Video description
Systems Security
Shon Harris
The fast, powerful way to prepare for your CompTIA Security+
exam!
Get all the hands-on training you need to pass (ISC)²’s tough
SSCP exam, get certified, and move forward in your IT security
career! In this online video, the world’s #1 information security
trainer walks you through every skill and concept you’ll need to
master. This online video contains over three hours of training
adapted from Shon Harris’s legendary five-day SSCP boot
camps–including realistic labs, scenarios, case studies, and
animations designed to build and test your knowledge in real-world
settings!
Comprehensive coverage of CompTIA Security+ domains of
knowledge:
. Blended
Malware
. How to Buffer
Overflow Works
. Identity
Theft
. Buffer
Overflow
. Hardware
Security
. Personal
Firewall
About the Shon Harris Security Series
This online video is part of a complete library of books,
online services, and videos designed to help security professionals
enhance their skills and prepare for their certification exams.
Every product in this series reflects Shon Harris’s unsurpassed
experience in teaching IT security professionals.
Category: Security
System Requirements
OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4
(Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card
with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more
Table of Contents
Course Introduction
00:06:59
Domain 1 - Systems Security
00:01:06
Security+ Placement
00:00:42
Security+ and DoD 8570 Mandate
00:01:25
Privilege Escalation
00:01:55
Agenda 11
00:01:57
Boot Sector Invasion
00:00:36
Few Other Types
00:00:46
How Do They Work?
00:01:27
More Malware
00:02:16
Blended Malware
00:02:11
A Back Orifice Attack!
00:00:59
NetBus
00:00:40
Hoaxes
00:00:56
Agenda 12
00:01:02
Signature Scanning
00:00:58
Monitoring Activities
00:00:56
Monitoring for Changes
00:01:21
More Bad Stuff
00:04:36
Circumventing Access Controls
00:01:17
Attacks
00:00:51
TOC/TOU Examples
00:00:38
Attack Type - Race Condition
00:01:50
Attacking Through Applications
00:03:53
How a Buffer Overflow Works
00:01:39
Watching Network Traffic
00:01:23
Traffic Analysis
00:01:07
Functionally Two Different Types of Rootkits
00:01:19
Examples of Trojaned Files
00:00:48
Exploitation
00:02:10
Trojans (2)
00:02:07
Types of Trojan
00:01:56
Back Orifice 2000
00:00:54
Sub7
00:01:22
Defenses to Trojan
00:01:39
Backdoor
00:01:30
How ‘Netcat’ Works as a Backdoor
00:00:54
VNC - Virtual Network Computing
00:01:22
Backdoor Defenses
00:02:10
Rootkit
00:01:26
Popular Rootkits
00:00:44
Unix Rootkit Prevention
00:04:21
Windows Rootkit Prevention
00:01:08
Botnet
00:01:35
Show Me the Money!
00:01:12
Botnet (2)
00:02:08
Another Common Attack
00:01:02
Identity Theft
00:01:19
Fake Login Tools
00:00:42
How Do These Attacks Work?
00:00:33
Attempts to Get Your Credentials
00:01:02
Instructional Emails
00:01:26
Knowing What You Are Disposing of Is Important
00:01:18
Other Examples
00:00:46
Another Danger to Be Aware of… Spyware
00:02:07
Is Someone Watching You?
00:02:11
What Does This Have to Do with My Computer?
00:01:17
Sometimes You Know that Software Is Installing on Your System
00:02:54
Provide the Hackers with Tools
00:02:09
Common Web Server Flaws
00:01:08
Improper Data Validation
00:01:59
Uniform Resource Locator (URL)
00:02:00
Directory Traversal
00:01:04
Buffer Overflow
00:00:57
Cross-Site Scripting Attack
00:01:51
Common SQL Injection Attack
00:01:30
Attacking Mis-configurations
00:01:12
CGI Information
00:00:44
Logging Activities
00:00:43
Are ALL Patches Applied?
00:00:39
Instant Messaging
00:03:02
Browser
00:04:07
P2P
00:03:21
P2P Security
00:01:06
P2P Networks - Common Attacks
00:00:52
Hardware Security
00:08:26
Removable Media
00:01:08
Magnetic Media
00:03:17
Optical Media
00:01:53
Electronic Media
00:01:16
Memory Cards
00:01:27
Memory Card Characteristics
00:00:35
USB Devices
00:04:27
Data Leakage Prevention
00:02:17
NAS
00:03:45
Security Templates
00:04:36
Security Suite Components
00:06:10
Security Best Practices - Summary
00:04:49
Security Suite Components
00:03:06
Personal Firewall
00:00:58
Personal Firewall Features
00:02:08
Antivirus
00:03:02
Anti-spam
00:11:35
Popup Blockers
00:01:08
Security Suite
00:01:00
Security Suite Components
00:01:16
Virtualization Technology
00:00:49
Virtual Machine
00:05:48
VMWare
00:01:31
Approaches to Application Virtualization
00:03:18
Domain 1 Review
00:00:39