialist Guard, and Advanced USB Prt Mnitr that help t prtect privacy and lists cuntermeasures t prevent the devices frm being hacked. Page 6 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

7 Ethical Hacking & Cuntermeasure Specialist Curse Outline Hacking Bk 4: Linux, Macintsh and Mbile Systems Chapter 1: Linux Hacking Case Example Cmmn Terminlgy Intrductin t Linux Hacking Linux Distributins Linux Basics Linux LiveCDs Files and Directries File System Linux Basic Cmmands Linux Netwrking Cmmands Directries in Linux Linux Kernel Installing. Cnfiguring. and Cmpiling Linux Kernel Hw t Install a Kernel Patch Cmpiling Prgrams in Linux GNU Cmpiler Cllectin (GCC) Cmpiler GCC Cmmands Make Files Make Install Cmmand Linux Vulnerabilities Linux Security chrting Limitatins f chrting Linux Vulnerabilities Linux Kernel BER Decding Remte Buffer Overflw Vulnerability Why Is Linux Hacked? GRUB Btlader Hw t Hack Rt Passwrd in Linux LILO Btlader Steps t Hack Rt Passwrd in Linux Linux Hacking Tls Scanning Netwrks Page 7 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

8 Ethical Hacking & Cuntermeasure Specialist Tl: Nessus Prt Scan Detectin Tls Passwrd Cracking in Linux Tl: Jhn the Ripper Firewall in Linux: IPTables Hw IPTables Wrks Netfilter IPTables Cmmand Basic Linux Operating System Defense Tcpdump Hping2 Linux Ladable Kernel Mdules Tl: Chkrtkit Linux Security Tls Linux Tls: Applicatin Security Advanced Intrusin Detectin Envirnment (AIDE) EnGarde Secure Linux EnGarde Secure Linux: Secure Shell Cnfiguratin EnGarde Secure Linux: Attack Graph AppArmr Strbe Encryptin Lg and Traffic Mnitrs Linux Security Auditing Tl (LSAT) Linux Security Cuntermeasures Best Practices Steps fr Hardening Linux Issues with Open Surce Linux Linux Security Checklist Chapter 2: Mac OS X Hacking Case Example Intrductin t Mac OS X Hacking Intrductin t Mac OS Vulnerabilities in MAC OS MAC OS X Vulnerabilities and Slutin Statistics Apple QuickTime Buffer Overflw Vulnerability Page 8 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

9 Ethical Hacking & Cuntermeasure Specialist Apple Mac OS X Pixlet Vide Handling Remte Cde Executin Vulnerability Heap-based Buffer Overflw Vulnerability in ClrSync Prfile Apple ImageIO EXIF Metadata Buffer Overflw Vulnerability Apple Mac OS X MbileMe Sessin Hijack Vulnerability Apple Mac OS X AppleTalk Kernel Buffer Overflw Vulnerability Apple Mac OS X Remte Apple Events Out f Bunds Memry Access Security Vulnerability Crafted URL Vulnerability CreText Uninitialized Pinter Vulnerability ImageIO Integer verflw Vulnerability DirectryService Vulnerability ichat UPnP Buffer Overflw Vulnerability ImageIO Memry Crruptin Vulnerability Cde Executin Vulnerability UFS Filesystem Integer Overflw Vulnerability Kernel "fpathcnf()" System call Vulnerability UserNtificatinCenter Privilege Escalatin Vulnerability Other Vulnerabilities in MAC Hw a Malfrmed Installer Package Can Crack Mac OS X Demnstrated Damage Wrms, Viruses, and Trjans in MAC OS X MAC OS X Threats Trjan: OSX/Jahlav-C OSX/iWrkS-A OSX.Trjan.iServices.A Wrm: OSX/Tred.A OSX/Leap-A Inqtana.A: F-Secure Wrm n OS X Preventive Measures fr OSX Inqtana.A Viruses in MAC: Macr Viruses Antivirus Applicatins in Mac OS X Mac OS X Security Tls DrStp X Firewall Integ NetBarrier Integ CntentBarrier Flying Buttress Page 9 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

