Certified Information Systems Security Professional Training (CISSP) - Mantesh

seeders: 34
leechers: 455
Added on January 10, 2015 by Manteshin Books > Ebooks
Torrent verified.



Certified Information Systems Security Professional Training (CISSP) - Mantesh (Size: 8.51 GB)
 despre tot.doc61 KB
 Despre.txt39.62 KB
 DVD1.iso947.28 MB
 DVD1.mds4.22 KB
 dvd10.iso613.83 MB
 dvd10.mds4.22 KB
 DVD2.iso1.18 GB
 DVD2.mds4.22 KB
 DVD3.iso1.25 GB
 DVD3.mds4.22 KB
 DVD4.iso439.38 MB
 DVD4.mds4.22 KB
 DVD5.iso773 MB
 DVD5.mds4.22 KB
 DVD6.iso1.57 GB
 DVD6.mds4.22 KB
 dvd7.iso326.37 MB
 dvd7.mds4.22 KB
 dvd8.iso744.49 MB
 dvd8.mds4.22 KB
 dvd9.iso768.94 MB
 dvd9.mds4.22 KB
 Torrent_downloaded_from_Demonoid.com.txt86 bytes

Description


[color=Green]
Books : Computers and Technology : English
Domain 1 - Information Security and Risk Management
Information Security and Risk Management
Mainframe Days
In the Good Old Days –Who Knew?
Today’s Environment
Security Definitions
Vulnerabilities
Examples of Some Vulnerabilities that Are Not Always Obvious
Risk – What Does It Really Mean?
Relationships
Who Deals with Risk?
Overall Business Risk
Who?
AIC Triad
Availability
Integrity
Confidentiality
Who Is Watching?
Social Engineering
What Security People Are Really Thinking
Security Concepts
Security?
The Bad Guys Are Motivated
If Not Obscurity – Then What?
Open Standards
Common Open Standards
Without Standards
“Soft” Controls
Logical Controls
Physical Controls
Are There Gaps?
Understanding Drivers
Holistic Security
Not Always So Easy
What Is First?
Different Types of Law
How Is Liability Determined?
Examples of Due Diligence
Examples of Due Care
Prudent Person Rule
Prudent Person
Taking the Right Steps
Regulations
Why Do We Need Regulations?
Risk Management
Why Is Risk Management Difficult?
Necessary Level of Protection Is Different for Each Organization
Security Team/Committee
Risk Management Process
Planning Stage – Team
Analysis Paralysis
Planning Stage – Scope
Planning Stage – Analysis Method
Risk Management Tools
Defining Acceptable Levels
Acceptable Risk Level
Collecting and Analyzing Data Methods
What Is a Company Asset?
Data Collection – Identify Assets
Data Collection – Assigning Values
Asset Value
Data Collection – Identify Threats
Data Collection – Calculate Risks
Scenario Based – Qualitative
Risk Approach
Qualitative Analysis Steps
Want Real Answers?
Qualitative Risk Analysis Ratings
Qualitative Risks
Quantitative Analysis Steps
Quantitative Analysis
How Often Will This Happen?
ARO Values and Their Meaning
Calculate ALE
ALE Value Uses
Relationships
Calculate Risks – ALE Example
Your Turn!
ALE Calculation
Can a Purely Quantitative Analysis Be Accomplished?
Risk Types
Examples of Types of Losses
Delayed Loss
Cost/Benefit Analysis
Cost of a Countermeasure
Cost/Benefit Analysis Countermeasure Criteria
Calculating Cost/Benefit
Controls
Control Selection Requirements
Quantitative Analysis
Quantitative Analysis Disadvantages
Qualitative Analysis Approach
Qualitative Analysis Disadvantages
Can You Get Rid of All Risk?
Calculating Residual Risk
Uncertainty Analysis
Dealing with Risk
Management’s Response to Identified Risks
Risk Acceptance
Risk Analysis Process Summary
Components of Security Program
A Layered Approach
In Security, You Never Want Any Surprises
Building Foundation
Security Roadmap
Functional and Assurance Requirements
Building Foundation
Most Organizations
Silo Security Structure
Islands of Security Needs and Tools
Get Out of a Silo Approach
Security Is a Process
Approach to Security Management
Result of Battling Management
Industry Best Practices Standards
ISO/IEC 17799
Pieces and Parts
Numbering
New ISO Standards
COBIT
Inside of COBIT
COBIT – Control Objectives
Measurements
Information Technology Infrastructure Library
Security Governance
Security Program Components
Policy Framework
Policy Types
Organizational Policy
Policy Approved – Now What?
Issue-Specific Policies
ASP Policy Example
System-Specific Policies
Standards
Standard Example
Baseline
Data Collection for Metrics
Guidelines
Procedures
Tying Them Together
Program Support
Entity Relationships
Senior Management’s Role
Security Roles
Custodian
Auditor
Access
Information Classification
Information Classification Program
Data Leakage
Do You Want to End Up in the News?
Types of Classification Levels
Data Protection Levels
Classification Program Steps
Information Classification Components
Procedures and Guidelines
Classification Levels
Information Classification Criteria
Criteria Example
Or Not
Information Owner Requirements
Clearly Labeled
Testing Classification Program
Who Is Always Causing Problems?
Employee Management
Employee Position and Management
Hiring and Firing Issues
A Few More Items
Unfriendly Termination
Security Awareness and Training
Training Characteristics
Awareness
Security Enforcement Issues
Answer This Question
Domain 1 Review

