List of Some Good Websites with Useful Information to Learn and Pass your Networking Exams

Friday, 9 July 2010

Rapidshare Premium Accounts for FREE


I have 7 Premium accounts to give away for FREE. All i want to know is why should i give it to you?



Contact me at LearnToNetwork@gmail.com

Tuesday, 20 April 2010

Please Visit my new site www.MySkigle.com



-



Please Visit my new site www.MySkigle.com




My Skins for Google
Customize your Search Home Page!
Add more flavor to your search home page with customized Fonts, Colors and images!


The sole idea and purpose of this site is to change the look of your search home page with customized Fonts, Colors and images!



Please join me in forwarding this mail to friends and family who love to search the web with colours.





Help me by Joining/Following one or all of these 
Orkut Community www.MySkigle.com at http://www.orkut.com/Main#Community?cmm=98447460 
facebook fan www.MySkigle.com at http://www.facebook.com/pages/My-Skigle/353346272925 
facebook Group www.MySkigle.com at http://www.facebook.com/group.php?gid=323605609342
twitter page www.MySkigle.com at http://twitter.com/MySkigle





 -

Tuesday, 23 March 2010

- Latest TESTKING papers for Free





You can get latest TESTKING test papers FREE for different certifications like CISCO, Checkpoint, Citrix, Cognos, CompTIA, Intel , ISEB, Juniper, Microsoft, Oracle, Red Hat, SAS, Sun and many more right here.

All the above papers are available for FREE or for only 10£ each, and if paying in INR it is only 250 Rs each. To find how you can get it for free just email us for information.




Want to order a test paper ??? just mail me with your required test paper name and exam number and We’ll get in touch with you personally to meet your requirements and to assure you that we are trustworthy and genuine. Payments are accepted by Pay Pal.


Contact Details:
learntonetwork@gmail.com

Thursday, 28 January 2010

255 CCIE R&S (4.0) Blended Learning Solution (BLS) Self-Study Bundle




Enjoying nearly a decade of success and boasting the world's largest list of successful candidates, IPexpert is pleased to offer you the world's most proven, content-rich and complete CCIE R&S 4.0 Lab preparation study resource.
  • Hundreds of pages full of extremely useful, complex and challenging lab scenarios (some say more challenging than the real lab!) included in all 3 Workbooks (Volumes 1, 2 and 3) and the accompanying Detailed Solution Guide
  • A collection of lab 34 protocol-focused scenarios, current and up-to-date and guaranteed to be designed to cover the current lab exam blueprint (Volume 1)
  • A collection of 20 8-hour mock lab exams that are used to convert you from a technology expert to a multiprotocol expert (Volume 2)
  • 10 8-hour mock labs (with a detailed solution guide) that are structured exactly the same way the current CCIE 4.0 Lab is, with OEQs / Core Knowledge, Troubleshooting and the Configuration section (Volume 3)
  • A training solution with extremely detailed diagrams that are thorough are easy to comprehend
  • The most complete training solution in terms of configurations and solutions. You receive the initial (start-up) configurations, making it easy for you to get started on the actual lab exam as well as final configurations, allowing you to check your work against that of the lab Authors
  • Thousands of pages (breaking down the task, step-by-step) representing extremely detailed solution walk-throughs consisting of extensive explanation by the industry's most recognized and accredited Instructors and Developers
  • A designed training solution in which our industry-recognized CCIE R&S Instructor delivers over 45 hours of video lecture and thorough configuration examples of nearly every topic covered on the CCIE R&S 4.0 Lab blueprint 
  • A training solution with extremely detailed slides and diagrams that are thorough are easy to comprehend
  • A training video solution that includes 2 separate / additional books (the slide book and topology diagram book used in the training solution)
  • An audio training solution of over 30 hours to lecture (from a different CCIE R&S Instructor that created the VOD product) outlining each topic seen on the current 4.0 Lab blueprint
  • Training materials designed around a standard topology large enough to change the logical topology without re-cabling or moving any devices (if home hardware is utilized)
  • A phenomenal training solution supported by the world's most sophisticated online CCIE vRack solution, boasting amazing graphical remote controls to ensure a user-friendly experience
  • Hints, tips and tricks outline what to watch for are explained in detail by the authors and instructors that have trained thousands of CCIEs to pass the lab exam
  • An amazing training solution that is kept current by the world's most elite team of technical Instructors, all of which hold multiple certifications, degrees, accreditation's and multiple CCIE certifications
  • A comprehensive workbook supported online by the Authors and Developers that thousands of your peers have trusted
  • The world's most proven product, boasting more CCIE success stories and testimonials than any other company
  • A "must have" training product backed by IPexpert's Investment Assurance program that has raised the bar and set the precedence for training guarantees!