10 Ethical Hacking & Cuntermeasure Specialist Cuntermeasures Chapter 3: Hacking Ruters, Cable Mdems, and Firewalls Intrductin t Hacking Ruters, Cable Mdems, and Firewalls Ruters Cable Characteristics: Netwrking Cables Types f Twisted Pair Cable Types f Caxial Cables Types f Fiber Optic Cables Cable Mdems Media Cnnectrs Cncentratrs Repeaters and Hubs Mdems Multiplexers Gateways Patch Panel Switch Firewalls Security Features f Firewall Sftware and Hardware Firewall Difference between Hardware and Sftware Firewalls Types f Firewalls: IP Packet Filters Circuit Level Gateway Applicatin Level Firewalls Stateful Multilayer Inspectin Firewall Netwrk Security Sftware Types f Ruter Attacks Ruter Attack Tplgy Denial f Service (DS) Attacks Packet Mistreating Attacks Ruting Table Pisning Flding Hit-and-run Attacks vs. Persistent Attacks Tls Yersinia fr HSRP, CDP, and Other Layer 2 Attacks Page 10 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

11 Ethical Hacking & Cuntermeasure Specialist Cisc Trch Cracking the Enable Passwrd Tl: Jhn the Ripper Cain and Abel Chapter 4: Hacking Mbile Phnes, PDAs, and Handheld Devices Intrductin t Hacking Mbile Phnes, PDAs, and Handheld Devices Types f Handheld Devices Cmmn Operating Systems in Handheld Devices Threats t Mbile Devices Vulnerabilities in Handheld Devices Vulnerabilities in Different Mbile Phnes Malware Symbs_Lcknut.B Spyware SymbOS/Htl-SMSSender.A.intd SymbOS/MultiDrpper.CG Warm: SYMBOS_CABIR.A Wrm: Symb/Cabir-A Trjan: SymbOS.Sendtl.A SMS.Pythn.Flcker Best Practices Against Malware Hacking Handheld Devices Persnal Digital Assistant (PDA) PDA Security Issues ActiveSync Attacks HtSync Attack PDA Virus: Bradr PDA Security Tls: TigerSuite PDA PDA Security Tls: SecuBx fr Pcket PC SecuWipe fr Pcket PC Trend Micr Mbile Security avast! PDA Editin Cellcrypt Page 11 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

12 Ethical Hacking & Cuntermeasure Specialist Security Plicies fr PDAs PDA Attack Cuntermeasures Defending Handheld Devices ipd Misuse f ipd Jailbreaking Tl fr Jailbreaking: idemcracy iactivatr Chapter 5: Bluetth Hacking Intrductin t Bluetth Bluetth Security Issues Bluetth Attacks Bluejacking Steps fr Bluejacking in Mbile Phnes Bluesniff BlueSpam BlueSnarfing BlueBug Attack Bluestab (Denial-f-Service Attack) Blueprinting Bluesmacking - The Ping f Death Bluecasting BlueDump Attack BlueBump Bluechp Bluetne BlueSniper BTViceBugging Attack Shrt Pairing Cde Attacks Man-in-the-Middle Attack OnLine PIN Cracking Attack BTKeylgging Attack Fuzzing Attacks Bluetth Hacking Tls Viruses and Wrms Page 12 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

13 Ethical Hacking & Cuntermeasure Specialist Bluetth Security Tls Bluesnarfer BTCrawler Bluediving TBEAR - Transient Bluetth Envirnment auditr BTBrwser BTCrack BTScanner Hidattack BlueAlert and BlueFish Prximity HaraldScan BlueWatch Other BT Hacking Tls Cuntermeasures Chapter 6: RFID Hacking Case Example Intrductin t RFID Hacking RFID (Radi Frequency Identificatin) RFID Frequency Bands Cmpnents f RFID Systems A Simple RFID System Wrking f an RFID Challenges in RFID Deplyment Steps fr RFID Deplyment RFID Applicatins RFID Cllisins RFID Risks Business Prcess Risk Business Intelligence Risk Privacy Risk Externality Risk RFID and Privacy Issues RFID Security and Privacy Threats Cuntermeasures Used t Avid RFID Attacks RFID Security and Privacy Threats Page 13 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

