Catalog Search Results
Author
Pub. Date
2016.
Language
English
Description
Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process...
Author
Pub. Date
2019.
Language
English
Description
Take an in-depth look at Voice over IP (VoIP) protocols and components, and discover how to troubleshoot VoIP calls.
Voice over IP (VoIP) is a technology that sends voice data in packets using the IP network—allowing you to make calls using an internet connection instead of a traditional phone line. In this course, join Lisa Bock as she takes an in-depth look at VoIP protocols and components, as well as how to troubleshoot VoIP calls. Lisa begins...
Author
Pub. Date
2022.
Language
English
Description
Learn how to secure an organization's network and keep your interconnected systems and data safe.
Want to keep your interconnected systems and data safe? In this course, Lisa Bock covers network security and securing an organization's infrastructure. Lisa introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols....
Author
Pub. Date
2016.
Language
English
Description
Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation,...
Author
Pub. Date
2021.
Language
English
Description
Cybersecurity specialists are in high demand. This course prepares you to fill these roles as it covers the Network Intrusion Analysis portion of the Cisco CBROPS exam.
Cybersecurity specialists and related positions are some of the most in-demand security positions today, and the Cisco CBROPS exam is a big part of proving your skills for any cybersecurity job. In this course, Lisa Bock helps you prepare for the exam, covering the network intrusion...
Author
Pub. Date
2018.
Language
English
Description
Enhance your Wireshark workflow by becoming better acquainted with its interface and core features. Discover the different menus and toolbars and how to personalize the interface.
Speed up your workflow and enhance your analysis by becoming better acquainted with the Wireshark interface and its core features. In this course, join Lisa Bock as she helps to familiarize you with this powerful protocol analysis tool. Lisa reviews the menu choices, explains...
Author
Pub. Date
2021.
Language
English
Description
Understand the basics of cryptography to keep your networks, systems, and data secure.
Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such...
Author
Pub. Date
2022.
Language
English
Description
Learn essential Cisco concepts and strategies for creating secure encrypted connections, using remote access and site-to-site virtual private networks (VPNs).
Suggested prerequisites Cisco Certified Network Administrator (CCNA) training and/or knowledge of networking fundamentals, devices, cables, and topologies Projects Practice core networking skills using self-grading examples from Packet Tracer. Configure a clientless SSL VPN that allows a remote...
Author
Pub. Date
2017.
Language
English
Description
Review the essential terms and concepts you need to know to effectively secure Cisco networks.
Protect your network from common security threats. In this course, instructor Lisa Bock helps equip network administrators with a foundational understanding of security concepts in relationship to Cisco networks. Lisa covers essential security terms and discusses common security threats such as active and passive attacks, social engineering, and malware....
Author
Pub. Date
2021.
Language
English
Description
Explore the principles of defense in depth as you prepare for the Security Monitoring portion of the Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
In this course, instructor Lisa Bock describes the various attacks that can occur on the network, along with ways malicious actors use methods such as tunneling and encryption to conceal their behavior. Learn how to recognize the importance of having application visibility and control to effectively...
Author
Pub. Date
2022.
Language
English
Description
Whether you’re using Windows, macOS, or Linux, learn how to secure your operating system against attacks.
The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. In this course, instructor Lisa Bock details what’s actually involved in securing an operating system, whether you’re using Windows, macOS, or Linux. Lisa reviews user authentication, the structure...
Author
Pub. Date
2018.
Language
English
Description
Learn to use Wireshark for deep packet analysis, capturing, and forensics. Learn to detect and handle unusual traffic on a network and prevent malicious activity.
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively...
Author
Pub. Date
2018.
Language
English
Description
Get an overview of packet analysis and using Wireshark Next Generation, a free network protocol analyzer. Find out how it can help with latency issues and network attacks.
Are you interested in learning about packet analysis, or understanding and identifying the traffic on your network? This course gives you a solid overview of deep packet inspection via Wireshark Next Generation. Instructor Lisa Bock helps you navigate the many features of Wireshark....
Author
Pub. Date
2017.
Language
English
Description
Learn about Cisco network management, secure device access, and protocols such as NTP, SCP, and SNMP.
Administering a network means controlling access to network resources: granting, limiting, preventing, and revoking permissions as necessary. This course covers the topic of secure access, including in-band and out-of-band management, secure device access, and protocols such as NTP, SCP, and SNMP. Security ambassador Lisa Bock introduces the three...
Author
Pub. Date
2021.
Language
English
Description
Cybersecurity specialists are in high demand. This course prepares you to fill these roles as it covers the Security Concepts portion of the Cisco CBROPS exam.
In this course, instructor Lisa Bock helps you prepare for the Cisco CBROPS exam. Lisa covers the principles of a defense-in-depth strategy, to ensure the confidentiality, availability, and integrity of a system. Lisa outlines today’s threats and threat actors, and explores the relationship...
Author
Pub. Date
2017.
Language
English
Description
Get an overview of Voice over IP (VoIP) and unified communications, including terminals, applications, codecs, gateways, real-time protocols, and network operations.
Today, when you make a call, you are most likely using Voice over IP (VoIP). VoIP uses the existing internet and network to transfer and route voice traffic in IP packets. In many cases, it is a part of a Unified Communications (UC) system, which integrates VoIP, video, email, and instant...
Author
Pub. Date
2023.
Language
English
Description
Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting and reconnaissance—the process of gathering information about computers and the people to which they belong. In this course, Lisa...
Author
Pub. Date
2018.
Language
English
Description
Prepare for the Cisco Certified Network Associate (CCNA) Security exam 210-260. Review key concepts and confidently tackle the Content and Endpoint Security section of the exam.
As a network professional, it's imperative to have a solid understanding of endpoint threats and how to defend against them. In this course, bolster your understanding of how to combat threats as you study for the Cisco Certified Network Associate (CCNA) Security exam. Join...
Author
Pub. Date
2020.
Language
English
Description
Learn how to analyze network problems with Wireshark, a free, open-source packet analysis tool that helps identify congestion issues, suspicious activity, and network intrusions.
Learn how to analyze network problems with Wireshark, a free, open-source packet analysis tool used by network administrators around the world. In this course, Lisa Bock demonstrates how to get the most out of Wireshark, so that you can better evaluate your network and keep...
Author
Pub. Date
2016.
Language
English
Description
Become an ethical hacker. Learn how to detect network vulnerabilities through scanning, and use tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.
After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Network scans are also a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organization's infrastructure and...
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Submit Request