Forum Romania Inedit
Romania Inedit - Resursa ta de Fun
|
Lista Forumurilor Pe Tematici
|
Forum Romania Inedit | Reguli | Inregistrare | Login
POZE FORUM ROMANIA INEDIT
Nu sunteti logat.
|
Nou pe simpatie: laura love pe Simpatie
| Femeie 23 ani Bihor cauta Barbat 24 - 52 ani |
|
drwatson
MEMBRU VIP
Din: Purgatoriu
Inregistrat: acum 15 ani
|
|
Protocol Analysis Institute was created by Laura Chappell, foremost network analyst and one of the top industry speakers at events such as Microsoft TechEd, HP Tech Forum, HTCIA International Conference and more.
Course 1: TCP/IP Analysis/Troubleshooting - Analyzing and Troubleshooting Address Resolution Protocol (ARP) - Analyzing and Troubleshooting TCP Communications (Part 1) - Analyzing and Troubleshooting TCP Communications (Part 2) - Analyzing UDP Communications - Getting That Packet on the Wire (TCP/IP Resolutions) - Internet Control Messaging Protocol (ICMP) - Internet Protocol Version 4 (IPv4)
Course 2: Security at Packet-Level - Part 1 - ARP-Based Attacks - Analyzing the October 2002 DNS Attacks - Deception: Honeypots and Honeynets - Executing and Defending Against OS Fingerprinting - Scans: ARP, Ping, UDP-Based - Steganography and the Art of Data Hiding
Course 3: Introduction to Network Analysis - Analyzing Switched Networks - Analyzing and Troubleshooting Ethernet Networks - Pattern Analysis: Quick Identification of Bad Applications - References and Resources for Protocol Analysts - Introduction to Network Analysis (Part 1) - Introduction to Network Analysis (Part 2) - Hot Tools
Course 4: Advanced Network Analysis - Application Analysis Using the Application Analysis Form (AAF) - Binary-Hex-Decimal Conversion - Building Test Packets - Calculating the Cost of Network Problems (Analysis ROI) - Key Network Calculations: Throughput, Latency and Bandwidth - Unattended Captures: Triggered Starts/Stops - Analysis ROI Worksheet/Calculation
Course 5: Case Studies and Onsites - Case Study #1: "The Network is Slow" - Case Study #2: "The Network is Slow" - Case Study #3: “Internet Disconnects” - Case Study #4: “Internal and External Disconnects” - Case Study #5: “Slow Opening Explorer and Other Applications” - Analysis ROI Worksheet/Calculation
Course 6: Protocol Analyzers: Sniffer, EtherPeek, Ethereal - Ethereal: The Ultimate Free Protocol Analyzer (Part 1) - Ethereal: The Ultimate Free Protocol Analyzer (Part 2) - EtherPeek: Advanced Filtering (Patterns and Boolean Operands) - Sniffer/EtherPeek: Triggers, Alarms and Notifications - Sniffer: Address Filters - Sniffer: Advanced Filtering (Patterns and Boolean Operands) - Sniffer: Importing and Exporting Filters
Course 7: Security at Packet-Level - Part 2 - Filtering for Attack Signatures - Cybercrime at Packet Level: What Hurts the Net - Denial of Service (DoS) Attacks - Distributed Denial of Service (DDoS) Attacks - DNS-Based Attacks and Redirections - Echo-Chargen Attacks
Course 8: Top Tools - Specter Honeypot - Aida 32 Auditor - NMap Network Mapper - LANGuard Network Scanner - Packet Builder - Invisible Secrets: Steganography Steps - Hot Tools
Bonus CD - Intro to Wireless Networking
DOWNLOAD:
OR Analysis Institute.part01.rar Analysis Institute.part02.rar Analysis Institute.part03.rar Analysis Institute.part04.rar Analysis Institute.part05.rar Analysis Institute.part06.rar Analysis Institute.part07.rar Analysis Institute.part08.rar Analysis Institute.part09.rar Analysis Institute.part10.rar
_______________________________________ People are made to be loved & things are made to be used. The confusion in this world is that people are used & things are loved!
|
|
pus acum 14 ani |
|