14 Ethical Hacking & Cuntermeasure Specialist Sniffing Tracking Spfing Replay Attacks Denial-f-service Generic Attack Virus Attacks Hw t Write an RFID Virus Hw t Write an RFID Wrm RFID Malware Defenses Against RFID Malware RFID Explits Vulnerabilities in RFID-Enabled Credit Cards RFD Hacking Tl RFID Security Cntrls Management Cntrls Operatinal Cntrls Technical Cntrls RFID Security Chapter 7: Hacking USB Devices Case Example Intrductin t Hacking USB Devices Intrductin t USB Devices USB Attacks Electrical Attack Sftware Attack USB Attack n Windws Viruses and Wrms Virus: W32/Madang-Fam VBS/Repvblik-A Wrm: W32/Hasnt-A W32/Uisgn-A W32/Fujacks-AK W32/Fujacks-E Page 14 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

15 Ethical Hacking & Cuntermeasure Specialist W32/Dzan-C W32/SillyFD-AA W32/SillyFDC-BK W32/SillyFDC-W W32/LiarVB-A W32/Hairy-A W32/QQRb-ADN W32/VBAut-B W32/Titua-G HTTP W32.Drm W32/VB-DWC W32/Bdr-AEE Mal/Cnficker-A Hacking Tls USBSecure Prfessinal MyUSBnly USBDeview USB Blcker USB CpyNtify Remra USB File Guard Advanced USB Prt Mnitr Flder Passwrd Expert USB USBlyzer USB PC Lck Pr Virus Chaser USB uhk Persnal Cuntermeasures Page 15 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.

COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker.

COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker. COURSE DETAILS Intrductin t Ethical Hacking What is Hacking Wh is a Hacker Skills f a Hacker Types f Hackers Reasns fr Hacking Wh are at the risk f Hacking attacks Effects f Cmputer Hacking n an rganizatin

More information

Cisco IT Essentials v4.1. Course Overview. Total Hours: 240

Cisco IT Essentials v4.1. Course Overview. Total Hours: 240 PC Hardware and Sftware Teacher Resurce Cisc Essentials v4.1 Curse Overview Ttal Hurs: 240 Fundamental Chapters 1-10 Chapter 1: Intrductin t the Persnal Cmputer Hurs: 14.00 Gal: Chapter 2: The chapter

More information

Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Web Applications and Data Servers

Ethical Hacking & Countermeasure Specialist. Course Title: Ethical Hacking & Countermeasure Specialist: Web Applications and Data Servers Ethical Hacking & Cuntermeasure Specialist Curse Title: Ethical Hacking & Cuntermeasure Specialist: Web Applicatins and Data Servers Page 1 f 15 Web Applicatins and Data Servers Cpyright by EC-Cuncil All

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

CNS-205: Citrix NetScaler 11 Essentials and Networking

CNS-205: Citrix NetScaler 11 Essentials and Networking CNS-205: Citrix NetScaler 11 Essentials and Netwrking Overview The bjective f the Citrix NetScaler 11 Essentials and Netwrking curse is t prvide the fundatinal cncepts and skills necessary t implement,

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

Microsoft Certified Database Administrator (MCDBA)

Microsoft Certified Database Administrator (MCDBA) Micrsft Certified Database Administratr (MCDBA) 460 hurs Curse Overview/Descriptin The MCDBA prgram and credential is designed fr individuals wh want t demnstrate that they have the necessary skills t

More information

A Beginner s Guide to Building Virtual Web Servers

A Beginner s Guide to Building Virtual Web Servers A Beginner s Guide t Building Virtual Web Servers Cntents Intrductin... 1 Why set up a web server?... 2 Installing Ubuntu 13.04... 2 Netwrk Set Up... 3 Installing Guest Additins... 4 Updating and Upgrading

More information

Chapter - 3. Cable Connections

Chapter - 3. Cable Connections Chapter - 3 Cable Cnnectins One bradband alternative is thrugh cable TV, where yur Internet cnnectin is delivered t yur hme thrugh yur televisin cable. Many cable prviders wn't qute yu an exact speed,