254 CCIE Security (3.0) Blended Learning Solution (BLS) Self-Study Bundle






Throughout nearly a decade of leading the CCIE training industry, IPexpert has coined the term "Structured Learning Approach" to describe its methodology for maximizing student success. We have developed our learning materials around our proven techniques and over a thousand successful students who have enthusiastically recommended these study techniques to others. Some companies may claim to be experts in this space, but the fact that IPexpert has amassed the world's largest list of successful CCIEs speaks clearly for our record. Let us help you to join this elite group!

Our End-to-End Self-Study Training Solution for CCIE Security 3.0 candidates contains an unmatched quantity of recently-updated and newly-created material designed with our renowned "Learn By Doing" approach as well as an unmatched QUALITY of technical material that fits into IPexpert's "Structured Learning Approach" methodology. This proven program has trained MORE CCIEs than any company in the world, has traveled the world and reached nearly every developed country and has continuously been refined and updated by the world's most elite group of technical Instructors.

This thorough hands-on solution is designed to take you from your initial stages of CCIE lab preparation all the way to your actual lab exam! Created specifically as a self-study learning program, this Blended Learning Solution is sure to exceed your expectations. This program provides you with a consolidated learning experience delivered through various forms of media. Each component is built into a streamlined, user-friendly learning environment that maximizes your study time and focus and simplifies your efforts!

In addition to thousands of pages of printed study manuals, you will also receive a portable, durable hard drive (Windows and Mac compatible). This hard drive is configured with a custom, user-friendly menu and navigation system. Between your printed manuals and your hard drive, your CCIE number is nearly guaranteed!

IPexpert understands that the CCIE journey is a long process. We understand the importance of this journey and we understand the dedication and effort that goes into being one of the world's most elite engineers - a CCIE! Our Training Advisors, Support Engineers, Instructors and Developers will stand with you, by your side, during the entire process of your CCIE journey, regardless of how long it takes you! Now the only questions is, "When will you be an IPexpert?"


Wednesday, 25 November 2009

253 Cisco Wireless Lan Support Specialist





Cisco Wireless Lan Support Specialist (CWLSS)

Course Description:

This course will give you the knowledge and skills necessary to design, install, support, and operate a wireless LAN solution. A CWLSS understands radio technologies associated with WLAN 802.11g standards, WLAN and bridge topologies and applications, can configure WLAN products including access points, bridges, client devices and accessories, and much more.

Prerequisites:

Cisco CCNA Certification

Audience:

Anyone network professional who wishes to install, configure, and troubleshoot local and wide area networks for enterprise organizations with networks from 100 to more than 500 nodes.

Deployment Options:
- Video Training
-CD-ROM
-E-learning
-ThinkTank Server Solution

About Our Experts:
Stephen Dugan, CCSI, CCNP, CCNA, MCSE, MCP
As a Cisco Certified System Instructor, Steve instructs Internetworking Engineers using official Cisco Career Certification Curriculum. He prepares students for the Official Cisco CCNA, CCDA, CCNP, CCDP and CCIE curriculums. He has personally developing the first ever Cisco Infrastructure Hacking Class. Class involves running various security exploits against a Cisco Network and then configuring the equipment for proper defense. He is also a current Speaker for the largest Network Security Conference in the World - BlackHat Inc.





Learning / Exam module:

Cisco Wireless Lan Support Specialist (CWLSS)

Course Duration:
25 - 35 hours.

