CBT Nuggets Check Point CCSA Certified Security Administrator NGX R65 DVD



CBT Nuggets Check Point CCSA Certified Security Administrator NGX R65 DVD | 759 MB

Check Point is the global leader in IT security, and Check Point CCSA certification says you’ve got the expertise to handle corporate security needs.

Trainer Bobby Meador’s step-by-step instructions show you how to improve the security of your current Check Point firewall deployment or build a Check Point security solution from the ground up.

This series maps to Check Point’s Certified Security Administrator NGX R65 156-215.65 exam. Passing the test earns you Check Point CCSA certification.

Prerequisites

Suggested prerequisites include an understanding of networking (such as Cisco CCNA or CompTIA Network+), Windows (such as 70-642 MCTS Windows 2008 Network Infrastructure, Configuring), or Linux (such as CompTIA Linux+).

Check Point Certified Security Administrator contents:

* CCSA Welcome

* Methods of attack

* Firewall Concepts

* Product Installation Part 1

* Product Installation Part 2

* Product Installation Part 3

* Advanced Splat Config I

* Advanced Splat Config II

* NAT

* Security Policy & Rule Base Design

* VOIP Security

* Traffic and System Monitoring (Smart View Tracker)

* Smart View Monitor Review

* Eventia Analyzer and Reporter

* User Mgmt and Authentication I

* User Mgmt and Authentication II

* User Mgmt and Authentication III

* (QOS) Quality of Service

* Web Filtering and Anti virus

* Smart Defense Part 1

* Smart Defense Part 2

* Smart Update/Licensing

* Disaster Recovery/System backup

http://rapidshare.com/files/292272465/CNCPCCSACSANR65.part1.rar
http://rapidshare.com/files/292272685/CNCPCCSACSANR65.part2.rar
http://rapidshare.com/files/292273319/CNCPCCSACSANR65.part3.rar
http://rapidshare.com/files/292272590/CNCPCCSACSANR65.part4.rar
http://rapidshare.com/files/292273336/CNCPCCSACSANR65.part5.rar
http://rapidshare.com/files/292272556/CNCPCCSACSANR65.part6.rar
http://rapidshare.com/files/292272588/CNCPCCSACSANR65.part7.rar
http://rapidshare.com/files/292272462/CNCPCCSACSANR65.part8.rar

LAN Switch Security: What Hackers Know About Your Switches

Product Description

LAN Switch Security: What Hackers Know About Your Switches

A practical guide to hardening Layer 2 devices and stopping campus network attacks

Contrary to popular belief, Ethernet switches are not inherently secure.

Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco® Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP). LAN Switch Security explains all the vulnerabilities in a network infrastructure related to Ethernet switches. Further, this book shows you how to configure a switch to prevent or to mitigate attacks based on those vulnerabilities. This book also includes a section on how to use an Ethernet switch to increase the security of a network and prevent future attacks.

Divided into four parts, LAN Switch Security provides you with steps you can take to ensure the integrity of both voice and data traffic traveling over Layer 2 devices. Part I covers vulnerabilities in Layer 2 protocols and how to configure switches to prevent attacks against those vulnerabilities. Part II addresses denial-of-service (DoS) attacks on an Ethernet switch and shows how those attacks can be mitigated. Part III shows how a switch can actually augment the security of a network through the utilization of wirespeed access control list (ACL) processing and IEEE 802.1x for user authentication and authorization. Part IV examines future developments from the LinkSec working group at the IEEE. For all parts, most of the content is vendor independent and is useful for all network architects deploying Ethernet switches.

After reading this book, you will have an in-depth understanding of LAN security and be prepared to plug the security holes that exist in a great number of campus networks.

Eric Vyncke has a master’s degree in computer science engineering from the University of Liège in Belgium. Since 1997, Eric has worked as a Distinguished Consulting Engineer for Cisco, where he is a technical consultant for security covering Europe. His area of expertise for 20 years has been mainly security from Layer 2 to applications. He is also guest professor at Belgian universities for security seminars.

Christopher Paggen, CCIE® No. 2659, obtained a degree in computer science from IESSL in Liège (Belgium) and a master’s degree in economics from University of Mons-Hainaut (UMH) in Belgium. He has been with Cisco since 1996 where he has held various positions in the fields of LAN switching and security, either as pre-sales support, post-sales support, network design engineer, or technical advisor to various engineering teams. Christopher is a frequent speaker at events, such as Networkers, and has filed several U.S. patents in the security area.