Domain 2 - Access Control Domain Objectives
Agenda 1
Definitions
Access Control Mechanism Examples
Technical Controls
Administrative Controls
Access Control Characteristics
Preventive Controls
Preventive - Administrative Controls
Preventive – Physical Controls
Preventive - Technical Controls
Control Combinations
Detective - Administrative Control
Detective Examples
Administrating Access Control
OS, Application, Database
Administrating Access Control
Authorization Creep
Accountability and Access Control
Trusted Path
Fake Login Pages Look Convincing
Who Are You?
Identification Issues
Authentication Mechanisms Characteristics
Strong Authentication
Fraud Controls
Internal Control Tool: Separation of Duties
Authentication Mechanisms in Use Today
Biometrics Technology
Biometric Devices
Example
Verification Steps
What a Person Is
Why Use Biometrics?
Biometric Type
Identification or Authentication?
Iris Sampling
Iris
Finger Scan
Hand Geometry
Facial Recognition
Comparison
Biometrics Verification
Issues
Downfalls to Biometric Use
Biometrics Error Types
Crossover Error Rate
Biometric System Types
Passwords
Password Generators
Password “Shoulds”
Support Issues
Password Attacks
Attack Steps
Many Tools to Break Your Password
Rainbow Table
Passwords Should NOT Contain…
What’s Left?
Countermeasures for Password Cracking
Cognitive Passwords
One-Time Password Authentication
Synchronous Token
One Type of Solution
Synchronous Steps
Administrator Configures
Challenge Response Authentication
Asynchronous Token Device
Asynchronous Steps
Challenge Response Authentication
Cryptographic Keys
Passphrase Authentication
Key Protection
Memory Cards
Memory Card Characteristics
Smart Card
Characteristics
Card Types
Smart Card Attacks
Software Attack
Side Channel Attack
Side Channel Data Collection
Microprobing
Identity Management
How Are These Entities Controlled?
Some Current Issues
Management
Typical Chaos
Different Identities
Identity Management Technologies
Directory Component
Enterprise Directory
Directory Responsibilities
Authoritative Sources
Meta Directory
Directory Interactions
Web Access Management
Web Access
Password Management
Legacy Single Sign-On
Account Management Systems
Provisioning Component
Provisioning
Not Just Computers
Profile Update
Working Together
Enterprise Directory
Identity Management Solution Components
Right for Your Company
What you need to know
Federated Identity
Identity Theft
Fake Login Tools
How Do These Attacks Work?
Attempts to Get Your Credentials
How Do These Work?
Instructional Emails
Knowing What You Are Disposing of Is Important
Other Examples
Another Danger to Be Aware of… Spyware
Is Someone Watching You?
What Does This Have to Do with My Computer?
Sometimes You Know that Software Is Installing on Your System
New Spyware Is Being Identified Every Week
Spyware Comes in Many Different Forms
How to Prevent Spyware
Different Technologies
Single Sign-on Technology
Single Sign-on
Directory Services as a Single Sign-on Technology
Active Directory
Some Technologies Can Combine Services
Security Domain
Domains of Trust
Domain Illustration
Thin Clients
Example
Kerberos as a Single Sign-on Technology
Kerberos Components Working Together
Pieces and Parts
More Components of Kerberos
KDC Components
Kerberos Steps
Tickets
Ticket Components
Authenticators
Steps of Validation
Kerberos Security
Why Go Through All of this Trouble?
Issues Pertaining to Kerberos
Kerberos Issues
SESAME as a Single Sign-on Technology
SESAME Steps for Authentication
Combo
Models for Access
Access Control Models
Discretionary Access Control Model
ACL Access
File Permissions
Enforcing a DAC Policy
Security Issues
Mandatory Access Control Model
MAC Enforcement Mechanism – Labels
Formal Model
Software and Hardware
Software and Hardware Guards
Where Are They Used?
SELinux
MAC Versus DAC
Role-Based Access Control
RBAC Hierarchy
RBAC and SoD
Acquiring Rights and Permissions
Rule-Based Access Control
Firewall Example
Access Control Matrix
Capability Tables
User Capability Tables
Temporal Access Control
Access Control Administration
Access Control Methods
Centralized Approach
Remote Centralized Administration
RADIUS
RADIUS Steps
RADIUS Characteristics
TACACS+ Characteristics
Diameter Characteristics
Diameter Protocol
Mobile IP
Diameter Architecture
Two Pieces
AVP
Decentralized Access Control Administration
Controlling Access to Sensitive Data
Protecting Access to System Logs
Accountability = Auditing Events
Agenda 2
IDS
IDS Steps
Network IDS Sensors
Host IDS
Combination
Types of IDSs
Signature-Based Example
Behavior-Based IDS
Statistical Anomaly
Statistical IDS
Protocol Anomaly
What Is a Protocol Anomaly?
Protocol Anomaly Issues
Traffic Anomaly
IDS Response Mechanisms
Responses to Attacks
IDS Issues
Intrusion Prevention System
Differences
Vulnerable IDS
Trapping an Intruder
Domain 2 Review

