OmniSecu.com Logo  
omnisecu.com free mcse ccna rhce linux java learning Knowledgebase
omnisecu.com free mcse ccna rhce linux java learning
          Sharefacebook twitter google+ google bookmark yahoo bookmark delicious digg linkedin pinterest reddit stumbleupon evernote diigo blinklist blogmarks livejournal email feed

Tutorials

Knowledgebase - omnisecu.com

External Resources

Lesson 01 - Introduction

Lesson 02 - Why we need computer networks?

Lesson 03 - Network Topologies - Bus Topology

Lesson 04 - Network Topologies - Star Topology

Lesson 05 - Network Topologies - Mesh, Ring and Hybrid Topologies

Lesson 06 - Network Infrastructure Devices- What is a hub?

Lesson 07 - Network Infrastructure Devices - What are Bridges and Switchs?

Lesson 08 - Network Infrastructure Devices - What is a Router?

Lesson 09 - Common Network Cable types

Lesson 10 - Straight-Through and Cross-Over cables

Lesson 11 - Difference between Baseband and Broadband

Lesson 12 - Network Access Methods - CSMA/CD, CSMA/CA and Token Passing

Lesson 13 - LAN Technologies - Ethernet

Lesson 14 - Ethernet Media Standards

Lesson 15 - Lan Technologies - Token Ring

Lesson 16 - Lan Technologies - Fibre Distributed Data Interface (FDDI)

Lesson 17 - IEEE 802 Standards

TCP/IP

Part 01 - IPv4

Lesson 01 - Introduction

Lesson 02 - Seven Layers of OSI Model.

Lesson 03 - Comparison between TCP/IP and OSI

Lesson 04 - TCP/IP Encapsulation and Decapsulation

Lesson 05 - TCP/IP Network Access Layer

Lesson 06 - Binary Decimal and Hexadecimal numbers and conversions

Lesson 07 - Media Access Control (MAC) addresses

Lesson 08 - TCP/IP Internet Layer

Lesson 09 - IPv4 Addresses

Lesson 10 - What are Private IPv4 Addresses (RFC 1918 addresses)

Lesson 11 - Class C Subnetting Tutorial - Part 1

Lesson 12 - Class C Subnetting Tutorial - Part 2

Lesson 13 - Class B Subnetting Tutorial - Part 1

Lesson 14 - Class B Subnetting Tutorial - Part 2

Lesson 15 - Class A Subnetting Tutorial - Part 1

Lesson 16 - Class A Subnetting Tutorial - Part 2

Lesson 17 - Variable Length Subnet Masking (VLSM)

Lesson 18 - Supernetting

Lesson 19 - How to find out the Network Address and Broadcast Address of a subnetted IPv4 address

Lesson 21 - Address Resolution Protocol (ARP)

Lesson 21 - Internet Control Message Protocol (ICMP)

Lesson 22 - TCP/IP Transport Layer

Lesson 23 - Transmission Control Protocol (TCP)

Lesson 24 - Transmission Control Protocol (TCP) Segment Header

Lesson 25 - TCP Three-way Handshake

Lesson 26 - Multiplexing and Demultiplexing using port numbers

Lesson 27 - Transmission Control Block (TCB)

Lesson 28 - TCP Sliding Window

Lesson 29 - TCP Connection Termination

Lesson 30 - User Datagram Protocol (UDP)

Lesson 31 - Differences between TCP and UDP

Lesson 32 - TCP/IP Application Layer

Lesson 33 - Hypertext Transfer Protocol (HTTP) - What is HTTP?

Lesson 34 - Hypertext Transfer Protocol (HTTP) - Request and Response

Lesson 35 - Simple Mail Transport Protocol (SMTP) - How SMTP Works?

Lesson 36 - Simple Mail Transport Protocol (SMTP) Client - Server Communication

Lesson 37 - SMTP Status Codes and Extended Simple Mail Transfer Protocol (ESMTP)

Lesson 38 - Dynamic Host Configuration Protocol (DHCP) - How DHCP Works?

Lesson 39 - Dynamic Host Configuration Protocol (DHCP) - Message Format

Lesson 40 - Dynamic Host Configuration Protocol (DHCP) Messages

Lesson 41 - Dynamic Host Configuration Protocol (DHCP) Message Options

Part 02 - IPv6

Lesson 01 - Limitations of IPv4

Lesson 02 - IPv6 History and related RFCs

Lesson 03 - IPv6 Features

Lesson 04 - Differences Between IPv4 and IPv6

Lesson 05 - Unicast, Multicast and Anycast - Types of network communication in IPv6

Lesson 06 - IPv6 Datagram Header Format

Lesson 07 - Comparison between IPv4 Header and IPv6 Header

Lesson 08 - Introduction to IPv6 Addressing

Lesson 09 - What is prefix and prefix length in IPv6, Similarity between IPv4 subnet mask and IPv6 prefix

Lesson 10 - IPv6 Address formats

Lesson 11 - How to Simplify Shorten and Compress IPv6 Addresses

Lesson 12 - Types of IPv6 Addresses

Lesson 13 - Global Unicast IPv6 addresses

Lesson 14 - Different methods to assign a Global Unicast IPv6 address to an interface

Lesson 15 - What are IEEE EUI-64 based Global Unicast IPv6 addresses

Lesson 16 - How to configure Static Global Unicast IPv6 Address in a Cisco Router Interface

Lesson 17 - How to configure EUI-64 based Global Unicast IPv6 Address in a Cisco Router Interface

Lesson 18 - Link Local IPv6 Addresses, How Link Local IPv6 addresses are generated

Lesson 19 - Unique Local IPv6 Addresses

Lesson 20 - Multicast IPv6 Addresses

Lesson 21 - Anycast IPv6 Addresses

Lesson 22 - IPv6 Loopback Address and IPv6 Unspecified address

Lesson 23 - IPv6 Special Addresses and IPv6 well known prefixes

Lesson 24 - ICMPv6, Functions of ICMPv6, ICMPv6 Header, Types of ICMPv6 messages

Lesson 25 - NDP (Neighbour Discovery Protocol), functions of NDP, Neighbour Solicitation and Advertisement, Router Solicitation and Advertisement

