Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Electronic videos ; local  (14)
Datasource
Material
Language
Years
  • 1
    Language: English
    Pages: 1 online resource (1 streaming video file (12 hr., 4 min., 25 sec.)) , digital, sound, color
    Series Statement: LiveLessons
    Keywords: Electronic data processing personnel ; Certification ; Study guides ; Computer networks ; Security measures ; Examinations ; Study guides ; Electronic videos ; local
    Abstract: "CCNA Security 210-260 Complete Video Course is a unique video product that provides users with more than 13 hours of personal visual instruction from security experts Omar Santos, Aaron Woland, and Mason Harris. This course provides complete coverage of the new CCNA Security 210-260 exams, with videos covering every objective on the exam. The authors also provide step-by-step instructions and explanations using presentations, analysis, and confirmation demos. This video course emphasizes core security technologies by describing the installation, troubleshooting, and monitoring of network devices to maintain integrity, confidentiality, and availability of data and devices."--Resource description page.
    Note: Title from title screen (viewed January 13, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    Pages: 1 online resource (1 streaming video file (4 hr., 37 min., 51 sec.)) , digital, sound, color
    Keywords: Penetration testing (Computer security) ; Computer security ; Hackers ; Electronic videos ; local
    Abstract: "This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and basics of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see first hand how an ethical hacker performs initial reconnaissance of a victim and how to assess systems and network security controls security posture. With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies used to assess and compromise a network. It covers the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired and wireless network and the systems within that network. The title also covers numerous types of attacks, along with security evasion and post exploitation techniques. You will additionally learn the art of social engineering, with special coverage of tools like the social engineering tool kit (SET), Metasploit, Maltego, and many more. After that you'll take a look at guidelines for how to write a penetration testing report, with instructions for how to plan and organize those reports examples of reports including several best practices."--Resource description page.
    Note: Title from title screen (viewed September 13, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    Language: English
    Pages: 1 online resource (1 streaming video file (9 hr., 29 min., 8 sec.)) , digital, sound, color.
    Series Statement: LiveLessons
    Keywords: Electronic data processing personnel Study guides Certification ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel ; Certification ; Study guides ; Computer networks ; Security measures ; Examinations ; Study guides ; Electronic videos ; local ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Computer networks ; Security measures ; Examinations ; Electronic data processing personnel ; Certification ; Study guides
    Abstract: "CCNA Cyber Ops SECFND 210-250 LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-250 SECFND exam. This product walks through each topic of the exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as an associate-level Security Operations Center (SOC) Security Analyst. CCNA Cyber Ops SECFND 210-250 contains more than nine hours of instruction with 12 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations."--Resource description page.
    Note: Title and publication information from resource description page (Safari, viewed April 14, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Cisco Press
    Language: English
    Pages: 1 online resource (1 streaming video file (4 hr., 28 min., 27 sec.)) , digital, sound, color.
    Series Statement: LiveLessons
    Keywords: Computer networks ; Security measures ; Electronic videos ; local
    Abstract: "Learn how Cisco Advanced Malware Protection (AMP) capabilities have been integrated into the Cisco ASA with FirePOWER Services and Firepower Threat Defense. Cisco Firepower and Advanced Malware Protection LiveLessons walks you through the steps for designing, configuring, and troubleshooting Cisco ASA Firepower services so you can implement latest threat detection services from Cisco. Omar Santos, best-selling author of CCNA Security Cert Guide and Complete Video Course and a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), provides step-by-step coverage of the new Cisco Firepower services and explores the Cisco Next-Generation IPS appliances, Cisco ASA with Firepower services, AMP for networks, endpoints and content security, and Firepower Management Center."--Resource description page.
    Note: Title from title screen (viewed July 20, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Cisco Press
    Language: English
    Pages: 1 online resource (1 streaming video file (49 min., 23 sec.)) , digital, sound, color.
    Series Statement: LiveLessons
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic videos ; local
    Abstract: "The security landscape is in constant flux. Adversaries used to take months or years to compromise a network, but today only a few minutes--or even in some cases, seconds--is needed to compromise and exfiltrate data. Your only defense is to gain the knowledge you need to fully understand and prepare for the current threat landscape and how these threats are evolving. This one-hour primer on security threats in today's world will set you on the road to understanding and accessing the tools you need to understand what is happening within the threat landscape, and specifically how to begin defending your network. You will also gain insight into the underground activities that adversaries are involved in, and what return of investment they seek after exploitation."--Resource description page.
    Note: Title from title screen (viewed December 21, 2015). - "Networking talks."