About Our Experts:
Stephen Dugan, CCSI, CCNP, CCNA, MCSE, MCP
As a Cisco Certified System Instructor, Steve instructs Internetworking Engineers using official Cisco Career Certification Curriculum. He prepares students for the Official Cisco CCNA, CCDA, CCNP, CCDP and CCIE curriculums. He has personally developing the first ever Cisco Infrastructure Hacking Class. Class involves running various security exploits against a Cisco Network and then configuring the equipment for proper defense. He is also a current Speaker for the largest Network Security Conference in the World - BlackHat Inc.

Learning Segments:
CWLSS Course Introduction
Module 1 - Introduction to Wireless LAN Technologies
Wireless LAN Standards
Network Extension
Building-To-Building Connectivity
Last Mile Data Delivery
Mobility
Small Office Home Office
Summary
Module 2 - Radio Frequency Overview
Radio Frequency Defined
RF Behaviors
Gain and Loss
Reflection
Refraction
Diffraction
Scattering
Absorption
Voltage Standing Wave Ratio
Principles of Antennas - Line of Sight
Principles of Antennas – Fresnal Zone
Antenna Gain
Intentional Radiator
EIRP – Equivalent Isotropically Radiated Power
Radio Frequency Mathematics
Decibels
Gain & Loss Measurements
Summary
Module 3 - Radio Frequency Spread Spectrum Technology
Unlicensed Frequency Bands
Spread Spectrum RF Technology
Transmitting a Signal
Spread Spectrum Technologies
Frequency Hopping
Direct Sequence vs. Frequency Hopping
Scalability Issues
Summary
Module 4 - Access Points Overview
Access Points
Wireless Bridge and Antennas
Device Configuration
Client Adaptors
Hardware In-depth - Access Points
Hardware In-depth - Wireless Bridges
Hardware In-depth - Client Devices
Access Point - Setup
Client Devices - Setup
Wireless Bridge - Setup
Module 5 - Antennas Overview
Omni-Directional Antennas
Semi-Directional Antennas
Highly-Directional Antennas
RF Antennas – Concepts
Free Space Path Loss
Antenna Installation
WLAN Accessories
Summary
Module 6 - Standards Overview
WLAN Organizations
ISM Bands
Output Rules
IEEE
802.11 Standard
Misc. Organizations and Standards
Summary
Module 7 - Network Architecture Overview
SSID
Beacons
Authentication & Association
802.1x and EAP
VPN
Service Sets
Roaming
VLANs
Power Mgmt.
LAB - Ad Hoc Mode
Module 8 - MAC and Physical Layer Overview
WLAN and Ethernet Frames
Control
Collisions
Fragmentation
DRS / NAV
DCF / PCF
IFS / SIFS / PIFS
DIFS / Slot Times
RTS/CTS
Modulation
Module 9 - Security Overview
WEP
Actual Threats
Encryption Suites
TKIP vs. CKIP
WPA
MIC (Michael)
Keys and Key Management
Authentication Methods
802.11i - WPA/2
WLAN Security Hierarchy
War-Driving
War-Chalking
Inherent Problems with Wireless Networks
New Security Enhancements
Security Policy
Cell Sizing
SSID / Wireless DMZ
LAB - Net Stumbler
LAB - Hot Spot Def Kit
EAP-FAST
RADIUS / TACACS+
AAA / ACS
Summary
Module 10 - Troubleshooting Overview
Multipath
Hidden Node
Near/Far
Throughput
Interference Issues
Weather Issues
Co-Channel Interference
Range
Summary
Module 11 - Site Survey Overview
Site Survey Fundamentals
Existing Network Information
External Considerations
Business Requirements
Bandwidth & Roaming
Security / Preparation
Site Survey Equipment
Documentation / Signal Loss
Summary
Module 12 - Management Overview
Wireless LAN Solution Engine
Cisco SWAN
Roaming
WLSE Options
Summary

Friday, 20 November 2009

252 Check Point CCSA Certified Security Administrator NGX R65 CBT Nuggets




CBT Nuggets Check Point CCSA Certified Security Administrator NGX R65 DVD | 759 MB

Check Point is the global leader in IT security, and Check Point CCSA certification says you’ve got the expertise to handle corporate security needs.

Trainer Bobby Meador’s step-by-step instructions show you how to improve the security of your current Check Point firewall deployment or build a Check Point security solution from the ground up.