Lesson 26 - Solicited Node IPv6 Multicast Address

Cisco Certified Network Associate (CCNA)

Lesson 01 - Introduction to Cisco Certified Network Associate (CCNA) Certification

Lesson 02 - Different Types of Router Memory

Lesson 03 - How to communicate with a Router using Console, Auxiliary, Telnet, SSH, HTTP and HTTPS connections

Lesson 04 - How to connect and access a router or switch using console connection

Lesson 05 - How to connect to router or switch console if serial port is not available in computer

Lesson 06 - How to use HyperTerminal Terminal Emulator to configure or monitor a Cisco Router or Switch

Lesson 07 - How to use PuTTY Terminal Emulator to configure or monitor a Cisco Router or Switch

Lesson 08 - Cisco's Three-tier Hierarchical Network Model

Lesson 09 - Benefits of Segmenting a network using a Router

Lesson 10 - Unicast, Multicast, Broadcast, What is Unicast, What is Multicast and What is Broadcast

Lesson 11 - What are Collision Domain and Broadcast Domain

Lesson 12 - Cisco Router Boot Sequence

Lesson 13 - What is Trivial File Transfer Protocol (TFTP)

Lesson 14 - How to install Solarwinds Trivial File Transfer Protocol (TFTP) Server

Lesson 15 - How to configure Solarwinds Trivial File Transfer Protocol (TFTP) Server to backup IOS and configuration files

Lesson 16 - Cisco Router Configuration Files

Lesson 17 - Naming Convention of Cisco IOS Image Files

Lesson 18 - How to backup IOS and configuration files to Trivial File Transfer Protocol (TFTP) Server

Lesson 19 - How to Upgrade or Install IOS from Trivial File Transfer Protocol (TFTP) Server

Lesson 20 - Cisco IOS Command Line modes

Lesson 21 - How to configure passwords to secure Cisco Router

Lesson 22 - Basic Cisco Router Configuration Commands

Lesson 23 - Cisco Router Show Commands

Lesson 24 - Important Key Combinations of Cisco IOS Command Line Interface (CLI)

Lesson 25 - Router interface naming convention

Lesson 26 - Cisco Router interface configuration commands

Lesson 27 - Different types of interfaces in a Cisco Router

Lesson 28 - What is a Subinterface in a Cisco Router and how to create a subinterface in a Cisco Router

Lesson 29 - What is loopback interface in a Cisco Router

Lesson 30 - What is null interface in a Cisco Router

Lesson 31 - How to configure Router Serial Interfaces

Lesson 32 - What is Cisco Discovery Protocol (CDP)

Lesson 33 - Important Cisco Discovery Protocol (CDP) IOS commands

Lesson 34 - What are Routing and Switching - Difference between Routing and Switching

Lesson 35 - Types of Routes - Static Routes and Dynamic Routes

Lesson 36 - What is the difference between Routing Protocols and Routed Protocols

Lesson 37 - Difference Between Routable Protocol and Non-Routable Protocol

Lesson 38 - What is Autonomous System and Autonomous System Number

Lesson 39 - What is the difference between IGP and EGP

Lesson 40 - What is Administrative Distance

Lesson 41 - Introduction to Static Routes and Default Routes

Lesson 42 - How to configure Static Routes and Default Routes

Lesson 43 - What is Dynamic Routing and different types of Dynamic Routing

Lesson 44 - What is Routing Metric Value

Lesson 45 - What is Convergence of Routing Tables

Lesson 46 - Introduction to Distance Vector Routing Protocols

Lesson 47 - Introduction to Routing Information Protocol (RIP)

Lesson 48 - Difference between RIPv1 and RIPv2

Lesson 49 - How to configure Routing Information Protocol (RIP)

Lesson 50 - RIP Metric (Hop Count) and Hop Count Calculation

Lesson 51 - Auto Summarization in RIP

Lesson 52 - RIP Authentication, RIPv2 Authentication, RIP Authentication Keychain Configuration

Lesson 53 - Introduction to Interior Gateway Routing Protocol (IGRP)

Lesson 54 - How to configure Interior Gateway Routing Protocol (IGRP)

Lesson 55 - What is Routing Loop and how to avoid Routing Loop

Lesson 56 - Introduction to Link State Routing Protocols

Lesson 57 - Introduction to Open Shortest Path First (OSPF) Protocol

Lesson 58 - How to configure Open Shortest Path First (OSPF)

Lesson 59 - What is OSPF Metric value Cost and OSPF default Cost Reference Bandwidth

Lesson 60 - What is OSPF Router ID, OSPF Router ID Selection Algorithm and How to Configure OSPF Router ID

Lesson 61 - What is OSPF Area, OSPF Hierarchical Network Design, and Advantages of OSPF Areas

Lesson 62 - Introduction to Hybrid Routing Protocols

Lesson 63 - Introduction to Enhanced Interior Gateway Routing Protocol (EIGRP)

Lesson 64 - How to configure Enhanced Interior Gateway Routing Protocol (EIGRP)

Lesson 65 - EIGRP Metric Calculation Formula with example

Lesson 66 - Auto summarization in EIGRP

Lesson 67 - Introduction to Access Control Lists (ACL)

Lesson 68 - Standard Access Control Lists (ACLs)

Lesson 69 - Where should a Standard Access Control List (ACL) be placed

Lesson 70 - Access Control List (ACL) - Wildcard Masks

Lesson 71 - How to create and configure Standard Access Control Lists (ACLs)

Lesson 72 - Extended Access Control Lists (ACLs)

Lesson 73 - Where should an Extended Access Control List (ACL) be placed

Lesson 74 - Extended Access Control List (ACL) - Operators

Lesson 75 - Extended Access Control List (ACL) - TCP and UDP port numbers and names