Contributing Authors:

Jason Frazier is a technical leader in the Technology Systems Engineering group for Cisco.

Steinthor Bjarnason is a consulting engineer for Cisco.

Ken Hook is a switch security solution manager for Cisco.

Rajesh Bhandari is a technical leader and a network security solutions architect for Cisco.

*

Use port security to protect against CAM attacks
*

Prevent spanning-tree attacks
*

Isolate VLANs with proper configuration techniques
*

Protect against rogue DHCP servers
*

Block ARP snooping
*

Prevent IPv6 neighbor discovery and router solicitation exploitation
*

Identify Power over Ethernet vulnerabilities
*

Mitigate risks from HSRP and VRPP
*

Stop information leaks with CDP, PaGP, VTP, CGMP and other Cisco ancillary protocols
*

Understand and prevent DoS attacks against switches
*

Enforce simple wirespeed security policies with ACLs
*

Implement user authentication on a port base with IEEE 802.1x
*

Use new IEEE protocols to encrypt all Ethernet frames at wirespeed.

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Category: Cisco Press—Security

Covers: Ethernet Switch Security

$60.00 USA / $69.00 CAN

LAN Switch Security: What Hackers Know About Your Switches

A practical guide to hardening Layer 2 devices and stopping campus network attacks

Eric Vyncke

Christopher Paggen, CCIE® No. 2659

Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco® Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP). LAN Switch Security explains all the vulnerabilities in a network infrastructure related to Ethernet switches. Further, this book shows you how to configure a switch to prevent or to mitigate attacks based on those vulnerabilities. This book also includes a section on how to use an Ethernet switch to increase the security of a network and prevent future attacks.

Divided into four parts, LAN Switch Security provides you with steps you can take to ensure the integrity of both voice and data traffic traveling over Layer 2 devices. Part I covers vulnerabilities in Layer 2 protocols and how to configure switches to prevent attacks against those vulnerabilities. Part II addresses denial-of-service (DoS) attacks on an Ethernet switch and shows how those attacks can be mitigated. Part III shows how a switch can actually augment the security of a network through the utilization of wirespeed access control list (ACL) processing and IEEE 802.1x for user authentication and authorization. Part IV examines future developments from the LinkSec working group at the IEEE. For all parts, most of the content is vendor independent and is useful for all network architects deploying Ethernet switches.

After reading this book, you will have an in-depth understanding of LAN security and be prepared to plug the security holes that exist in a great number of campus networks.

Eric Vyncke has a master’s degree in computer science engineering from the University of Liège in Belgium. Since 1997, Eric has worked as a Distinguished Consulting Engineer for Cisco, where he is a technical consultant for security covering Europe. His area of expertise for 20 years has been mainly security from Layer 2 to applications. He is also guest professor at Belgian universities for security seminars.

Christopher Paggen, CCIE® No. 2659, obtained a degree in computer science from IESSL in Liège (Belgium) and a master’s degree in economics from University of Mons-Hainaut (UMH) in Belgium. He has been with Cisco since 1996 where he has held various positions in the fields of LAN switching and security, either as pre-sales support, post-sales support, network design engineer, or technical advisor to various engineering teams. Christopher is a frequent speaker at events, such as Networkers, and has filed several U.S. patents in the security area.

Contributing Authors:

Jason Frazier is a technical leader in the Technology Systems Engineering group for Cisco.

Steinthor Bjarnason is a consulting engineer for Cisco.

Ken Hook is a switch security solution manager for Cisco.

Rajesh Bhandari is a technical leader and a network security solutions architect for Cisco.

*

Use port security to protect against CAM attacks
*

Prevent spanning-tree attacks
*

Isolate VLANs with proper configuration techniques
*

Protect against rogue DHCP servers
*

Block ARP snooping
*

Prevent IPv6 neighbor discovery and router solicitation exploitation
*

Identify Power over Ethernet vulnerabilities
*

Mitigate risks from HSRP and VRPP

http://www.uploadjockey.com/download/6927764/Lan_Switch_Sercurity_so_close.RAR

O'Reilly Learning the vi and Vim Editors 7th Edition


There's nothing that hard-core Unix and Linux users are more fanatical about than their text editor. Editors are the subject of adoration and worship, or of scorn and ridicule, depending upon whether the topic of discussion is your editor or someone else's.

vi has been the standard editor for close to 30 years. Popular on Unix and Linux, it has a growing following on Windows systems, too. Most experienced system administrators cite vi as their tool of choice. And since 1986, this book has been the guide for vi.