This series maps to Check Point’s Certified Security Administrator NGX R65 156-215.65 exam. Passing the test earns you Check Point CCSA certification.

Prerequisites

Suggested prerequisites include an understanding of networking (such as Cisco CCNA or CompTIA Network+), Windows (such as 70-642 MCTS Windows 2008 Network Infrastructure, Configuring), or Linux (such as CompTIA Linux+).

Check Point Certified Security Administrator contents:

* CCSA Welcome

* Methods of attack

* Firewall Concepts

* Product Installation Part 1

* Product Installation Part 2

* Product Installation Part 3

* Advanced Splat Config I

* Advanced Splat Config II

* NAT

* Security Policy & Rule Base Design

* VOIP Security

* Traffic and System Monitoring (Smart View Tracker)

* Smart View Monitor Review

* Eventia Analyzer and Reporter

* User Mgmt and Authentication I

* User Mgmt and Authentication II

* User Mgmt and Authentication III

* (QOS) Quality of Service

* Web Filtering and Anti virus

* Smart Defense Part 1

* Smart Defense Part 2

* Smart Update/Licensing

* Disaster Recovery/System backup











Saturday, 7 November 2009

251 Cabling - The Complete Guide to Network Wiring




The top-selling book on safe and effective cabling, endorsed by the Electronic Technician's Association International, has been updated to deliver the most current and reliable information. In this definitive guide, cable installers, network administrators, consultants, and technicians get all the crucial cabling information they need, including installer and troubleshooting tips and expanded coverage on fiber optic cables. A 32-page color insert offers quick identification of connectors and cables, as well as vendor information and recommendations. Since correct cable usage helps build reliable, high performance networks and incorrect cable usage can doom a network, don't miss out on this essential resource.

Friday, 16 October 2009

250 Cisco Press ASA 5505 Getting started guide




Cisco ASA 5505
Getting Started Guide

Software Version 8.0

249 Cisco Press IPSec VPN Design




The definitive design and deployment guide for secure virtual private networks
  • Learn about IPSec protocols and Cisco IOS IPSec packet processing
  • Understand the differences between IPSec tunnel mode and transport mode
  • Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives
  • Overcome the challenges of working with NAT and PMTUD
  • Explore IPSec remote-access features, including extended authentication, mode-configuration, and digital certificates
  • Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access
  • Apply fault tolerance methods to IPSec VPN designs
  • Employ mechanisms to alleviate the configuration complexity of a large- scale IPSec VPN, including Tunnel End-Point Discovery (TED) and Dynamic Multipoint VPNs (DMVPN)
  • Add services to IPSec VPNs, including voice and multicast
  • Understand how network-based VPNs operate and how to integrate IPSec VPNs with MPLS VPNs
Among the many functions that networking technologies permit is the ability for organizations to easily and securely communicate with branch offices, mobile users, telecommuters, and business partners. Such connectivity is now vital to maintaining a competitive level of business productivity. Although several technologies exist that can enable interconnectivity among business sites, Internet-based virtual private networks (VPNs) have evolved as the most effective means to link corporate network resources to remote employees, offices, and mobile workers. VPNs provide productivity enhancements, efficient and convenient remote access to network resources, site-to-site connectivity, a high level of security, and tremendous cost savings.

IPSec VPN Design is the first book to present a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions. Part I includes a comprehensive introduction to the general architecture of IPSec, including its protocols and Cisco IOS® IPSec implementation details. Part II examines IPSec VPN design principles covering hub-and-spoke, full-mesh, and fault-tolerant designs. This part of the book also covers dynamic configuration models used to simplify IPSec VPN designs. Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. This part of the book also shows you how to effectively integrate IPSec VPNs with MPLS VPNs.

IPSec VPN Design provides you with the field-tested design and configuration advice to help you deploy an effective and secure VPN solution in any environment.

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

248 SSL Remote Access VPN





SSL Remote Access VPNs

An introduction to designing and configuring SSL virtual private networks

Jazib Frahim, CCIE® No. 5459

Qiang Huang, CCIE No. 4937

Cisco® SSL VPN solutions (formerly known as Cisco WebVPN solutions) give you a flexible and secure way to extend networking resources to virtually any remote user with access to the Internet and a web browser. Remote access based on SSL VPN delivers secure access to network resources by establishing an encrypted tunnel across the Internet using a broadband (cable or DSL) or ISP dialup connection.

