
Either burn the ISO to disk, or Extract the ISO and hit 'autorun', enjoy
* Actors: Laura Chappell
* Directors: Laura Chappell
* Format: NTSC
* Region: Region 1 (U.S. and Canada only. Read more about DVD formats.)
* Number of discs: 1
* Studio: Wireshark University
* DVD Release Date: March 19, 2007
* Run Time: 8 minutes
* Average Customer Review: No customer reviews yet. Be the first.
* ASIN: B0012VPCRW
* Amazon.com Sales Rank: #204,045 in Movies & TV (See Bestsellers in Movies & TV)
(Studios: Improve Your Sales)
Would you like to update product info or give feedback on images?
Editorial Reviews
About the Actor
Laura Chappell is a highly-energetic speaker and author of numerous industry titles on network communications, analysis and security. She has presented to thousands of State, Federal and international law enforcement officers, judicial members, engineers, network administrators, technicians and developers. Ms. Chappell is a member of the High Technology Crime Investigation Association (HTCIA) and an Associate Member of the Institute for Electrical and Electronic Engineers (IEEE) since 1989. Her blend of humor, personal experiences, energy and clarity have earned her a top spot as an industry speaker at Microsoft, Novell, Hewlett-Packard, HTCIA and US Court conferences. In 2007, Ms. Chappell founded Wireshark University, an educational firm devoted to teaching the art of wiretapping/communications interception, digital deception and decoys, traceback and reconnaissance. In June 2006, the Hollywood Reporter announced that Walt Disney Pictures has picked up a feature film based on Laura s work in cybercrime. Through the Protocol Analysis Institute, LLC, Ms. Chappell co-founded the Internet Safety for Kids program in 2005. This program is provides education and presentation services on online predators, safe Internet communications and parental and law enforcement resources. For more information on the Internet Safety for Kids program, visit the Protocol Analysis Institute website
Product Description
This course focuses on network forensics including capture locations, stealth-mode capture, optimal capture and display filters, validating encrypted logins, identifying reconnaissance processes, locating header and payload signatures, catching penetration tests, malware behavior, backdoor communications and virus traffic. Section 1: Analyzer Placement a) Analyzing Hubbed Networks b) Analyzing Switched Networks c) Analyzing Routed Networks d) Analyzing WAN Links e) Tapping into Full-Duplex Links f) Capturing in Stealth Mode g) Obtaining Evidence Using a Honeypot Section 2: Unusual Network Communications a) Vulnerabilities in the TCP/IP Resolution Process b) Route Resolution c) Spotting Unacceptable Traffic Section 3: Reconnaissance Processes a) Port Scans b) Mutant Scans c) IP Scans d) Application Mapping e) OS Fingerprinting Section 4: Analyzing ICMP Traffic a) ICMP Types and Codes b) ICMP Discovery c) Router Redirection d) Dynamic Router Discovery e) Service Refusal f) OS Fingerprinting Section 5: TCP Security a) TCP Segment Splicing b) TCP Fake Resets Section 6: Address Spoofing a) MAC Address Spoofing b) IP Address Spoofing Section 7: Building Firewall ACL Rules a) Overview of ACL Rule Types Section 8: Signatures of Attacks a) Signature Locations b) Header Signatures c) Sequencing Signatures d) Payload Signatures e) Obtaining Signatures f) Attacks and Exploits g) Password Cracks h) Denial of Service Attacks i) Redirections
Code:
http://hotfile.com/dl/11630513/62f7a4f/shark_net_forensics_and_security.part1.rar.html http://hotfile.com/dl/11630581/88f68df/shark_net_forensics_and_security.part2.rar.html http://hotfile.com/dl/11630876/015ce22/shark_net_forensics_and_security.part3.rar.html http://hotfile.com/dl/11630985/10bde54/shark_net_forensics_and_security.part4.rar.html http://hotfile.com/dl/11631054/f361594/shark_net_forensics_and_security.part5.rar.html

0 comments:
Post a Comment