However, Unix systems are not what they were 30 years ago, and neither is this book. While retaining all the valuable features of previous editions, the 7th edition of Learning the vi and vim Editors has been expanded to include detailed information on vim, the leading vi clone. vim is the default version of vi on most Linux systems and on Mac OS X, and is available for many other operating systems too.

With this guide, you learn text editing basics and advanced tools for both editors, such as multi-window editing, how to write both interactive macros and scripts to extend the editor, and power tools for programmers -- all in the easy-to-follow style that has made this book a classic.

Learning the vi and vim Editors includes:

# A complete introduction to text editing with vi:How to move around vi in a hurry
# Beyond the basics, such as using buffers
# vi's global search and replacement
# Advanced editing, including customizing vi and executing Unix commands


# How to make full use of vim:Extended text objects and more powerful regular expressions
# Multi-window editing and powerful vim scripts
# How to make full use of the GUI version of vim, called gvim
# vim's enhancements for programmers, such as syntax highlighting, folding and extended tags


Coverage of three other popular vi clones -- nvi, elvis, and vile -- is also included. You'll find several valuable appendixes, including an alphabetical quick reference to both vi and ex mode commands for regular vi and for vim, plus an updated appendix on vi and the Internet.

Learning either vi or vim is required knowledge if you use Linux or Unix, and in either case, reading this book is essential. After reading this book, the choice of editor will be obvious for you too.

http://www.easy-share.com/1905133897/OReilly.Learning.the.vi.and.Vim.Editors.7th.Edition.rar

Mike Meyers’ CompTIA Network+ Certification Passport, Third Edition



Product Description

From the #1 Name in Professional Certification
Get on the fast track to becoming CompTIA Network+ certified with this affordable, portable study tool. Inside, networking expert Glen Clarke guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the CompTIA Network+ exam, this certification passport is your ticket to success on exam day.

Featuring:
Itineraries–List of official exam objectives covered
ETAs–Amount of time needed to complete each lesson
Travel Advisories–Expert advice on critical topics
Local Lingo–Concise definitions of key terms and concepts
Travel Assistance–Recommended resources for more information
Exam Tips–Common exam pitfalls and solutions
Checkpoints–End-of-chapter questions, answers, and explanations
Career Flight Path–Career options mapped out to maximize the return from your IT journey

About the Author

Glen E. Clarke, MCSE, MCDBA, MCSD, MCT, CEH, SCNP, CompTIA A+, CompTIA Network+, CompTIA Security+, is an independent trainer and consultant, focusing on network security and Web application development. He has authored and edited more than a dozen certification books, including CompTIA Network+ Certification Study Guide, Fourth Edition.
About the Series Editor: Mike Meyers, CompTIA A+, CompTIA Network+, MCP, is the bestselling author of six editions of CompTIA A+ Certification All-in-One Exam Guide and several other computer books. He is the president and founder of Total Seminars, LLC, a major provider of PC and network repair seminars for thousands of organizations throughout the world, and a member of CompTIA.

Product Details
Paperback: 464 pages
Publisher: McGraw-Hill Osborne Media; 3 edition (July 23, 2009)
Language: English


http://hotfile.com/dl/14039169/dfd34d2/McGraw-Hill_-_Mike_Meyers__CompTIA_Network__Certification_Passport_3rd_Edition__2009_.zip.html

UNIX Network Programming, Volume 2: Interprocess Communications



Well-implemented interprocess communications (IPC) are key to the performance of virtually every non-trivial UNIX program. In UNIX Network Programming, Volume 2, Second Edition, legendary UNIX expert W. Richard Stevens presents a comprehensive guide to every form of IPC, including message passing, synchronization, shared memory, and Remote Procedure Calls (RPC).