Domain 3 - Cryptography Objectives
Services Provided by Cryptography
Cryptographic Definitions
Cipher
Cryptanalysis
A Few More Definitions
Need Some More Definitions?
Now This Would be Hard Work
Symmetric Cryptography – Use of Secret Keys
Historical Uses of Symmetric Cryptography – Hieroglyphics
Scytale Cipher
Substitution Ciphers
Simple Substitution Cipher Atbash
Simple Substitution Cipher Caesar Cipher
Caesar Cipher Example
Simple Substitution Cipher ROT13
Historical Uses
Polyalphabetic Cipher – Vigenere Cipher
Polyalphabetic Substitution
Vigenere Algorithm
Enigma Machine
U-Boats had Enigma Machines
Code Book
Historical Uses of Symmetric Cryptography – Running Key and Concealment
Agenda 1
Transposition Ciphers
Key and Algorithm Relationship
Does Size Really Matter?
It Does with Key Sizes
Key space
Ways of Breaking Cryptosystems – Brute Force
Brute Force Components
Ways of Breaking Cryptosystems – Frequency Analysis
Strength of a Cryptosystem
Do You Know What You are Doing?
Developing Cryptographic Solutions In-House
Characteristics of Strong Algorithms
Open or Closed More Secure?
Agenda 2
Types of Ciphers Used Today
Type of Symmetric Cipher – Block Cipher
S-Boxes Used in Block Ciphers
Binary Mathematical Function 1
Type of Symmetric Cipher – Stream Cipher
Symmetric Characteristics
Initialization Vectors
Security Holes
Strength of a Stream Cipher
Let’s Dive in Deeper
Symmetric Key Cryptography
Out-of-Band Transmission
Symmetric Key Management Issue
Symmetric Algorithm Examples
Symmetric Downfalls
Why?
Asymmetric Cryptography
Key Functions
Public Key Cryptography Advantages
Asymmetric Algorithm Disadvantages
Confusing Names
Symmetric versus Asymmetric
Asymmetric Algorithm Examples
Questions 1
When to Use Which Key
Using the Algorithm Types Together
Encryption Steps
Receiver's Public Key Is Used to Encrypt the Symmetric Key
Receiver’s Private Key Is Used to Decrypt the Symmetric Key
Digital Envelope
E-mail Security
Secret versus Session Keys
Asymmetric Algorithms We Will Dive Into
Asymmetric Algorithm – Diffie-Hellman
Diffie-Hellman
Key Agreement Schemes
Asymmetric Algorithm – RSA
Factoring Large Numbers
RSA Operations
RSA Key Size
El Gamal
ECC
ECC Benefits
Asymmetric Mathematics
Asymmetric Security
Mathematics
Symmetric Ciphers We Will Dive Into
Symmetric Algorithms – DES
Block Cipher
Double DES
Evolution of DES
Modes of 3DES
Encryption Modes
Block Cipher Modes – CBC
IV and CBC
CBC Example
Different Modes of Block Ciphers –ECB
ECB versus CBC
Block Cipher Modes – CFB and OFB
CFB and OFB Modes
Counter Mode
Modes Summary
Symmetric Cipher – AES
IDEA
RC4
RC5
Agenda 3
Data Integrity
Hashing Steps
Protecting the Integrity of Data
Hashing Algorithms
Data Integrity Mechanisms
Hashing Strength
Question 1
Weakness in Using Only Hash Algorithms
More Protection in Data Integrity
MAC
HMAC – Sender
HMAC – Receiver
Another Look
What Services
Authentication Types
CBC-MAC
MAC Using Block Ciphers
Integrity?
What Services?
Question 2
Digital Signatures
One More Look 1
U.S. Government Standard
What is…
Not Giving up the Farm
Zero Knowledge Proof
Message Integrity Controls
Security Issues in Hashing
Example of a Birthday Attack
Birthday Attack Issues
Key Management
Key Backup
Key Management (Cont.)
Key Usage
Cryptoperiod
M-of-N
Key Types
Agenda 4
Why Do We Need a PKI?
PKI and Its Components
Components of PKI
PKI
PKI Steps
RA Roles
CA
Let’s Walk Through an Example
Digital Certificates
Certificate
Signing the Certificate
Verifying the Certificate
Trusted CA’s
Non-Trusted CA
One More Look 2
What Do You Do with a Certificate?
Components of PKI, Repository, and CRLs
Revoked?
CRL Process
Different Uses for Certificates
Lifecycle of a Certificate
Cross Certification
PKI and Trust
Agenda 5
Historical Uses of Symmetric Cryptography – Vernam Cipher
Binary Mathematical Function 2
One-Time Pad in Action
One-Time Pad Characteristics
Steganography
Steganography Utilities
Digital Watermarking
Link versus End-to-End Encryption
End-to-End Encryption
Encryption Location
Email Standards
You Decide
Non-Hierarchical
Secure Protocols
SSL Connection Setup
Example - SSL
Validating Certificate
Secure Protocols (Cont.)
SSL and the OSI Model
E-Commerce
How Are You Doing?
Hard the First Times Through
Secure Email Standard
Agenda 6
Network Layer Protection
IPSec Key Management
IPSec Handshaking Process
VPN Establishment
SAs in Use
Key Issues Within IPSec
Configuration of SA Parameters
IPSec Configuration Options
IPSec Is a Suite of Protocols
AH and ESP Modes
IPSec Modes of Operation
VPN Establishment (Cont.)
Review
Questions 2
Attack Types
Attacks on Cryptosystems
Known-Plaintext Attack
Chosen-Plaintext Attack
Chosen-Ciphertext Attack
Adaptive Attacks
Side Channel Attacks
Domain 3 Review