More information

Completing the CMDB Circle: Asset Management with Barcode Scanning

Completing the CMDB Circle: Asset Management with Barcode Scanning Cmpleting the CMDB Circle: Asset Management with Barcde Scanning WHITE PAPER The Value f Barcding Tday, barcdes are n just abut everything manufactured and are used fr asset tracking and identificatin

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

Understand Business Continuity

Understand Business Continuity Understand Business Cntinuity Lessn Overview In this lessn, yu will learn abut: Business cntinuity Data redundancy Data availability Disaster recvery Anticipatry Set What methds can be emplyed by a system

More information

CNS-205 Citrix NetScaler 10.5 Essentials and Networking

CNS-205 Citrix NetScaler 10.5 Essentials and Networking CNS-205 Citrix NetScaler 10.5 Essentials and Netwrking Descriptin: The bjective f the Citrix NetScaler 10.5 Essentials and Netwrking curse is t prvide the fundatinal cncepts and advanced skills necessary

More information

CSC 421 COURSE COMPACT

CSC 421 COURSE COMPACT CSC 421 COURSE COMPACT Curse Cde: CSC 421 Curse Title: Cmputer Security Status: Cmpulsry Curse Unit: 2 Cntact Details Lecturer s Data Lecture perid: Tw hurs lectures per week fr 15 weeks (30 hurs) Name:

More information

Securely Managing Cryptographic Keys used within a Cloud Environment

Securely Managing Cryptographic Keys used within a Cloud Environment Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta [email protected] 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin

More information

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

City of Dublin Education & Training Board. Programme Module for. Network Security. leading to. Level 6 QQI. Network Security 6N0720

City of Dublin Education & Training Board. Programme Module for. Network Security. leading to. Level 6 QQI. Network Security 6N0720 City f Dublin Educatin & Training Bard City f Dublin Educatin & Training Bard Prgramme Mdule fr Netwrk Security leading t Level 6 QQI Netwrk Security 6N0720 Netwrk Security 6N0720 City f Dublin Educatin

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

CallRex 4.2 Installation Guide

CallRex 4.2 Installation Guide CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex

More information

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

FINRA Regulation Filing Application Batch Submissions

FINRA Regulation Filing Application Batch Submissions FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s

More information

ABELMed Platform Setup Conventions

ABELMed Platform Setup Conventions ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require

More information

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2. Oracle s Hyperin Data Integratin Management Release 9.2.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 Intrductin t Data Integratin Management... 1 Data Integratin Management Adapters...

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

Mobile Device Manager Admin Guide. Reports and Alerts

Mobile Device Manager Admin Guide. Reports and Alerts Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview

More information

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is

More information

Ten Steps for an Easy Install of the eg Enterprise Suite

Ten Steps for an Easy Install of the eg Enterprise Suite Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid

More information

1)What hardware is available for installing/configuring MOSS 2010?

1)What hardware is available for installing/configuring MOSS 2010? 1)What hardware is available fr installing/cnfiguring MOSS 2010? 2 Web Frnt End Servers HP Prliant DL 380 G7 2 quad cre Intel Xen Prcessr E5620, 2.4 Ghz, Memry 12 GB, 2 HP 146 GB drives RAID 5 2 Applicatin

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

CLOUD ENABLED CLOUD ENABLED

CLOUD ENABLED CLOUD ENABLED Asia s st 1 and Only Cmpany t Offer Bradest Prtfli f Clud trainings. Clud Architect: Duratin 5 Days Abut Us: Clud Enabled is Asia's First and nly Cmpany t ffer the Bradest prtfli f clud trainings. Clud

More information

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is

More information

Copyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.com/ We have attempted to make these documents complete, accurate, and

Copyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.com/ We have attempted to make these documents complete, accurate, and ii Cpyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.cm/ We have attempted t make these dcuments cmplete, accurate, and useful, but we cannt guarantee them t be perfect. When we

More information

Help Desk Level Competencies

Help Desk Level Competencies Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar

More information

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents Level 1 Technical RealPresence Web Suite and Web Suite Pr Cntents 1 - Glssary... 2 2 Features... 3 RealPresence Platfrm integratin... 3 RealPresence Web Suite Sftware... 3 Sftware Keys... 3 3 - Web Client

More information

Configuring an Email Client for your Hosting Support POP/IMAP mailbox

Configuring an Email Client for your Hosting Support POP/IMAP mailbox Cnfiguring an Email Client fr yur Hsting Supprt POP/IMAP mailbx This article lists the email settings and prt numbers fr pp and imap cnfiguratins, as well as fr SSL. It cntains instructins fr setting up

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

Deploy Your First Cloud Foundry App to Any Cloud Foundry Service Provider

Deploy Your First Cloud Foundry App to Any Cloud Foundry Service Provider Deply Yur First Clud Fundry App t Any Clud Fundry Service Prvider cludwrkshp.rg/cludfundry Presenter: Develper Advcate, Redis Labs @davenielsen Oct 2015 [email protected] twitter.cm/davenielsen linkedin.cm/in/dnielsen

More information

Configuring, Managing and Maintaining Windows Server 2008 Servers MOC-6419

Configuring, Managing and Maintaining Windows Server 2008 Servers MOC-6419 Cnfiguring, Managing and Maintaining Windws Server 2008 Servers MOC-6419 Curse Descriptin: This curse prvides students with the cre skills required t cnfigure, manage and maintain a Micrsft Windws Server

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Network Security Monitoring: Beyond Intrusion Detection. By: rewtninja

Network Security Monitoring: Beyond Intrusion Detection. By: rewtninja Netwrk Security Mnitring: Beynd Intrusin Detectin By: rewtninja Agenda Overview f NSM Benefits f NSM NSM vs IDS Limitatins f NSM Free slutins fr implementing NSM DEMO Whami? Security enthusiast SecOps

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure

More information

Implementing CiscoWorks LMS

Implementing CiscoWorks LMS Implementing CiscWrks LMS Curse CWLMS v4.0; 5 Days, Instructr-led Curse Descriptin Implementing CiscWrks LMS (CWLMS) v4.0 teaches learners hw t use the CiscWrks LAN Management Slutin (LMS) 4.0 t manage

More information

Security in Business and Applications. Madison Hajeb Stefan Hurst Benjamin Von Slade

Security in Business and Applications. Madison Hajeb Stefan Hurst Benjamin Von Slade Security in Business and Applicatins Madisn Hajeb Stefan Hurst Benjamin Vn Slade Intrductin Prject Cncept - Implement security in a small business setting Original Plan - D sme security audits fr small

More information

CXA-206-1 Citrix XenApp 6.5 Basic Administration

CXA-206-1 Citrix XenApp 6.5 Basic Administration CXA-206-1 Citrix XenApp 6.5 Basic Administratin Citrix XenApp 6.5 Basic Administratin training curse prvides the fundatin necessary fr administratrs t effectively centralize and manage applicatins in the

More information

The Organizational NOS (Network Operating System)

The Organizational NOS (Network Operating System) The Organizatinal NOS ( Operating System) [email protected] Nvember 2008 The Organizatinal NOS Executive Summary perating systems (perating systems designed and develped fr netwrking devices

More information

The ADVANTAGE of Cloud Based Computing:

The ADVANTAGE of Cloud Based Computing: The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages

More information

MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING

MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING JULY, 2014 The infrmatin cnveyed in this dcument is cnfidential and prprietary t Mitel and is intended slely fr Mitel emplyees

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

How do I evaluate the quality of my wireless connection?