Stevens begins with a basic introduction to IPC and the problems it is intended to solve. Step-by-step you’ll learn how to maximize both System V IPC and the new Posix standards, which offer dramatic improvements in convenience and performance.

http://hotfile.com/dl/14039178/88f530e/Unix.NPvol2.rar.html

CEH Training CBT Boot Camp

CEH Training CBT Boot Camp - Certified Ethical Hacker v.6


This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50

Career Academy is an EC-Council endorsed training provider. We have invited the best security trainers in the industry to help us develop the ultimate training and certification program which includes everything you will need to fully prepare for and pass your certification exams



# 6 DVDs featuring live instructor-led classroom sessions with full audio, video and demonstration components
# 4 DVDs containing over 300 of the latest Hacking Tools and Exploits
# Intensive Hacking and Counter-Hacking Hands-On demonstration components
# Official EC-Council CEH Curriculum Courseware Volumes 1, 2 & 3
# Official EC-Council CEH Lab Guide
# Over 250 CEH Exam Review Questions
# Exclusive LearningZone Live Mentor Click for Details (Value at $295)
Help whenever you need it! Exclusive LearningZone - Why wait for email support? Chat Live with our Certified Instructors anytime around the clock (24x7)
# Proven technique- Actual Exam Secrets Review
# Certification Exam Pass Guarantee
# Free 1 Year Upgrade Policy
# Certificate of Completion


DVD1
http://rapidshare.com/files/26211191...VD1.part01.rar
http://rapidshare.com/files/26211200...VD1.part02.rar
http://rapidshare.com/files/26211215...VD1.part03.rar
http://rapidshare.com/files/26211201...VD1.part04.rar
http://rapidshare.com/files/26211202...VD1.part05.rar
http://rapidshare.com/files/26211195...VD1.part06.rar
http://rapidshare.com/files/26211197...VD1.part07.rar
http://rapidshare.com/files/26211199...VD1.part08.rar
http://rapidshare.com/files/26211194...VD1.part09.rar
http://rapidshare.com/files/26211197...VD1.part10.rar
http://rapidshare.com/files/26211202...VD1.part11.rar
http://rapidshare.com/files/26211197...VD1.part12.rar
http://rapidshare.com/files/26211140...VD1.part13.rar

DVD2
http://rapidshare.com/files/26215959...VD2.part01.rar
http://rapidshare.com/files/26215960...VD2.part02.rar
http://rapidshare.com/files/26215957...VD2.part03.rar
http://rapidshare.com/files/26215961...VD2.part04.rar
http://rapidshare.com/files/26215957...VD2.part05.rar
http://rapidshare.com/files/26215972...VD2.part06.rar
http://rapidshare.com/files/26216023...VD2.part07.rar
http://rapidshare.com/files/26216026...VD2.part08.rar
http://rapidshare.com/files/26216024...VD2.part09.rar
http://rapidshare.com/files/26216024...VD2.part10.rar
http://rapidshare.com/files/26216025...VD2.part11.rar
http://rapidshare.com/files/26216041...VD2.part12.rar
http://rapidshare.com/files/26216096...VD2.part13.rar
http://rapidshare.com/files/26215883...VD2.part14.rar

DVD3
http://rapidshare.com/files/26216102...DVD3.part1.rar
http://rapidshare.com/files/26216105...DVD3.part2.rar
http://rapidshare.com/files/26216097...DVD3.part3.rar
http://rapidshare.com/files/26216091...DVD3.part4.rar

DVD4
http://rapidshare.com/files/26216127...VD4.part01.rar
http://rapidshare.com/files/26216150...VD4.part02.rar
http://rapidshare.com/files/26216156...VD4.part03.rar
http://rapidshare.com/files/26216158...VD4.part04.rar
http://rapidshare.com/files/26216168...VD4.part05.rar
http://rapidshare.com/files/26216170...VD4.part06.rar
http://rapidshare.com/files/26216196...VD4.part07.rar
http://rapidshare.com/files/26216217...VD4.part08.rar
http://rapidshare.com/files/26216062...VD4.part09.rar

DVD5
http://rapidshare.com/files/26216223...DVD5.part1.rar
http://rapidshare.com/files/26216226...DVD5.part2.rar
http://rapidshare.com/files/26216231...DVD5.part3.rar
http://rapidshare.com/files/26216233...DVD5.part4.rar
http://rapidshare.com/files/26216258...DVD5.part5.rar
http://rapidshare.com/files/26216279...DVD5.part6.rar
http://rapidshare.com/files/26216287...DVD5.part7.rar
http://rapidshare.com/files/26216263...DVD5.part8.rar

DVD6
http://rapidshare.com/files/26216296...DVD6.part1.rar
http://rapidshare.com/files/26216297...DVD6.part2.rar
http://rapidshare.com/files/26216324...DVD6.part3.rar
http://rapidshare.com/files/26216330...DVD6.part4.rar
http://rapidshare.com/files/26216343...DVD6.part5.rar
http://rapidshare.com/files/26216346...DVD6.part6.rar
http://rapidshare.com/files/26216353...DVD6.part7.rar