SSL Remote Access VPNs provides you with a basic working knowledge of SSL virtual private networks on Cisco SSL VPN-capable devices. Design guidance is provided to assist you in implementing SSL VPN in existing network infrastructures. This includes examining existing hardware and software to determine whether they are SSL VPN capable, providing design recommendations, and guiding you on setting up the Cisco SSL VPN devices. Common deployment scenarios are covered to assist you in deploying an SSL VPN in your network.

SSL Remote Access VPNs gives you everything you need to know to understand, design, install, configure, and troubleshoot all the components that make up an effective, secure SSL VPN solution.

Jazib Frahim, CCIE® No. 5459, is currently working as a technical leader in the Worldwide Security Services Practice of the Cisco Advanced Services for Network Security. He is responsible for guiding customers in the design and implementation of their networks, with a focus on network security. He holds two CCIEs, one in routing and switching and the other in security.

Qiang Huang, CCIE No. 4937, is a product manager in the Cisco Campus Switch System Technology Group, focusing on driving the security and intelligent services roadmap for market-leading modular Ethernet switching platforms. During his time at Cisco, Qiang has played an important role in a number of technology groups, including the Cisco TAC security and VPN team, where he was responsible for trouble-shooting complicated customer deployments in security and VPN solutions. Qiang has extensive knowledge of security and VPN technologies and experience in real-life customer deployments. Qiang holds CCIE certifications in routing and switching, security, and ISP Dial.

* Understand remote access VPN technologies, such as Point-to-Point Tunneling Protocol (PPTP), Internet Protocol Security (IPsec), Layer 2 Forwarding (L2F), Layer 2 Tunneling (L2TP) over IPsec, and SSL VPN
* Learn about the building blocks of SSL VPN, including cryptographic algorithms and SSL and Transport Layer Security (TLS)
* Evaluate common design best practices for planning and designing an SSL VPN solution
* Gain insight into SSL VPN functionality on Cisco Adaptive Security Appliance (ASA) and Cisco IOS® routers
* Install and configure SSL VPNs on Cisco ASA and Cisco IOS routers
* Manage your SSL VPN deployment using Cisco Security Manager

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

247 IPSec Virtual Private Networks



What is IPSec? What’s a VPNNetworksinglesecurity. Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies. point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become.

246 Fax Modem and Text for IP Telephony




Fax, Modem and Text for IP Telephony
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.
IP Telephony has revolutionized many aspects of telecommunications and it continues to be deployed at a rapid pace. The benefits of transporting voice over an IP infrastructure include increased flexibility, better scalability, and a significant cost savings over traditional telephony networks. However, during the deployment of these VoIP solutions, other types of traditional telephony communications that can also realize these same benefits are often overlooked or ignored.
Fax, Modem, and Text for IP Telephony is a comprehensive resource that confronts the need for information on transporting alternative, non-voice communications over the IP protocol. Beginning with the basic theory and operation of fax, modem, and text telephony, this book then educates you on all of the current transport options that are available. An extensive design guide then provides the pertinent advice and best practices for making the correct planning decisions and choosing the best transport option for your network.
Fax, Modem, and Text for IP Telephony also includes meticulous configuration and troubleshooting guides. The configuration guides in this book include a number of sample configurations and tips to manage any fax, modem, or text deployment. The troubleshooting guides present the essential methodologies, debugs, and analysis tools for quickly resolving both the common and complex issues that may be encountered. This book is the perfect companion to other VoIP resources, and it is the only book that empowers you to successfully handle any fax, modem, or text implementation.
David Hanes, CCIE® No. 3491, is currently a senior engineer specializing in training, network design assistance, and troubleshooting of fax technologies for the Customer Assurance Engineering (CAE) group at Cisco®. Since joining Cisco in 1997, David has worked as a TAC engineer for the WAN, WAN Switching, and Multiservice Voice teams, a team lead for the Multiservice Voice team, and an escalation engineer covering a variety of voice and fax technologies. David has troubleshot escalated issues in Cisco customer networks worldwide and remains a technical resource for other Cisco employees and customers.
Gonzalo Salgueiro CCIE No. 4541, is a senior escalation engineer supporting voice, fax, and modem technologies for the Cisco TAC. Gonzalo has spent more than 11 years troubleshooting complex issues in large-scale VoIP networks as well as providing technical leadership for some of the most critical worldwide voice and fax deployments. Prior to joining the Escalation Team in 1999 Gonzalo had roles as a TAC engineer for both the Access/Dial and Multiservice Voice teams as well as a team lead for the Access/Dial team.