Lesson 76 - Extended Access Control List (ACL)- established Keyword

Lesson 77 - How to create and configure Extended Access Control Lists (ACLs)

Lesson 78 - How to create and configure Access Control Lists (ACLs) for vty lines (telnet and ssh)

Lesson 79 - Named Access Control Lists (ACLs)

Lesson 80 - How to create and configure Standard Named Access Control Lists (ACLs)

Lesson 81 - How to create and configure Extended Named Access Control List (ACL)

Lesson 82 - How to edit a Named Access Control List (ACL) on router

Lesson 83 - What is NAT (Network Address Translation)

Lesson 84 - What are the Advantages and Disadvantages of NAT (Network Address Translation)

Lesson 85 - Different types of NAT - Static NAT, Dynamic NAT and PAT

Lesson 86 - NAT Address types - Inside Local, Inside Global, Outside Local, Outside Global

Lesson 87 - How to configure static NAT in a Cisco Router

Lesson 88 - How to configure dynamic NAT in a Cisco Router

Lesson 89 - How to configure PAT (Port Address Translation or NAT overload) in a Cisco Router

Lesson 90 - Introduction to Network Switches

Lesson 91 - Difference between Network Switches and Bridges

Lesson 92 - Methods of Switching

Lesson 93 - Difference between Half-duplex and Full-duplex Switching

Lesson 94 - Functions of a Network Switch

Lesson 95 - What is switch management VLAN and how to configure Management VLAN

Lesson 96 - Basic Cisco Switch Configuration Commands

Lesson 97 - What is Broadcast Storm

Lesson 98 - What is Layer 2 Switching loop

Lesson 99 - What is Spanning Tree Protocol (STP)

Lesson 100 - What is Bridge Protocol Data Unit (BPDU) frame

Lesson 101 - Bridge Protocol Data Unit (BPDU) Frame Format

Lesson 101 - What are Spanning Tree Bridge Priority and Bridge ID values

Lesson 102 - What is a Root Bridge (Root Switch)

Lesson 103 - What is a Root Port

Lesson 104 - Spanning Tree Path Cost Value and How is Spanning Tree Path Cost Value Calculated

Lesson 105 - Spanning Tree Port Priority and Port ID Values

Lesson 106 - How to change Spanning Tree Bridge Root Priority value and What is Extended System ID

Lesson 107 - How to configure Spanning Tree Protocol Root Primary and Root Secondary

Lesson 108 - How to change Spanning Tree Port Priority Value

Lesson 109 - How Spanning Tree Protocol (STP) select Root Port

Lesson 110 - What is a Designated Port

Lesson 111 - How Spanning Tree Protocol (STP) select Designated Port

Lesson 112- Difference between Root Port and Designated Port

Lesson 113 - Spanning Tree Port States

Lesson 114 - How BPDU is generated and How BPDU works

Lesson 115 - Important Spanning Tree Protocol (STP) Timers and their default values

Lesson 116 - How to Configure and Change Spanning Tree Protocol (STP) Default Timer-Values for hello timer, forward delay timer and max age timer

Lesson 117 - Topology Changes in Spanning Tree Protocol (STP)

Lesson 118 - Spanning Tree Protocol (STP) Convergence

Lesson 119 - Where to place the Spanning Tree Protocol Root Switch (Root Bridge)

Lesson 120 - Spanning Tree Protocol (STP) UplinkFast, Backbone Fast and Portfast

Lesson 121 - What is Spanning Tree Protocol (STP) Uplink Fast

Lesson 122 - What is Spanning Tree Protocol (STP) Backbone Fast

Lesson 123 - What is Spanning Tree Protocol (STP) PortFast

Lesson 124 - How to configure and verify Spanning Tree Protocol (STP) PortFast

Lesson 125 - How to enable or disable Spanning Tree Protocol (STP)

Lesson 126 - What is Rapid Spanning Tree Protocol (RSTP)

Lesson 127 - Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP)

Lesson 128 - Per-VLAN Spanning Tree (PVST) and Per-VLAN Spanning Tree Plus (PVST+)

Lesson 129 - What is Etherchannel in Cisco Switches and Routers, What is Link Aggregation and what is PAgP, LACP

Lesson 130 - EtherChannel PAgP and LACP modes

Lesson 131 - How to configure EtherChannel Port Aggregation Protocol (PAgP) in Cisco Switches

Lesson 132 - How to configure How to configure EtherChannel Link Aggregation Control Protocol (LACP) in Cisco Switches

Lesson 133 - Manual EtherChannel Configuration in Cisco Switches Using Channel mode "on"

Lesson 134 - What is Virtual Local Area Network (VLAN)

Lesson 135 - Advantages of VLAN

Lesson 136 - VLAN Membership Types

Lesson 137 - How to create and name static VLAN

Lesson 138 - How to view VLAN information using "show vlan" command

Lesson 139 - Types of VLAN connection links - Trunk Links and Access Links

Lesson 140 - VLAN Frame Tagging

Lesson 141 - Inter-Switch Link (ISL) VLAN Tagging

Lesson 142 - IEEE 802.1Q VLAN Tagging

Lesson 143 - What is Native VLAN

Lesson 144 - How to configure VLAN trunk link and native VLAN

Lesson 145 - How to configure and assign a switch access port to a VLAN

Lesson 146 - What is VLAN Trunking Protocol (VTP)

Lesson 147 - What is VLAN Trunking Protocol (VTP) Domain

Lesson 148 - VLAN Trunking Protocol (VTP) Modes

Lesson 149 - VLAN Trunking Protocol (VTP) Advertisement Messages

Lesson 150 - How to configure VLAN Trunking Protocol (VTP)

Lesson 151- How to view VLAN Trunking Protocol (VTP) information using "show vtp status" command

Lesson 152- What is VLAN Trunking Protocol (VTP) Pruning

Lesson 153 - Introduction to IPv6 and IPv6 Addresses

Lesson 154 - Introduction to IPv6 Routing and IPv6 Routing Protocols

Lesson 155 - How to configure IPv6 Static Routes in Cisco Routers

Lesson 156 - Introduction to RIPng (RIP Next Generation), RIP for IPv6

Lesson 157 - How to configure RIPng (RIP for IPv6) Routing Protocol in Cisco Routers

