Sunday, 1 February 2009

Hack Attacks Denied: Complete Guide to Network LockDown

Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability for incoming attacks and a turnkey prevention system to keep them out. Network professionals will find expert guidance on securing ports and services, intrusion detection mechanisms, gateways and routers, Tiger Team secrets, Internet server daemons, operating systems, proxies and firewalls, and more.

Hacker Attack, Shield your computer from internet crime


Hacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You’ll be fascinated as you read about hackers, crackers and whackers–people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or send email.
Best of all, this book provides simple but powerful solutions to all these security needs. It’s all on the book’s CD. Protect yourself right now with firewalls, anonymisers, and virus-guards. This is without doubt the most readable and interesting book about computer security ever written. You’ll enjoy reading it, and you’ll be safe after you’ve followed its advice.

How to Do Everything with Windows XP Home Networking

Network the computers and peripheral devices in your home or small office easily with help from this hands-on guide. How to Do Everything with Windows XP Home Networking explains, step-by-step, how to select the best components for your needs, set up a wired or wireless network, share an Internet connection, printer, and other resources, secure your network, and fight spam, viruses, and other potential threats. Get the book that makes it easy to design your own home network.


Networking with Microsoft Windows Vista


Your Guide to Easy and Secure Windows Vista Networking is a complete beginner’s guide to creating, configuring, administering, and using a small network using Windows Vista computers. Inside you’ll find comprehensive coverage of networking hardware, including Ethernet (wired) hardware (from NICs to cables to switches to routers) and wireless Hardware–from wireless NICs to access points to range extenders.

We include handy “buyer’s guides” that tell you how to make smart choices when purchasing network hardware. With hardware in hand, we then show you how to roll up your shirtsleeves and put everything together, including configuring a router, laying cable, and connecting the devices. Next, we then show you how to wrangle with Windows Vista’s networking features. These techniques include using the Network and Sharing Center, managing wired and wireless connections, accessing shared network resources, sharing local resources on the network, and working with network files offline. And if you are a music and video aficionado, we’ve got you covered with a special chapter that shows you just how to set up a networked Vista PC as your digital media hub!

No networking book would be complete without extensive coverage of security issues that affect anyone connected to the Internet. We show you how to secure each computer, secure your global networking settings, and batten down your wireless connections. The last part of the book includes intermediate networking tasks such as

making remote connections, monitoring the network, troubleshooting network problems, and setting up Vista’s built-in web server and FTP server.

• No longer is networking a topic that only geeks need to understand. If you have even one computer on the Internet or if you use wireless in your home or office, you need this book!

• Extensive hardware coverage that shows you what equipment to buy and how to set it up!

• Easy to follow buyer’s guides that enable anyone to make smart and informed choices when purchasing networking hardware.

• Complete and comprehensive coverage of Windows Vista’s networking features.

• Thwart hackers, crackers, thieves and other Internet malefactors by following our easy to understand chapters on security!

• Loaded with tips, tricks, and shortcuts to make networking easier and more secure.

• Chock full of real-world examples and network configurations that you can put to work today!

Trainsignal TCP/ IP and Network Fundamentals


The bonus course is full of the basic concepts you need to truly understand TCP/ IP – an integral part of networking. We will help you gain a general comfort level for what TCP/ IP is and how to configure it on a basic network computer.

Video 1
What is a protocol?

* Definition of a protocol
* OSI Model

Video 2
Introduction to TCP/IP

* What is TCP/IP?
* TCP/IP Architecture
* TCP/IP Protocol Suite
* Types of TCP/IP communication

Video 3
Configuring an IP Address

* What is an IP Address?
-Network ID
-Host ID
* What is the purpose of a Subnet Mask?
* How to configure a computer with an IP Address
-Static
-Dynamic
* How to View a Computer’s IP Configuration
* How to Check for Connectivity

Video 4
IP Address Planning

* How to plan an IP Addressing scheme
* Rules for IP Addressing
* What is Classful IP Addressing
* Private IP Addressing vs. Public IP Addressing
* What is Network Address Translation (NAT)?

Video 5
Binary Numbers

* Decimal vs. Binary
* Convert Binary to Decimal
* Convert Decimal to Binary
* Using a Calculator
* IP Address Conversion

Video 6
Internetworking

* Decimal vs. Binary
* Convert Binary to Decimal
* Convert Decimal to Binary
* Using a Calculator
* IP Address Conversion

Video 7
Classless Interdomain Routing

* Problems with Classful IP Addressing
* What is CIDR & VLSM
* Subnetting with CIDR

Video 8
Fundamentals of IPv6

* Disadvantages of IPv4
* IPv6 Solutions
* IPv6 Addressing
* Types of IPv6 Addressing


Wireshark TCP/IP Network Analysis

This course focuses on both the normal and abnormal communication patterns of the TCP/IP suite and most common applications including DHCP, DNS, FTP, Telnet, HTTP, POP and SMTP. Course Overview - Introduction Section