  • Learn basic and advanced operational theory and practical implementation of fax, modem, and text communications
  • Understand how to implement fax, modem, and text communications using protocols such as H.323, SIP, MGCP, and SCCP.
  • Explore the functionality and advantages of T.38 fax relay, passthrough, modem relay, T.37 Store-and-Forward Fax, and text relay for IP network deployments
  • Employ expert-recommended best practices and design solutions for deploying fax, modem, and text in an IP telephony environment
  • Optimize your network with comprehensive fax, modem, and text configuration and design tips for use with IOS and non-IOS gateways
  • Master the latest fax, modem, and text troubleshooting tools and techniques employed by Cisco engineers

Thursday, 15 October 2009

245 Cisco press Firewall Fundamentals




The essential guide to understanding and using firewalls to protect personal computers and your network
  • An easy-to-read introduction to the most commonly deployed network security device
  • Understand the threats firewalls are designed to protect against
  • Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks
  • Includes configuration, deployment, and management checklists
Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats. Firewall technology continues to be the most prevalent form of protection against existing and new threats to computers and networks. A full understanding of what firewalls can do, how they can be deployed to maximum effect, and the differences among firewall types can make the difference between continued network integrity and complete network or computer failure. Firewall Fundamentals introduces readers to firewall concepts and explores various commercial and open source firewall implementations--including Cisco, Linksys, and Linux--allowing network administrators and small office/home office computer users to effectively choose and configure their devices. Firewall Fundamentals is written in clear and easy-to-understand language and helps novice users understand what firewalls are and how and where they are used. It introduces various types of firewalls, first conceptually and then by explaining how different firewall implementations actually work. It also provides numerous implementation examples, demonstrating the use of firewalls in both personal and business-related scenarios, and explains how a firewall should be installed and configured. Additionally, generic firewall troubleshooting methodologies and common management tasks are clearly defined and explained.

244 TestOut CCNA 640-802 Videos




Become a Cisco Certified Network Associate and master the knowledge and skills to proficiently install, configure, operate and troubleshoot routed and switched networks through the TestOut CCNA certification training course. LabSim CCNA provides you with the most comprehensive and fully integrated training solution that will prepare you to pass your CCNA exam.









243 Cisco ASA Configuration Guide




Cisco ASA Configuration - Networking Professional's Library (2009)
McGraw-Hill Osborne Media | English | 2009-06-05 | ISBN: 0071622691 | 752 pages | PDF | 5.8 MB

"Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day...Cisco ASA Configuration is a great reference and tool for answering our challenges." --From the Foreword by Steve Marcinek (CCIE 7225), Systems Engineer, Cisco Systems

A hands-on guide to implementing Cisco ASA

Configure and maintain a Cisco ASA platform to meet the requirements of your security policy. Cisco ASA Configuration shows you how to control traffic in the corporate network and protect it from internal and external threats. This comprehensive resource covers the latest features available in Cisco ASA version 8.0, and includes detailed examples of complex configurations and troubleshooting. Implement and manage Cisco's powerful, multifunction network adaptive security appliance with help from this definitive guide.

• Configure Cisco ASA using the command-line interface (CLI) and Adaptive Security Device Manager (ASDM)
• Control traffic through the appliance with access control lists (ACLs) and object groups
• Filter Java, ActiveX, and web content
• Authenticate and authorize connections using Cut-through Proxy (CTP)
• Use Modular Policy Framework (MPF) to configure security appliance features
• Perform protocol and application inspection
• Enable IPSec site-to-site and remote access connections
• Configure WebVPN components for SSL VPN access
• Implement advanced features, including the transparent firewall, security contexts, and failover
• Detect and prevent network attacks
• Prepare and manage the AIP-SSM and CSC-SSM cards