Domain 4 - Physical Security Objectives
Physical Security – Threats
Different Types of Threats
Categories of Threats
Wake Up Call
Not Just Hacking
Number One Priority
Legal Issues
Planning Phase
Physical Security Program Goals
Measurable Results
Planning Process
Risk Assessment Needs to be Carried Out
Deterrence
Deterrence Options
Delay
Another Delay Approach
Layered Defense Model
Layers of Defense
Detection
Assessment
Response
Weak Link in the Chain
Part of the Overall Security Program
Controls with the Same Goals
Agenda 1
Threat Categories
Crime Prevention through Environmental Design
Crux of Approach
Protection Built In
CPTED Examples
Natural Access Control
Access Control
CPTED Main Strategies
Target Hardening
Access Barriers
Facility Site Selection
Urban Camouflage
Facility Construction
Earthquake Protection
Construction Materials
Rebar Encased in Concrete
Pentagon with Reinforcements
Fire Resistance Walls
Data Center
Data Center Protection
Designing a Secure Site
Levels of Protection
Door Types
Hollow-Core Doors
Solid Core Doors
Bullet Proof Door
Door Component
Door Lock Types
Window Types
Controlling Access
Sensitive Areas
Possible Threats
Security Zones
Various Sensors
Lock Types
Controlling Keys
Smart Locks
Lock Picking
Entry Access Control
Facility Access
Wireless Proximity Devices
Device Types
Piggybacking
Entrance Protection
Mantraps
Door Configurations
External Boundary Protection
Perimeter Protection – Fencing
Detection Fencing
Detecting Intruders
Fencing Characteristics
Fencing Issues
Gates
What Level of Protection is Needed?
Bollards
Perimeter Protection – Lighting
Properly Laid Out
Lighting Issues
Perimeter Security – Security Guards
Guard Tasks
Security Guards
Monitoring
Level of Detail that is Required
CCTV
Items to Consider about CCTVs
CCTV Components
CCTV Lens Types
CCTV Components (Cont.)
Agenda 2
Types of Physical Intrusion



Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
8.51 GB
seeders:34
leechers:455
Certified Information Systems Security Professional Training (CISSP) - Mantesh

All Comments

Thanks great collections....
How to open this file ?
SEED PLEASE