Lesson 158 - Differences between OSPFv2 and OSPFv3

Lesson 159 - How to configure OSPFv3 IPv6 Routing in Cisco Routers

Security

Part 01 - Basics of Information Security

Lesson 01 - Introduction to Information Security

Lesson 02 - Authentication

Lesson 03 - Kerberos Authentication

Lesson 04 - Challenge Handshake Authentication Protocol (CHAP) Authentication

Lesson 05 - Biometric Authentication

Lesson 06 - Token Authentication

Lesson 07 - Multi-Factor Authentication

Lesson 08 - Access Control

Lesson 09 - Discretionary Access Control (DAC)

Lesson 10 - Mandatory Access Control (MAC)

Lesson 11 - Role-based Access Control (RBAC)

Lesson 12 - Auditing

Lesson 13 - Introduction to Auditing in Windows 2003

Lesson 14 - Types of Network Attacks

Lesson 15 - Types of Network Attacks - Denial of Service (DoS) attack

Lesson 16 - How to minimize the Denial of Service (DoS) attack impact

Lesson 17 - Types of Network Attacks - Distributed Denial of Service (DDoS) attack

Lesson 18 - Types of Network Attacks - SYN attack

Lesson 19 - Types of Network Attacks - Sniffer Attack

Lesson 20 - Types of Network Attacks - Man-In-The-Middle attack

Lesson 21 - Types of Network Attacks - IP Address Spoofing Attack

Lesson 22 - Types of Network Attacks - ARP (Address Resolution Protocol) Spoofing Attacks

Lesson 23 - Types of Network Attacks - DNS (Domain Name System) Spoofing Attacks

Lesson 24 - Types of Network Attacks - Phishing and Pharming Spoofing attacks

Lesson 25 - Types of Network Attacks - Backdoor Attacks

Lesson 26 - Types of Network Attacks - Password Guessing Attacks

Lesson 27 - Types of Network Attacks - SQL Injection Attacks

Lesson 28 - Defense against Network Attack

Lesson 29 - Types of Malwares

Lesson 30 - Types of Malwares - Adwares, Toolbars and Hijackers

Lesson 31 - Types of Malwares - Keyloggers

Lesson 32 - Types of Malwares - Computer Viruses

Lesson 33 - Types of Computer Viruses

Lesson 34 - Types of Malwares - Worms

Lesson 35 - Types of Malwares - Logic Bombs

Lesson 36 - Types of Malwares - Trojan Horses

Lesson 37 - Types of Malwares - Rootkits

Part 02 - Infrastructure and Email Security

Lesson 01 - Introduction to Infrastructure Security

Lesson 02 - Firewalls

Lesson 03 - Routers

Lesson 04 - Hubs

Lesson 05 - Bridges and Switches

Lesson 06 - Modems

Lesson 07 - Remote Access Services (RAS)

Lesson 08 - Virtual Private Networks (VPN)

Lesson 09 - Intrusion Detection Systems (IDS)

Lesson 10 - Difference between Firewall and Intrusion Detection System

Lesson 11 - Types of Intrusion Detection Systems

Lesson 12 - Leading Intrusion Detection Systems (IDS) Products

Lesson 13 - Honeypots

Lesson 14 - Types of Honeypots - Low Interaction Honeypots and High Interaction Honeypots

Lesson 15 - Leading Honeypot Products

Lesson 16 - Honeypot Clients (HoneyClients)

Lesson 17 - Introduction to Network Protocol Analyzers (Sniffers)

Lesson 18 - How Network Protocol Analyzers (Sniffers) work?

Lesson 19 - Leading Network Protocol Analyzer (Sniffer) products

Lesson 20 - How to detect Network Protocol Analyzer (Sniffers) in your network

Lesson 21 - Network Access Control

Lesson 22 - DMZ (Demilitarized Zone)

Lesson 23 - How to secure Workstations and Servers

Lesson 24 - Wireless Networks

Lesson 25 - Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Standards

Lesson 26 - Wireless Application Protocol (WAP)

Lesson 27 - Wired Equivalent Privacy (WEP)

Lesson 28 - Wi-Fi Protected Access (WPA)

Lesson 29 - Common Wireless Attacks

Lesson 30 - E-mail Security

Part 03 - Internet Information Services (IIS) 7 Security

Lesson 01 - Why Web Server Security is Important

Lesson 02 - How a Web Server Serve Clients

Lesson 03 - Introduction to Internet Information Services (IIS) 7

Lesson 04 - How to install Internet Information Services (IIS) 7 on Windows 2008 Server

Lesson 05 - Securing Access Control

Lesson 06 - Securing Directory and Data Structures

Lesson 07 - How to configure Virtual Directory on Internet Information Services (IIS) 7

Lesson 08 - Configuring IP address and Domain Name Restrictions

Lesson 09 - Configuring MIME Types

Lesson 10 - Introduction to Authentication and Authorization

Lesson 11 - Authentication Options in Internet Information Services (IIS) 7

Lesson 12 - How to Configure Basic Authentication in Internet Information Services (IIS) 7

Lesson 13 - How to Configure Windows Authentication in Internet Information Services (IIS) 7

Part 04 - Internet Protocol Security (IPSec)

Lesson 1 - Internet Protocol Security (IPSec) - What is IPSec?

Lesson 2 - Internet Protocol Security (IPSec) - Security Association (SA)

Lesson 3 - Internet Protocol Security (IPSec) - Security Parameter Index (SPI)

Lesson 4 - Internet Protocol Security (IPSec) - Transport Mode

Lesson 5 - Internet Protocol Security (IPSec) - Tunnel Mode

Lesson 6 - Internet Protocol Security (IPSec) - Authentication Header (AH)

Lesson 7 - Internet Protocol Security (IPSec) - Encapsulating Security Payload (ESP)

Lesson 08 - What are Windows 2003 IPSec features?

