Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Video Requests Accepted (Score 1) 5

If you have videos that you want to see up on the web site you can request them here (I'll be watching the thread) or you can email me at adam at theacademy dot ca

An incomplete list of videos is below

Anti-Spam
        IronPort C-Series Installation
        Enabling and testing McAfee anti-virus with IronPort
        Upgrading an IronPort C-Series
        Creating and testing an outbound content filter with IronPort
        Resetting an IronPort device

        Anti-Virus
        Detecting a virus with Sophos 7.3
        Configuring logging with Sophos 7.3
        Configuring Sophos Anti-Virus Updates
        Installing Sophos Anti-Virus

        Content Filtering
        Configuring Websense URL Filtering
        Installing Websense Security Suite 6.3
        Configuring FortiGate URL Filtering
        Configuring FortiGate URL Filtering with Local Authentication & Overrides

        Data Loss Prevention (DLP)
        Deploying a McAfee DLP Agent on Windows XP
        Uninstalling McAfee's DLP Agent using an override key
        Installing McAfee's ePolicy Orchestrator (ePO) 4.0

        Disk Encryption
        Check Point PointSec for PC Management Installation

        Firewall
        Check Point NGX R65 SecurePlatform Standalone Installation
        Configuring a Site-to-Site VPN Tunnel with Cisco PIX
        Configuring a Check Point IPv6 host
        Configuring Check Point's SmartDefense to protect a Web server
        Viewing the Top 10 Security Rules with Check Point's SmartView Monitor
        Configuring a Cisco PIX as a DHCP
        Cisco NTP on a Cisco PIX
        Configuring Role-Based Administration on IPSO 4.2
        Configuring Automatic and Manual NAT on Check Point NGX R65
        Implementing Check Point NGX R65 Management High Availability
        Configuring a basic Check Point rulebase
        Installing Check Point NGX R65 SmartCenter Server
        Increasing Check Point's Connections table
        Installing NGX R65 HFA02 on a Windows Smart Center Server
        Resetting a Cisco PIX to factory defaults
        Cisco PIX initial setup
        Configuring Access lists & Network Address Translation on a Cisco PIX
        Cisco PIX password reset
        Configuring Syslog on a Cisco PIX
        Upgrading a FortiGate Firewall
        Backing up a FortiGate firewall
        Configuring Voyager access on non-standard port
        Base IPSO installation
        Configuring Nokia as a DHCP server
        Configuring Simplified VRRP
        Check Point R65 base installation on Nokia IPSO
        Configuring gateway high availability using Nokia & Check Point
        Creating a backup in IPSO
        Configuring FortiGate Local Authentication for HTTP

        Forensics
        Introduction to AccessData's Forensic Toolkit (FTK)

        IDS/IPS
        Detecting attacks using Snort IDS
        Deploying a McAfee HIPS Agent on Windows XP
        Applying the Default Inline IPS Policy to an Intrushield 2700 Sensor
        Installing McAfee's Intrushield Security Manager
        Installing and configuring a McAfee Intrushield 2700 Sensor
        Upgrading a McAfee Intrushield 2700 Sensor
        Building a TippingPoint SMS Server out of the box
        Configuring TippingPoint to allow Web-based connections from Firefox
        Applying the latest TippingPoint Digital Vaccine
        Upgrading TippingPoint TOS
        Configuring TippingPoint to Block & Notify on Spyware filters
        Creating a new TippingPoint Action Set
        Adding a TippingPoint device to the SMS Server
        Backing up the Tipping SMS database
        Importing & distributing a DV with the SMS Server
        Building a TippingPoint SMS Server out of the box
        Limiting access to the SMS Server
        Flushing Blocked Streams from a TippingPoint device
        Manually failing over a TippingPoint device
        Installing OSSEC Windows Agent
        Installing OSSEC Linux Agent
        Installing OSSEC Server

        Log Management
        Installing and configuring a Snare Agent

        Network Access Control (NAC)
        Mirage Networks N-145 ACS Server Installation
        Creating a Managed Segment with a Mirage Networks N-245 Management/Sensor Appliance
        Mirage Networks Management/Sensor Installation

        Network Tools
        Wireshark Packet Capture Part I
        NetFort LANGuardian Installation

        Operating Systems
        Basic Linux from the CLI

        Patch Management
        Creating a Machine Group with Shavlik NetChk Compliance
        Shavlik Technologies NetChk Compliance Installation
        Shavlik Technologies NetChk Protect Installation
        Performing a Patch Scan of a Windows XP system using NetChk Protect
        Performing a Spyware Scan of a Windows XP system using NetChk Protect
        Creating Favorites with Shavlik NetChk Protect
        Creating Scheduled Scans with Shavlik NetChk Protect
        Creating a Custom Service Check with Shavlik NetChk Compliance
        Creating a Custom Reg Check with Shavlik NetChk Compliance
        Navigating the Shavlik NetChk Protect Home Page
        Change Management with Shavlik NetChk Compliance
        Drag & Drop Scanning with Shavlik NetChk Protect

        SANS Institute
        SANS AUD507 Labs - Technical Rulebase Validation I, II & III
        John Strand introduces SANS Hacker Techniques, Exploits and Incident
Handling
        SANS AUD507 Labs - Auditing Routers with the Router Audit Tool (RAT)
        SANS AUD507 Labs - Auditing Routers with Nipper
        Eric Cole introduces SANS Security Essentials
        Mike Poor introduces SANS Intrusion Detection In-Depth

        Security Information Management (SIM)
        Exporting Windows Event Logs using the QRadar Adaptive Log Exporter

        VA/Penetration Testing
        Installing Metasploit 3.1 on Windows XP
        Exploiting a Windows system using Metasploit 3.1 Part I
        Core Security Introduction to the Dashboard & Workspace
        Core Security Information Gathering & Intro to Attack and Penetration
        Core Security Advanced Attack and Penetration Part I
        Core Security Advanced Attack and Penetration Part II
        Password Assessment with Cain & Abel
        Exploiting a Windows system with Metasploit
        Joshua Wright presents 'Eavesdropping on Bluetooth Headsets'
        Basic Netcat Tutorial
        CIS Next Generation Scoring Tool for Windows
        Performing Windows Audits using Nessus 3.2 with Tenable Network Security
        Installing Nessus 3 for Windows
        Default Nessus policy scan using Nessus for Windows
        Installing Nessus 3 for Linux
        Default Microsoft Patches scan using Nessus for Linux
        Introduction to Nessus 3 with Tenable Network Security
        Auditing SCADA and Control System Networks with Tenable Network Security

        Installing Nmap for Windows
        Nmap for Windows SYN scan of Windows XP host
        Nmap for Windows Connect scan of Windows XP host
        Operating System Identification using Nmap for Windows
        Installing Nmap for Linux

        Wireless
        Initial install of an Aruba Networks 200 Controller
        Upgrading an Aruba Networks 200 Controller

Slashdot Top Deals

Nothing will ever be attempted if all possible objections must be first overcome. -- Dr. Johnson

Working...