In this practical course, you will learn to develop a complete understanding of all the concepts and topics you need to master in order to achieve the most sought-after networking certification today. With its easy-to-understand, structured approach, this course will enable you to master Cisco networking to the CCNA level, and beyond, in no time.
The course focuses on the five domains that should be known for the CompTIA PenTest+ PT0-002 exam. Learn to successfully plan and scope a pen test engagement with a client, find vulnerabilities, exploit them to get into a network, then report on those findings to the client with the help of this comprehensive course.
This comprehensive course covers 100% of the HashiCorp Vault Operations Professional exam content through engaging lectures, demos, and hands-on exercises. With access to our exclusive hands-on labs, you can practice configuring Vault in real-world scenarios. This course covers both Vault Open-Source and Vault Enterprise features and includes an exam-like quiz for each exam objective.
Overview This comprehensive course on Encryption will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Encryption comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Encryption. It is available to all students, of all academic backgrounds. Requirements Our Encryption is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 7 sections • 14 lectures • 00:40:00 total length •Overview: 00:01:00 •Motivation: Why do we Encrypt?: 00:04:00 •What Does Encrypting Mean?: 00:03:00 •Basics: Symmetric and Asymmetric Encryption: 00:04:00 •Hybrid Encryption: 00:03:00 •Password-Based Encryption: 00:01:00 •Algorithms: 00:02:00 •Technical Parameters for Encryption I: 00:07:00 •Technical Parameters for Encryption II: 00:03:00 •Cryptographic Key Formats: 00:01:00 •Java program Demonstration: Plaintext to AES Encryption Text: 00:03:00 •File and System Encryption: 00:07:00 •Conclusion: 00:01:00 •Assignment - Encryption: 00:00:00
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security
Course Overview Learn how to use the most critical part of IT security and the critical role it plays in protecting our digital data with this comprehensive Conversation on Cryptography. The use of practical cryptography is essential for the installation and maintenance of IT security protection. This course provides extensive and expert tuition for the most valuable cyphers and methods for safeguarding an IT environment. This Cryptography course provides an excellent overview of the cryptographic principles that need to be understood and mastered in an IT security role. You will be shown the most appropriate cyphers to use for different settings, types of asymmetric methods, usage of Public Key Infrastructure (PKI), and much more. If you want to gain the highest level of cybersecurity expertise, this will be the ideal choice for your learning needs. Enrol now and keep the cybercriminals in their place. This best selling Conversation on Cryptography has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Conversation on Cryptography is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Conversation on Cryptography is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Conversation on Cryptography is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Conversation on Cryptography, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Conversation on Cryptography will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Conversation on Cryptography to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.
24 Hour Flash Deal **25-in-1 Java Certification Cryptography Architecture Mega Bundle** Java Certification Cryptography Architecture Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Java Certification Cryptography Architecture package online with Studyhub through our online learning platform. The Java Certification Cryptography Architecture bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Java Certification Cryptography Architecture course provides complete 360-degree training on Java Certification Cryptography Architecture. You'll get not one, not two, not three, but twenty-five Java Certification Cryptography Architecture courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Java Certification Cryptography Architecture courses are yours for as long as you want them once you enrol in this course This Java Certification Cryptography Architecture Bundle consists the following career oriented courses: Course 01: Java Certification Cryptography Architecture Course 02: jQuery Masterclass Course: JavaScript and AJAX Coding Bible Course 03: SQL Programming Course 04: PHP Web Development with MySQL Course 05: Intermediate Python Coding Course 06: Master JavaScript with Data Visualization Course 07: Learn MySQL from Scratch for Data Science and Analytics Course 08: ASP.Net MVC and Entity Framework Course 09: Building a TodoMVC Application in Vue, React and Angular Course 10: Penetration Testing with OWASP ZAP: Mastery course Course 11: Complete Web Development Course 12: Start Your Career as Web Developer Course 13: Learn Spring & Angular Material with a Full Web Application Course 14: Node JS: API Development with Swagger Interface Description Language Course 15: Mobile and Web Development with Ionic & Angular JS Course 16: Web Applications for Specialisation on Development Course 17: Secure Programming of Web Applications Course 18: Web Application Penetration Testing Course 19: Responsive Web Design Course 20: C Programming Language Course 21: C++ Programming Course 22: Flutter & Dart Development Course Course 23: Build Progressive Web Apps with Angular Course 24: Learn How To Create a Web App for iPad Course 25: Bash Scripting, Linux and Shell Programming The Java Certification Cryptography Architecture course has been prepared by focusing largely on Java Certification Cryptography Architecture career readiness. It has been designed by our Java Certification Cryptography Architecture specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Java Certification Cryptography Architecture Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Java Certification Cryptography Architecture bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Java Certification Cryptography Architecture Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Java Certification Cryptography Architecture Elementary modules, allowing our students to grasp each lesson quickly. The Java Certification Cryptography Architecture course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Java Certification Cryptography Architecture bundle, you really hit the jackpot. Here's what you get: Step by step Java Certification Cryptography Architecture lessons One to one assistance from Java Certification Cryptography Architectureprofessionals if you need it Innovative exams to test your knowledge after the Java Certification Cryptography Architecturecourse 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all twenty-five Java Certification Cryptography Architecture courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your Java Certification Cryptography Architecture certificate and transcript on the next working day Easily learn the Java Certification Cryptography Architecture skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Java Certification Cryptography Architecture training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Java Certification Cryptography Architecture Requirements To participate in this Java Certification Cryptography Architecture course, all you need is - A smart device A secure internet connection And a keen interest in Java Certification Cryptography Architecture Career path You will be able to kickstart your Java Certification Cryptography Architecture career because this course includes various courses as a bonus. This Java Certification Cryptography Architecture is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Java Certification Cryptography Architecture career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free
This interactive course will help you to gain a solid understanding of cryptography. With the help of engaging activities and examples, you'll be familiarized with different security certificates and become confident in deploying PKI on Windows Servers.