Lesson 09 - What are IPSec policies?

Lesson 10 - How to configure IPSec in a Windws 2003 network to secure Telnet traffic?

Lesson 11 - How to create an IPSec policy in a Windows 2003 server?

Lesson 12 - How to create an IPSec Rule in Windows 2003 server?

Lesson 13 - How to create an IPSec IP filter list in Windows 2003 server?

Lesson 14 - How to associate IPSec filter list to filter action?

Lesson 15 - How to assign IPSec policy in Windows 2003 server?

Lesson 16 - How to configure IPSec Integrity and Encryption algorithms in windows 2003?

Part 05 - Public Key Infrastructure

Lesson 01 - What is Symmetric Encryption?

Lesson 02 - Symmetric Encryption Algorithms

Lesson 03 - What is Asymmetric Encyption?

Lesson 04 - Asymmetric Encryption Algorithms

Lesson 05 - Public Key Cryptography

Lesson 06 - What is a Digital Certificate?

Lesson 07 - What is Public Key Infrastructure (PKI)?

Lesson 08 - What is a Certificate Authority (CA)?

Lesson 09 - Comparison between Internal and External Certificate Authorities (CAs)

Lesson 10. Certificate Authority (CA) Hierarchy

Lesson 11. Windows 2003 Certificate Authorities (CAs)

Lesson 12 - Windows 2003 Certificate Server Architecture

Lesson 13 - Stand-alone Root Certificate Authority (CA)

Lesson 14 - Installing Stand-alone Root Certificate Authority (CA)

Lesson 15 - Installing Enterprise Subordinate Certificate Authority

Lesson 16 - How to submit Certificate Request to a Root Certificate Authority (CA)

Lesson 17 - How to import Root CA Certificate inside Trusted Root Certification Authorities Store

Lesson 18 - How to install CA certificate issued from Root CA on Enterprise Subordinate CA

CCNA Security

Lesson 01 - Introduction to CCNA Security

Lesson 02 - What is Network Security and why we need Network Security

Lesson 03 - Primary Goals of Network Security

Lesson 04 - Enterprise Risk Management - Key Definitions

Lesson 05 - Network Threats and Countermeasures

Lesson 06 - Types of Hackers and how hackers are classified

Lesson 07 - Types of Network Attacks against Confidentiality, Integrity and Avilability

Lesson 08 - Different Classes of Network attacks and how to defend them

Lesson 09 - How Hackers attack networks and a Hacker's mindset

Lesson 10 - How to provide better security to your enterprise network

Lesson 11 - Disaster Recovery Business Continuity Plan

Lesson 12 - Types of Backup - Full backup, Incremental backup, Differential backup and Copy backup

Lesson 13 - Types of Backup Sites - Hot Site, Warm Site, Cold Site

Lesson 14 - Business Data Classification

Lesson 15 - Organizational Policies, Procedures, Standards and Guidelines

Lesson 16 - Testing Enterprise Security

Lesson 17 - Cisco Network Foundation Protection (NFP) Framework - Management plane, Control plane and Data plane

Lesson 18 - Management Plane Protection - Cisco NFP (Network Foundation Protection)

Lesson 19 - Control Plane Protection - Cisco NFP (Network Foundation Protection)

Lesson 20 - Data Plane Protection - Cisco NFP (Network Foundation Protection)

Lesson 21 - How to configure Cisco Router/Switch to enable SSH (Secure Shell) and How to connect Cisco Router/Switch using SSH (Secure Shell)

Lesson 22 - How to install Cisco CCP and how to configure Cisco router for CCP

Lesson 23 - How to install Cisco SDM and how to configure Cisco router for SDM

Lesson 24 - Cisco IOS CLI Shell Pivilege levels, user EXEC mode and privilege EXEC modes

Lesson 25 - How to configure multiple Privilege Levels Cisco IOS CLI Shell

Lesson 26 - Strong Passwords and Password Encryption to protect Management Plane

Lesson 27 - AAA Authentication Authorization and Accounting

Lesson 28 - AAA RADIUS and TACACS+, Difference between RADIUS and TACACS+

Lesson 29 - Cisco ACS Secure Access Control System Products

Lesson 30 - How to install Cisco ACS (Secure Access Control Server ) 5.4 on VMware Workstation

Lesson 31 - How to connect manage and configure Cisco ACS using web browser

Lesson 32 - How to create and add an internal user in Cisco ACS

Lesson 33 - How to create and add AAA clients (Network devices like Routers and Switches) in Cisco ACS

Lesson 34 - What are AAA Method Lists and IOS commands for creating AAA Method Lists in Cisco Router or Switch

Lesson 35 - Cisco Router/Switch AAA Login Authentication configuration using TACACS+ and RADIUS Protocols through IOS Commands

Lesson 36 - Cisco Router/Switch AAA Login Authentication configuration using TACACS+ and RADIUS Protocols through CCP (Cisco Configuration Professional)

Lesson 37 - Cisco Secure ACS Shell Profiles and Command sets, How to configure Shell Profiles and Command sets in ACS

Lesson 38 - How to configure Cisco Routers and Switches with AAA Authorization and Accouting using TACACS+ protocol through IOS Commands

Lesson 39 - Troubleshooting AAA using Debug Commands

Lesson 40 - Parser Views - Role Based Access Control (RBAC)

Lesson 41 - Introduction to Syslog in Cisco Routers and Switches

Lesson 42 - How to install and configure Kiwi Syslog Server for Cisco Routers and Swiches

Lesson 43 - How to use CCP to view Syslog messages stored in Cisco Router/Switch Memory

Lesson 44 - What is SNMP (Simple Network Management Protocol)