1: TCP/IP Functionality Overview a) Resources and References for Analysts b) Capture on Hubbed, Switched and Routed Networks c) The TCP/IP Resolution Process d) Packets Going the Wrong Way e) Faults in the Resolution Process f) Test Yourself: What If Section

2: Analyze DNS Traffic a) Understand DNS Packet Structure b) Filter on DNS Traffic c) Analyze Normal DNS Traffic d) Analyze Unusual DNS Traffic Section

3: Analyze ARP Traffic a) Understand ARP Packet Structure b) Filter on ARP Traffic c) Analyze Normal ARP Traffic d) Analyze Unusual ARP Traffic Section

4: Analyze IPv4 Traffic a) Understand IPv4 Packet Structure
b) Filter on IPv4 Traffic c) Analyze Normal IPv4 Traffic d) Analyze Unusual IPv4 Traffic Section

5: Analyze ICMP Traffic a) Understand ICMP Packet Structure b) Filter on ICMP Traffic c) Analyze Normal ICMP Traffic d) Analyze Unusual ICMP Traffic Section

6: Analyze UDP Traffic a) Understand UDP Packet Structure b) Filter on UDP Traffic c) Analyze Normal UDP Traffic d) Analyze Unusual UDP Traffic Section

7: Analyze TCP Traffic a) Understand TCP Packet Structure b) Filter on TCP Traffic c) Analyze Normal TCP Traffic d) Analyze Unusual TCP Traffic Section

8: Analyze DHCP Traffic a) Understand DHCP Packet Structure b) Filter on DHCP Traffic c) Analyze Normal DHCP Traffic d) Analyze Unusual DHCP Traffic Section

9: Analyze HTTP Traffic a) Understand HTTP Packet Structure b) Filter on HTTP Traffic c) Analyze Normal HTTP Traffic d) Analyze Unusual HTTP Traffic Section

10: Analyze Telnet Traffic a) Understand Telnet Packet Structure b) Filter on Telnet Traffic c) Analyze Normal Telnet Traffic d) Analyze Unusual Telnet Traffic Section

11: Analyze FTP Traffic a) Understand FTP Packet Structure b) Filter on FTP Traffic c) Analyze Normal FTP Traffic d) Analyze Unusual FTP Traffic Section

12: Analyze POP Traffic a) Understand POP Packet Structure b) Filter on POP Traffic c) Analyze Normal POP Traffic d) Analyze Unusual POP Traffic Section

13: Analyze SMTP Traffic a) Understand SMTP Packet Structure b) Filter on SMTP Traffic c) Analyze Normal SMTP Traffic d) Analyze Unusual SMTP Traffic


Wireshark Functionality and Fundamentals


Learn to use Wireshark efficiently and effectively by placing your analyzer in an ideal location to capture traffic (even on a switched network). Learn to focus on key traffic using capture filters and display filters. Graph
traffic, use navigation and colorization techniques and time values to easily spot network problems. Customize your Wireshark system and use the Expert system to identify problem areas. Learn how tshark, editcap, capinfos and other command-line tools work and test yourself by completing lab exercises.

Wireshark Troubleshooting Network Performance

This course focuses on the causes of poor network performance including packet-loss, retransmissions, high latency, low throughput rates, minimal bandwidth, application errors, configuration faults, resolution problems and protocol behavior problems. Section

1: Analyzer Placement a) Analyzing Hubbed Networks b) Analyzing Switched Networks c) Analyzing Routed Networks d) Analyzing WAN Links e) Capturing in Stealth Mode Section

2: Normal Network Communications a) When Everything Goes Right b) The Multi-Step Resolution Process c) Building the Packet Section

3: Causes of Performance Problems a) Where Network Faults Occur b) Time is of the Essence Section

4: Wireshark Functions for Troubleshooting a) Using Pre-Defined Coloring Rules b) Basic and Advanced IO Graphs c) Use the Delta Time Value d) Analyze Expert Information
e) Look Who s Talking f) Graph Bandwidth Use, Round Trip Time and TCP Performance g) Flow Graphing h) Statistics (Various) Section

5: Latency Issues a) The Five Primary Points in Calculating Latency b) Plotting High Latency Times c) Free Latency Calculators d) Using the frame.time_delta Filter Section

6: Packet Loss and Retransmissions a) Packet Loss and Recovery UDP v. TCP b) Previous Segment Lost Events c) Duplicate ACKs d) TCP Retransmissions and Fast Retransmissions e) Out-of-Order Segments Section

7: Misconfigurations and Redirections a) Visible Misconfigurations b) Don t Forget the Time Section

8: Dealing with Congestion a) Shattered Windows b) Flooded Out Section

9: Baseline Network Communications a) Your First Task When You Finish this Class

Some Videos on TCP IP Subnetting



Followers