How do I evaluate the quality of my wireless connection? Hw d I evaluate the quality f my wireless cnnectin? Enterprise Cmputing & Service Management A number f factrs can affect the quality f wireless cnnectins at UCB. These include signal strength, pssible

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

Citrix XenApp 6.5 Basic Administration

Citrix XenApp 6.5 Basic Administration Citrix XenApp 6.5 Basic Administratin Descriptin: Days: 5 Prerequisites: Citrix XenApp 6.5 Basic Administratin training curse prvides the fundatin necessary fr administratrs t effectively centralize and

More information

FAQs for Webroot SecureAnywhere Identity Shield

FAQs for Webroot SecureAnywhere Identity Shield FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt

More information

IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH)

IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH) IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH) COURSE DESCRIPTION: SWITCH includes extensive hands-n labs t help yu learn t plan, cnfigure, and verify the implementatin f cmplex enterprise switching

More information

Organisational self-migration guide an overview V1-5 April 2014

Organisational self-migration guide an overview V1-5 April 2014 Organisatinal self-migratin guide an verview V1-5 April 2014 Cpyright 2013, Health and Scial Care Infrmatin Centre. 1 Self Migratin t NHSmail an verview fr rganisatins Cntents Intrductin 3 1. Initial preparatins

More information

Troubleshooting Cisco Unified Communications

Troubleshooting Cisco Unified Communications Trubleshting Cisc Unified Cmmunicatins Curse TVOICE v8.0; 5 Days, Instructr-led Curse Descriptin: Trubleshting Cisc Unified Cmmunicatins (TVOICE) v8.0 prepares netwrk prfessinals with the knwledge and

More information

How To Upgrade A Crptocard To A 6.4 Migratin Tl (Cpl) For A 6Th Generation Of A Crntl (Cypercoder) On A Crperd (Cptl) 6.

How To Upgrade A Crptocard To A 6.4 Migratin Tl (Cpl) For A 6Th Generation Of A Crntl (Cypercoder) On A Crperd (Cptl) 6. BlackShield ID Upgrade and Migratin Guide Fr CRYPTO-Server 6.4 Users Cpyright 2010 CRYPTOCard Inc. website: http://www.cryptcard.cm Trademarks CRYPTOCard and the CRYPTOCard lg are registered trademarks

More information

RSA SecurID Software Token Security Best Practices Guide. Version 3

RSA SecurID Software Token Security Best Practices Guide. Version 3 RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg

More information

Network Layout. Browser/Client Requirements. Features. Graphics

Network Layout. Browser/Client Requirements. Features. Graphics Technical Specificatin Sheet Dcument N. 149-1000T April 08, 2016 BACnet Field Panel Web Server with Applicatin MC and Kisk Mde Graphics shw the mechanical equipment with relevant live pint update infrmatin.

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin

More information

Remote Desktop Tutorial. By: Virginia Ginny Morris

Remote Desktop Tutorial. By: Virginia Ginny Morris Remte Desktp Tutrial By: Virginia Ginny Mrris 2008 Remte Desktp Tutrial Virginia Ginny Mrris Page 2 Scpe: The fllwing manual shuld accmpany my Remte Desktp Tutrial vide psted n my website http://www.ginnymrris.cm

More information

Diagnosis and Troubleshooting

Diagnosis and Troubleshooting Diagnsis and Trubleshting DataDirect Cnnect Series ODBC Drivers Intrductin This paper discusses the diagnstic tls that are available t cnfigure and trublesht yur ODBC envirnment and prvides a trubleshting

More information

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise Slutin Brief Aerhive and Impulse Pwerful Netwrk Security fr Educatin and Enterprise Aerhive and Impulse Intrductin In tday s highly cnnected rganizatins, end users expect secure Wi-Fi access acrss the

More information

Alexsys Team 2 Service Desk

Alexsys Team 2 Service Desk Alexsys Team 2 Service Desk An affrdable fully interactive Service Desk that wrks seamlessly with Alexsys Team The Alexsys Team 2 Service Desk is an add-n prduct fr Alexsys Team 2 that prvides fully interactive

More information

OnX is uniquely positioned to help your organization rapidly gain the necessary skills to enable the successful deployment of SDN.

OnX is uniquely positioned to help your organization rapidly gain the necessary skills to enable the successful deployment of SDN. Slutin Brief SDN Training OVERVIEW SDN is mving faster than previus netwrking advancements. Sme teams have already deplyed and are mnitring their envirnments, while thers are just starting t ask abut SDN

More information