Lesson 45 - How to configure Cisco Router/Switch for SNMP through IOS CLI

Lesson 46 - How to configure Cisco Router/Switch for SNMP through CCP

Lesson 47 - Why Network Time Synchronization is important

Lesson 48 - Introduction to NTP (Network Time Protocol), NTP Stratum Levels

Lesson 49 - NTP (Network Time Protocol) Modes of Operation

Lesson 50 - How to configure Cisco Routers and Switches to synchronize time using NTP through IOS CLI

Lesson 51 - How to configure Cisco Routers and Switches to synchronize time using NTP through CCP

Lesson 52 - Out-of-Band (OOB) Management of Network Devices

Windows 2003

Part 01 - Introduction to Windows 2003

Lesson 01 - Introduction to Windows 2003

Lesson 02 - Windows 2003 family Editions

Lesson 03 - Hardware Requirements

Lesson 04 - Windows 2003 Installation - Character phase

Lesson 05 - Windows 2003 Installation - Graphics phase

Part 02 - Disk Management

Lesson 01 - Difference between Basic and Dynamic disks

Lesson 02 - How to create a Primary Partition

Lesson 03 - How to create an Extended Partiton

Lesson 04 - How to create a Logical Drive

Lesson 05 - How to convert basic disk to dynamic disk

Lesson 06 - Dynamic Volumes- Simple Volume

Lesson 07 - How to create a Simple Volume

Lesson 08 - Dynamic Volumes - Spanned Volume

Lesson 09 - How to create a Spanned Volume

Lesson 10 - Dynamic Volumes - Striped Volume

Lesson 11 - How to create a Striped Volume

Lesson 12 - Dynamic Volumes - Mirrored Volume

Lesson 13 - How to create a Mirrored Volume

Lesson 14 - Dynamic Volumes - Striping with parity (RAID-5) Volume

Lesson 15 - How to create a triping with parity (RAID-5) Volume

Part 03 - Managing Files and Folders

Lesson 01 - New Technology File System (NTFS)

Lesson 02 - New Technology File System (NTFS) Attributes

Lesson 03 - NTFS Permissions

Lesson 04 - Standard Permissions

Lesson 05 - Special Permissions

Lesson 06 - Relation between Standard Permissions and Special Permissions

Lesson 07 - Permission Changes While Moving or Copying an NTFS File

Lesson 08 - How to take the Ownership of a file

Lesson 08 - How to take the Ownership of a file

Lesson 09 - Introduction to Folder Sharing

Lesson 10 - How to share a folder using Windows Explorer

Lesson 11 - How to share a folder on a remote computer using Shared Folders snap-in

Lesson 12 - Share Permissions

Lesson 13 - Introduction to Offline Files and Folders

Lesson 14 - How to enable Offline Files

Lesson 15 - How to make files available Offline

Lesson 16 - Introduction to Disk Quotas

Lesson 17 - How to configure Disk Quota

Lesson 18 - Introduction to Encrypting File System (EFS)

Lesson 19 - Encrypting File System (EFS) - Encryption Process

Lesson 20 - Encrypting File System (EFS) - Decryption Process

Lesson 21 - How to encrypt and decrypt a file or folder using Encrypting File System (EFS)

Lesson 22 - Encrypted Data Recovery

Part 04 - Backup and Restore

Lesson 01 - Introduction to Windows 2003 Backup Utility (ntbackup.exe)

Lesson 02 - Normal Backup (Full backup)

Lesson 03 - Incremental Backup

Lesson 04 - Differential Backup

Lesson 05 - Copy and Daily Backup

Lesson 06 - Backup Combinations

Lesson 07 - How to Backup Files or Folders

Lesson 08 - How to Backup the System State

Lesson 09 - How to Schedule a Backup

Part 05 - Active Directory

Lesson 01 - What is Directory Service?

Lesson 02 - Introduction to Directory Standards

Lesson 03 - What is Active Directory (AD)?

Lesson 04 - What is Active Directory (AD) Forest?

Lesson 05 - What is Active Directory (AD) Tree?

Lesson 06 - What is Active Directory (AD) Domain?

Lesson 07 - What is a Domain Controller (DC)?

Lesson 08 - What is Organizational Unit (OU)?

Lesson 09 - Active Directory Trusts and Trust Types.

Lesson 10 - What is Active Directory Schema?

Lesson 11 - Windows 2003 Active Directory Installation - How to configure static IP address.

Lesson 12 - Windows 2003 Active Directory Installation - How to install DNS

Lesson 13 - Windows 2003 Active Directory Installation - Running Dcpromo

Lesson 14 - How add a computer to an Active Directory Domain?

Lesson 15 - Active Directory files and their functions

Lesson 16 - What is Active Directory Naming Context or Directory Partition?

Lesson 17 - What is Active Directory Replication?

Lesson 18 - Introduction to Active Directory Sites

Lesson 19 - How to create an Active Directory site

Lesson 20 - How to move Domain Controllers between Active Directory Sites

Lesson 21 - How to create and configure subnets for Active Directory Sites

Lesson 22 - What is Active Directory Site Link?

Lesson 23 - How to create Active Directory Site Link

Lesson 24 - How to configure Site Link attributes

Lesson 25 - What is bridgehead server , preferred bridgehead server and Knowledge Consistency Checker (KCC)

Lesson 26 - What is Site Link Bridge and How to create Site Link Bridge

Lesson 27 - What is Active Directory Global Catalog?