Embark on a journey into the world of Java cryptography with our course, 'Java Certification Cryptography Architecture.' This course is designed to provide a deep dive into the critical aspects of Java's cryptographic capabilities, offering a blend of theoretical knowledge and practical application. Start with the basics in our introductory section, which sets the stage for a deeper exploration of Java Cryptography Architecture. As you progress, the course meticulously unfolds the complexities of message digest algorithms, MAC (Message Authentication Code), and PBKDF2 (Password-Based Key Derivation Function 2). This course is not just about coding; it's a comprehensive guide to understanding and implementing Java-based cryptographic solutions in real-world applications. Advance through the curriculum and discover practical examples of hashing, both simple and real-world, enhancing your ability to secure data effectively. Delve into efficient stream-based hashing and learn how to implement robust password hashing using PBKDF2. The course also includes a section on commercial wrapper libraries, demonstrating the integration of Java cryptography in commercial applications. By the conclusion of the course, you'll not only be proficient in Java Cryptography Architecture but also equipped with the skills to apply these cryptographic techniques in various professional scenarios, ensuring data security and integrity. Learning Outcomes Develop a foundational understanding of Java Cryptography Architecture. Learn to implement hashing algorithms and message digest techniques in Java. Gain expertise in creating and using MAC for data security. Master the application of PBKDF2 for secure password hashing. Understand the use of commercial wrapper libraries in Java cryptography. Why choose this Java Certification Cryptography Architecture course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Java Certification Cryptography Architecture course for? Software developers and programmers looking to specialize in Java cryptography. IT professionals seeking to enhance their data security skills. Computer science students interested in cryptography and data protection. System architects designing secure Java-based applications. Security enthusiasts keen on exploring Java's cryptographic capabilities. Career path Java Developer: £25,000 - £50,000 Software Engineer (Java): £30,000 - £60,000 Information Security Analyst: £35,000 - £70,000 Cryptography Engineer: £40,000 - £80,000 Application Security Developer: £38,000 - £75,000 Systems Architect (Java): £45,000 - £85,000 Prerequisites This Java Certification Cryptography Architecture does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Java Certification Cryptography Architecture was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Introductory Lecture 00:02:00 Setup 00:03:00 Section 02: Java Cryptography Architecture: MessageDigest, MAC & PBKDF2 Simple Hashing Example 00:05:00 Real-world Hashing Example 00:07:00 Efficient Stream-Based Hashing 00:02:00 Message Authentication Code (MAC) 00:05:00 Secure Password Hashing with PBKDF2/PKCS#5 00:10:00 Section 03: Outro Commercial Wrapper Libraries: Demo 00:03:00 JCE Unlimited Strength Policy File Installation 00:03:00 Assignment Assignment - Java Certification Cryptography Architecture 00:00:00
Course Overview The Java Cryptography Architecture: Secure Password Hashing course has been designed for junior and senior Java Developers who wish to gain a comprehensive understanding of the Java cryptography architecture. The knowledge provided in this course can be applied to web applications (Swing, AWT, SWT/RCP, JavaFX), Java-based desktop applications, and backend applications, as well as Android apps. Broken down into three core modules, this training program covers the key areas of Java cryptography architecture, through easy to follow video tutorials and instructor-led guidance. Study as a part-time or full-time learner and gain in-demand industry skills by learning from the experts. This best selling Java Cryptography Architecture: Secure Password Hashing has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Java Cryptography Architecture: Secure Password Hashing is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Java Cryptography Architecture: Secure Password Hashing is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Java Cryptography Architecture: Secure Password Hashing is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Java Cryptography Architecture: Secure Password Hashing, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Java Cryptography Architecture: Secure Password Hashing will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Java Cryptography Architecture: Secure Password Hashing to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.
Overview This comprehensive course on Java Certification Cryptography Architecture will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Java Certification Cryptography Architecture comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Java Certification Cryptography Architecture. It is available to all students, of all academic backgrounds. Requirements Our Java Certification Cryptography Architecture is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 4 sections • 10 lectures • 00:40:00 total length •Introductory Lecture: 00:02:00 •Setup: 00:03:00 •Simple Hashing Example: 00:05:00 •Real-world Hashing Example: 00:07:00 •Efficient Stream-Based Hashing: 00:02:00 •Message Authentication Code (MAC): 00:05:00 •Secure Password Hashing with PBKDF2/PKCS#5: 00:10:00 •Commercial Wrapper Libraries: Demo: 00:03:00 •JCE Unlimited Strength Policy File Installation: 00:03:00 •Assignment - Java Certification Cryptography Architecture: 00:00:00
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.