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 30 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: 6+ Hours of Video Instruction Overview CompTIA PenTest+ (PT1-001) Complete Video Course is a complete resource to prepare for the CompTIA PenTest+ certification exam. This course covers all the topics on the exam, including planning and scoping a security penetration testing (ethical hacking) assessment, understanding legal and compliance requirements, and performing vulnerability scanning and penetration testing using appropriate tools and techniques. In addition, it guides the student on how to analyze the results and write a comprehensive report including remediation techniques and best practices on how to effectively communicate results to the relevant stakeholders. The course is presented by a seasoned and active cybersecurity expert with years of field and teaching experience. Omar Santos walks you through the exam objectives and provides tips and scenarios throughout, helping to put the knowledge in context. He provides demonstrations as well as detailed explanations and samples of each topic. Topics includeModule 1: Introduction to Ethical Hacking and How to Plan a Security Penetration TestModule 2: ReconnaissanceModule 3: Attacks and ExploitsModule 4: Tools and Reporting Skill Level Beginner/Intermediate Learn How To * Prepare for the CompTIA PenTest+ Exam* Plan and scope a security penetration test* Perform reconnaissance on a target* Gain access through vulnerable systems by knowing the various exploits* Restore environments after a pentest has successfully found vulnerabilities within the system* Record and log activities in a manner that is professional, clear, and advantageous to the client for system improvement Who Should Take This Course * Anyone interested in taking the CompTIA PenTest+ exam* Individuals seeking careers in the cybersecurity field Course Requirements None Lesson descriptions Module 1, "Introduction to Ethical Hacking and How to Plan a Security Penetration Test," introduces the concept of ethical hacking and how the cybersecurity industry goes about implementing field-tested security parameters using penetration testing. It walks through the planning and scoping of a pentesting assessment. Module 2, "Reconnaissance," covers all things related to the intelligence gathering phase of the pentest, including collecting information, port scanning, and vulnerability scanning. It then discusses how to use this intelligence to plan the pentest itself. Module 3, "Attacks and Exploits," discusses how to use the intelligen...
    Note: Online resource; Title from title screen (viewed March 4, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    Language: English
    Pages: 1 online resource (1 streaming video file (4 hr., 37 min., 18 sec.)) , digital, sound, color
    Series Statement: LiveLessons (Indianapolis, Ind.)
    Keywords: Electronic data processing personnel Certification ; Computer networks Security measures ; Examinations ; Computer networks ; Security measures ; Examinations ; Electronic videos ; local ; Electronic data processing personnel ; Certification ; Computer networks ; Security measures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Examinations
    Abstract: "CCNA Cyber Ops SECOPS 210-255LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-255 SECOPS exam. This product walks through each topic of the Implementing Cisco Cybersecurity Operations exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as a Security Operations Center (SOC) Security Analyst."--Resource description page.
    Note: Includes index. - Title from title screen (Safari, viewed June 26, 2017). - Description based on online resource; title from title screen (Safari, viewed June 26, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    Language: English
    Pages: 1 online resource (1 streaming video file (26 hr., 40 sec.)) , digital, sound, color
    Keywords: Penetration testing (Computer security) ; Computer security ; Hacking ; Electronic videos ; local
    Abstract: "The Art of Hacking is a series of video courses that is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetration testing techniques. The videos in this series will provide step-by-step real-life scenarios, full demos and content deep dives. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim and assess systems and network security controls security posture. These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), and any other ethical hacking certification. This series was built to help you learn more about general hacking methodologies and concepts as well as gain the skills required to becoming a professional ethical hacker."--Resource description page.
    Note: Title from resource description page (Safari, viewed May 20, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    Language: English
    Pages: 1 online resource (1 streaming video file (5 hr., 12 min., 42 sec.)) , digital, sound, color
    Series Statement: LiveLessons
    Series Statement: The art of hacking series
    Keywords: Hackers ; Handbooks, manuals, etc ; Computer security ; Handbooks, manuals, etc ; Computer networks ; Security measures ; Handbooks, manuals, etc ; Electronic videos ; local
    Abstract: "Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables. Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment. You also learn the various concepts associated with many different leading-edge offensive security skills in the industry. Full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, this is a must for anyone interested in pursuing an ethical hacking career."--Resource description page.
    Note: Title from title screen (Safari, viewed February 22, 2018). - Release date from resource description page (Safari, viewed February 22, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Cisco Press
    Language: English
    Pages: 1 online resource (1 streaming video file (7 hr., 3 min., 7 sec.)) , digital, sound, color.
    Series Statement: LiveLessons
    Keywords: Computer networks ; Security measures ; Electronic videos ; local
    Abstract: "This live video introduces Cisco ASA solutions to overcoming obstacles by providing complete configuration and troubleshooting guidance. Cisco ASA 5500-X Series Next-Generation Firewalls LiveLessons (Workshop) is the definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco ASA firewall features."--Resource description page.
    Note: Title from resource description page (viewed May 20, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...