Lesson 28 - How to configure a Domain Controller as Global Catalog Server

Lesson 29 - What is Universal Group Membership caching

Lesson 30 - How to configure Universal Group Membership caching

Lesson 31 - Operations Master Roles (Flexible Single Master Operations - FSMO)

Lesson 32 - How to transfer Operations Master roles (FSMO) to another Domain Controller

Lesson 33 - How to seize Operations Master (FSMO) roles using ntdsutil tool

Part 06 - User and Group Administration

Lesson 01 - Introduction to Windows 2003 User accounts

Lesson 02 - Windows 2003 Local User Accounts

Lesson 03 - Windows 2003 Built-in User Accounts

Lesson 04 - Windows 2003 Active Directory Domain User Accounts

Lesson 05 - Windows 2003 Logon Names

Lesson 06 - UPN (User Principal Name) Suffixes

Lesson 07 - How to create an Active Directory Domain user account

Lesson 08 - Modifying and administering Active Directory Domain User Accounts

Lesson 09 - How to reset Active Directory domain user password

Lesson 10 - How to unlock an Active Directory Domain User Account

Lesson 11 - How to rename an Active Directory Domain user account

Lesson 12 - How to delete an Active Directory Domain user account

Lesson 13 - How to copy an Active Directory Domain user account

Lesson 14 - How to enable/disable Active Directory Domain User Account

Lesson 15 - Active Directory Domain User Password Policy

Lesson 16 - Active Directory Domain User Account Lockout Policy

Lesson 17 - Introduction to Windows 2003 Groups

Lesson 18 - What is the difference between Security Group and Distribution Group

Lesson 19 - Group Scope - Domain Local, Global and Universal Group Scopes

Lesson 20 - How to create an Active Directory Group

Lesson 21 - How to add an Active Directory User to a Group

Part 07 - Windows 2003 Clustering Technologies

Lesson 01 - Introduction to Windows 2003 Clustering

Lesson 02 - Introduction to Network Load Balancing (NLB)

Lesson 03 - Network Load Balancing (NLB) - Unicast and Multicast modes

Lesson 04 - Network Load Balancing (NLB) cluster models

Lesson 05 - Network Load Balancing Manager (nlbmgr.exe)

Lesson 06 - How to create Network Load Balancing (NLB) cluster using nlbmgr.exe

Lesson 07 - Network Load Balancing Client Affinity and Port Configurations

Lesson 08 - How to add a node to Windows 2003 Network Load Balancing Cluster

Lesson 09 - Introduction to Windows 2003 Failover Server Clustering

Lesson 10 - Important definitions related with Server Failover Clustering

Lesson 11 - What is failover and failback

Lesson 12 - Server Cluster Resources and Resource Groups

Lesson 13 - Different types of Failover Server Clusters - Single-Quorum Cluster, Single Local Quorum and Majority Node Set (MNS)

Lesson 14 - Failover Server Cluster Modes - Active/Passive and Active/Active

Lesson 15 - Failover Server Cluster Pre-installation check-lists

Lesson 16 - How to install a Failover Server Cluster

Lesson 17 - How to add a node to a Failover Server Cluster

Part 08 - Windows 2003 Group Policy

Lesson 01: Introduction to Windows 2003 Group Policy

Lesson 02: Local Group policy

Lesson 03: Non-Local Group Policy

Lesson 04: Group Policy Processing Order

Lesson 05: Group Policy Object Editor

Lesson 06 Group Policy Settings

Lesson 07: Group Policy Inheritance

Lesson 08: Group Policy Loop Back Processing

Lesson 09: Group Policy Update Using gpupdate tool

Lesson 10: Local User Profiles

Lesson 11: Roaming Profiles and Mandatory Profiles

Lesson 12 - User Profile Folder Redirection

Lesson 13 - The Resultant Set of Policy (RSoP)

Lesson 14 - Configuring logon/logoff and startup/shutdown scripts

Lesson 15 - Deploying Software with Group Policy

Lesson 16 - Software Restriction policies

Windows 2008

Part 01 - Introduction to Windows 2008 Server

Lesson 01 - Introduction to Windows 2008 Server

Lesson 02 - New features of Windows 2008 Server

Lesson 03 - Hardware requirements for Windows 2008 Server installation

Lesson 04 - How to install Windows 2008 Server

Lesson 05 - Initial Configuration Tasks (ICT)

Lesson 06 - Server Manager

Lesson 07 - Boot Configuration Data (BCD)

Lesson 08 - Boot Configuration Data (BCD) Architecture

Lesson 09 - Boot Configuration Data (BCD) Objects

Lesson 10 - Boot Configuration Data (BCD) Elements

Lesson 11 - Boot Configuration Data Store Editor (BCDEdit) Options

Lesson 12 - How to use Boot Configuration Data Store Editor (BCDEdit) to manage BCD stores

Part 02 - Server Core

Lesson 01 - Introduction to Windows 2008 Server Core

Lesson 02 - Options, roles and features available with Windows 2008 Server Core installation

Lesson 03 - Windows 2008 Server Core installation

Lesson 04 - Initial configuration of a Windows 2008 Server Core installation

Lesson 05 - How to configure TCP/IP settings of a Windows 2008 Server Core installation

Lesson 06 - Different options to manage a Windows 2008 Server Core computer

Lesson 07 - Managing a Windows 2008 Server Core installation locally using command prompt

Lesson 08 - Managing a Windows 2008 Server Core installation remotely using Terminal Services

Lesson 09 - Managing a Windows 2008 Server Core installation remotely using Server Administration Tools

Lesson 10 - Managing a Windows 2008 Server Core installation remotely using WinRM/WinRS

Lesson 11 - How to join Windows 2008 Server Core Computer to Active Directory Domain

Lesson 12 - How to activate Windows 2008 Server Core Computer

Lesson 13 - How to enable Automatic Updates for Windows 2008 Server Core Computer

Lesson 14 - How to configure Display Resolution of Windows 2008 Server Core Computer

Lesson 15 - How to create and manage network shares in Windows 2008 Server Core Computer

Lesson 16 - How to configure firewall on Windows 2008 Server Core Computer

Lesson 17 - How to list, install and manage Roles and Features in Windows 2008 Server Core Computer

Part 03 - PowerShell

Lesson 01 - Introduction to PowerShell

Lesson 02 - How to install PowerShell in Windows 2008 Server

Lesson 03 - What is a PowerShell cmdlet

Lesson 04 - How to get help in PowerShell

Lesson 05- How to find all the Cmdlets with particular Verb

Lesson 06 - How to find all the Cmdlets with particular Noun

Lesson 07 - What is a PowerShell Alias

Lesson 08 - How to create or remove aliases in PowerShell

Lesson 09 - PowerShell Pipelines

GNU/Linux

Part 1 - RedHat Certified Engineer (RHCE)

Lesson 01 - UNIX History

Lesson 02 - GNU/Linux Introduction

Lesson 03 - GNU/Linux Concepts

Lesson 04 - Difference between Fedora and RedHat Enterprise Linux

Lesson 05 - Major GNU/Linux Distributions

Lesson 06 - GNU/Linux Kernel and Shell

Lesson 07 - GNU/Linux File System

Lesson 08 - What is inode number?

