Comment Facebook can build the wall! (Score 1) 61
I think the government should solve two problems at the same time.
Make facebook build the wall.
Everyone back to work for Monday!
I think the government should solve two problems at the same time.
Make facebook build the wall.
Everyone back to work for Monday!
If you're just looking for something to read that is technical, the folks at Palo Alto have put together a good list of books as "canon" for the security industry. Worth a look anyway.
https://www.paloaltonetworks.com/threat-research/cybercanon
For those of you who missed the chat the transcript can be found here:
http://www.theacademypro.com/rongula-chat.pdf
For those of you who don't want to install it yourself, you can check out the video of the install (very Vista like) and the general look and feel of the web site at the academy. Yes, you have to register, but other then that it's free.
If you have videos that you want to see up on the web site you can request them here (I'll be watching the thread) or you can email me at adam at theacademy dot ca
An incomplete list of videos is below
Anti-Spam
IronPort C-Series Installation
Enabling and testing McAfee anti-virus with IronPort
Upgrading an IronPort C-Series
Creating and testing an outbound content filter with IronPort
Resetting an IronPort device
Anti-Virus
Detecting a virus with Sophos 7.3
Configuring logging with Sophos 7.3
Configuring Sophos Anti-Virus Updates
Installing Sophos Anti-Virus
Content Filtering
Configuring Websense URL Filtering
Installing Websense Security Suite 6.3
Configuring FortiGate URL Filtering
Configuring FortiGate URL Filtering with Local Authentication & Overrides
Data Loss Prevention (DLP)
Deploying a McAfee DLP Agent on Windows XP
Uninstalling McAfee's DLP Agent using an override key
Installing McAfee's ePolicy Orchestrator (ePO) 4.0
Disk Encryption
Check Point PointSec for PC Management Installation
Firewall
Check Point NGX R65 SecurePlatform Standalone Installation
Configuring a Site-to-Site VPN Tunnel with Cisco PIX
Configuring a Check Point IPv6 host
Configuring Check Point's SmartDefense to protect a Web server
Viewing the Top 10 Security Rules with Check Point's SmartView Monitor
Configuring a Cisco PIX as a DHCP
Cisco NTP on a Cisco PIX
Configuring Role-Based Administration on IPSO 4.2
Configuring Automatic and Manual NAT on Check Point NGX R65
Implementing Check Point NGX R65 Management High Availability
Configuring a basic Check Point rulebase
Installing Check Point NGX R65 SmartCenter Server
Increasing Check Point's Connections table
Installing NGX R65 HFA02 on a Windows Smart Center Server
Resetting a Cisco PIX to factory defaults
Cisco PIX initial setup
Configuring Access lists & Network Address Translation on a Cisco PIX
Cisco PIX password reset
Configuring Syslog on a Cisco PIX
Upgrading a FortiGate Firewall
Backing up a FortiGate firewall
Configuring Voyager access on non-standard port
Base IPSO installation
Configuring Nokia as a DHCP server
Configuring Simplified VRRP
Check Point R65 base installation on Nokia IPSO
Configuring gateway high availability using Nokia & Check Point
Creating a backup in IPSO
Configuring FortiGate Local Authentication for HTTP
Forensics
Introduction to AccessData's Forensic Toolkit (FTK)
IDS/IPS
Detecting attacks using Snort IDS
Deploying a McAfee HIPS Agent on Windows XP
Applying the Default Inline IPS Policy to an Intrushield 2700 Sensor
Installing McAfee's Intrushield Security Manager
Installing and configuring a McAfee Intrushield 2700 Sensor
Upgrading a McAfee Intrushield 2700 Sensor
Building a TippingPoint SMS Server out of the box
Configuring TippingPoint to allow Web-based connections from Firefox
Applying the latest TippingPoint Digital Vaccine
Upgrading TippingPoint TOS
Configuring TippingPoint to Block & Notify on Spyware filters
Creating a new TippingPoint Action Set
Adding a TippingPoint device to the SMS Server
Backing up the Tipping SMS database
Importing & distributing a DV with the SMS Server
Building a TippingPoint SMS Server out of the box
Limiting access to the SMS Server
Flushing Blocked Streams from a TippingPoint device
Manually failing over a TippingPoint device
Installing OSSEC Windows Agent
Installing OSSEC Linux Agent
Installing OSSEC Server
Log Management
Installing and configuring a Snare Agent
Network Access Control (NAC)
Mirage Networks N-145 ACS Server Installation
Creating a Managed Segment with a Mirage Networks N-245 Management/Sensor Appliance
Mirage Networks Management/Sensor Installation
Network Tools
Wireshark Packet Capture Part I
NetFort LANGuardian Installation
Operating Systems
Basic Linux from the CLI
Patch Management
Creating a Machine Group with Shavlik NetChk Compliance
Shavlik Technologies NetChk Compliance Installation
Shavlik Technologies NetChk Protect Installation
Performing a Patch Scan of a Windows XP system using NetChk Protect
Performing a Spyware Scan of a Windows XP system using NetChk Protect
Creating Favorites with Shavlik NetChk Protect
Creating Scheduled Scans with Shavlik NetChk Protect
Creating a Custom Service Check with Shavlik NetChk Compliance
Creating a Custom Reg Check with Shavlik NetChk Compliance
Navigating the Shavlik NetChk Protect Home Page
Change Management with Shavlik NetChk Compliance
Drag & Drop Scanning with Shavlik NetChk Protect
SANS Institute
SANS AUD507 Labs - Technical Rulebase Validation I, II & III
John Strand introduces SANS Hacker Techniques, Exploits and Incident
Handling
SANS AUD507 Labs - Auditing Routers with the Router Audit Tool (RAT)
SANS AUD507 Labs - Auditing Routers with Nipper
Eric Cole introduces SANS Security Essentials
Mike Poor introduces SANS Intrusion Detection In-Depth
Security Information Management (SIM)
Exporting Windows Event Logs using the QRadar Adaptive Log Exporter
VA/Penetration Testing
Installing Metasploit 3.1 on Windows XP
Exploiting a Windows system using Metasploit 3.1 Part I
Core Security Introduction to the Dashboard & Workspace
Core Security Information Gathering & Intro to Attack and Penetration
Core Security Advanced Attack and Penetration Part I
Core Security Advanced Attack and Penetration Part II
Password Assessment with Cain & Abel
Exploiting a Windows system with Metasploit
Joshua Wright presents 'Eavesdropping on Bluetooth Headsets'
Basic Netcat Tutorial
CIS Next Generation Scoring Tool for Windows
Performing Windows Audits using Nessus 3.2 with Tenable Network Security
Installing Nessus 3 for Windows
Default Nessus policy scan using Nessus for Windows
Installing Nessus 3 for Linux
Default Microsoft Patches scan using Nessus for Linux
Introduction to Nessus 3 with Tenable Network Security
Auditing SCADA and Control System Networks with Tenable Network Security
Installing Nmap for Windows
Nmap for Windows SYN scan of Windows XP host
Nmap for Windows Connect scan of Windows XP host
Operating System Identification using Nmap for Windows
Installing Nmap for Linux
Wireless
Initial install of an Aruba Networks 200 Controller
Upgrading an Aruba Networks 200 Controller
Nothing will ever be attempted if all possible objections must be first overcome. -- Dr. Johnson