Lesson 09 - GNU/Linux File System Hierarchy

Lesson 10 - GRUB (GNU GRand Unified Boot loader)

Lesson 11 - Working with grub.conf configuration file

Lesson 12 - How to password protect GRUB (GNU GRand Unified Boot loader)

Lesson 13 - Linux Rescue Mode (Linux Rescue Environment)

Lesson 14 - init process and Linux runlevels

Lesson 15 - inittab configuration file

Lesson 16 - Working with inittab configuration file

Lesson 17 - inittab format

Lesson 18 - Creating and editing text files using vi editor

Lesson 19 - Linux File System Management Tools - fdisk command

Lesson 20 - Linux File System Management Tools - mkfs, mkfs.ext2, mkfs.ext3 commands

Lesson 21 - What is file system journaling?

Lesson 22 - Linux File System Management Tools - fsck command

Lesson 23 - Introduction to Linux /etc/fstab file

Lesson 24 - Linux mount and umount commands

Lesson 25 - Linux mount options

Lesson 26 - Introduction to Bourne Again Shell (BASH)

Lesson 27 - Basic Linux commands

Lesson 28 - Introduction to Logical Volume Manager (LVM)

Lesson 29 - How to create and manage Logical Volume Manager (LVM)

Lesson 30 - Introduction to Redundant Array of inexpensive (or Independent) Disks (RAID)

Lesson 31 - How to create and manage Redundant Array of Inexpensive Disks (RAID)

Lesson 32 - Introduction to swap space

Lesson 33 - How to create and manage swap space

Lesson 34 - Introduction to Linux user administration

Lesson 35 - How to add a user in Linux using useradd command

Lesson 36 - How to use passwd command to manage user passwords

Lesson 37 - How to modify a Linux user using usermod command

Lesson 38 - How to set Linux password aging using chage command

Lesson 39 - How to remove user from Linux using userdel command

Lesson 40 - The Linux user database (/etc/passwd)

Lesson 41 - The Linux password database (/etc/shadow)

Lesson 42 - Introduction to Linux User Group

Lesson 43 - How to create a new group in Linux using groupadd command

Lesson 44 - Linux Group Database (/etc/group) file

Lesson 45 - How to manage Linux user group

Lesson 46 - The Linux File Permissions

Lesson 47 - How to use chmod command to change Linux file permissions

Lesson 48 - How to use chgrp command to change Linux group ownership of a file

Lesson 49 - How to use chown command to change linux user ownership of a file

Lesson 50 - Linux setuid and setgid

Lesson 51 - What is Linux umask?

Lesson 52 - What is Security-enhanced Linux (SELinux), Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-based Access Control (RBAC)?

Lesson 53 - Security-enhanced Linux (SELinux) Security Contexts

Lesson 54 - How Security-enhanced Linux (SELinux) works

Lesson 55 - Security-enhanced Linux (SELinux) configuration-file (/etc/selinux/conf)

Lesson 56 - Security-enhanced Linux (SELinux) - Filesystem Relabeling

Lesson 57 - Important Security-enhanced Linux (SELinux) commands

Lesson 58 - Introduction to Linux Disk Quota

Lesson 59 - How to create Linux disk quota database files (aquota.group and aquota.user) using quotacheck command

Lesson 60 - How to turn on and turn off Linux disk quota using quotaon and quotaoff commands

Lesson 61 - How to manage Linux disk quota using edquota and repquota commands

Lesson 62 - Introduction to scheduling tasks using Linux cron daemon

Lesson 63 - How to schedule a task using Linux crontab (/etc/crontab) file

Lesson 64 - How to schedule tasks using Linux at command

Lesson 65 - Linux File filter commands sort wc and grep

Lesson 66 - How to compress, uncompress and view files using Linux commands gzip, gunzip and zcat

Lesson 67 - How to compress uncompress view files using Linux commands bzip2 bunzip2 and bzcat

Lesson 68 - How to use Linux tar (tape archive) command to create archives

Lesson 69 - Introduction to RedHat Package Manager (RPM)

Lesson 70 - Introduction to YUM (Yellow dog Updater, Modified) Package Manager

Lesson 71 - Common Linux network tools - ping, telnet, netstat and arp

Lesson 72 - Linux xinetd Super Server daemon

Lesson 73 - Linux Network Interface Configuration tool - ifconfig

Lesson 74 - Important Linux network configuration files

Lesson 75 - How to configure Dynamic Host Configuration (DHCP) Protocol in Linux

Lesson 76 - Introduction to Domain Name System (DNS)

Lesson 77 - Linux Domain Name System (DNS) client configuration files /etc/hosts, /etc/nsswitch.conf and /etc/resolv.conf

Lesson 78 - Berkeley Internet Name Domain (BIND) as a DNS server

Lesson 79 - How to configure caching-only name server

Lesson 80 - BIND configuration file (/etc/named.conf)

Lesson 81 - Domain Name System (DNS) zone files

Lesson 82 - RNDC (Remote Name Daemon Control)

Lesson 83 - Introduction to Secure Shell and OpenSSH

Lesson 84 - Important OpenSSH client tools - scp, sftp, ssh, ssh-keygen, ssh-copy-id, slogin

Lesson 85 - OpenSSH Configuration Files

Lesson 86 - How to mount a remote File System using Network File System (NFS)

Lesson 87 - How to configure Very Secure File Transfer Protocol Daemon (vsFTPd)

Lesson 88 - Introduction to Network Time Protocol (NTP)


eXTReMe Tracker DMCA.com