242 Pix VPN Simulator




Pix VPN Simulator

241 PIX Firewall Simulator




PIX Firewall Simulator

240 CCSP CBT Nuggets - IPS 642-533



IPS creates "trip-lines" to sound an alarm when your network is in danger
Think back to one of those spy movies where laser sensors surround a protected area - like where a rare jewel is stored. Even if the crook gets into the building, the alarm still goes off, and they get caught red-handed.
That's what an Intrusion Prevention System does for your network. It creates virtual "trip-lines" to catch threatening traffic. Even if an intruder makes it past your firewall or other network defense systems, the IPS sensor catches them, sounds an alarm, and even blocks their movement through your network.
IPS recognizes and stops most types of attacks. When your IPS identifies an attack's signature, it alerts you that your network could be in danger. It also watches for other danger signals, including unexpected activity from specific computers on the network, or protocols modified to work in non-standard ways. Because every network is different, you can custom configure your IPS to minimize false-positive alarms, while still blocking rogue traffic.
Exam-Pack: 642-533 IPS will show you how to deploy, configure and maintain IPS sensors on your corporate network. This includes using both the GUI and command line administration environments for setting up and maintaining your IPS. You'll even learn how to configure it to manage access lists on all your network devices. This allows you to setup on-the-fly access list configuration on other Cisco devices to block the intruder's IP address from reaching the network.
The 5 video updates include lots of exciting new IPS features, such as Self-Defending Network and Defense in Depth. After completing this IPS video series -- including the updates -- you'll provide your organization with:


  • improved IT management




  • timely recognition of suspicious activity




  • greater network uptime




  • better protected corporate assets




  • easier enforcement of company-wide security policies. Exam-Prep for Cisco IPS exam as part of CCSP Certification
    In addition to giving you real-world skills for setting up an IPS sensor to protect your network, Exam-Pack 642-533 IPS maps to exam objectives for Cisco's 642-533 exam on securing networks using Intrusion Prevention Systems. This exam is part of the CCSP and Cisco IPS Specialist certification tracks.
    Note:: Jeremy Cioara's Cisco Intrusion Prevention Systems (IPS) video series now includes 5 video updates by Michael Shannon. The combined series prepares you for Cisco's 642-533 certification exam. It replaces Cisco exam 642-532, which was retired in January 2008.
    Prerequisites
    A thorough understanding of Cisco networking such as a CCNA certification or equivalent knowledge is recommended before viewing these videos.
    Cisco CCSP - Exam-Pack: 642-532 IPS Contains:
    - The Areas of Attack: Network Security Overview
    - How IPS Can Help Your Network
    - Understanding and Using the IPS Command Line Interface
    - Understanding and Using IPS Device Manager
    - IPS Sensor Basic Configuration
    - IPS Signatures: Understanding Signatures and Alerts, Part 1
    - IPS Signatures: Understanding Signatures and Alerts, Part 2
    - IPS Signatures: Signature Engines, Part 1
    - IPS Signatures: Signature Engines, Part 2
    - IPS Signatures: Configuring Signature Parameters
    - IPS Signatures: Tuning Signatures
    - IPS Signatures: Creating Custom Signatures
    - IPS Sensor Advanced Configuration: IPS Sensor Tuning
    - IPS Sensor Advanced Configuration: Event Actions
    - Integrating IPS with Other Cisco Devices
    - IPS Maintenance and Monitoring: System-Level Functions
    - IPS Maintenance and Monitoring: Keeping Tabs on Your Sensor
    - Cisco's IDS Network Module for Routers
    - Cisco's IDS Network Module for 6500 Switches
    - The Introduction to IPS Update Series
    - New Features, Products, and Concepts
    - IPS Update Part 2
    - IPS IOS 6.0 Risk Ratings Components
    - Anomaly Detection (AD)
    - Information Security Program Management (Part 2)
    P.S. - Saying "That'll never happen to ME!" doesn't guarantee it. Sure, most networks aren't glaring targets for hackers, and the chances are slim you'll be attacked. But the threat is real - and even though your company may not be a big target, your server space and bandwidth could be. (Trainer Jeremy Cioara explains this from personal experience in a free video from this series.) Make sure you're protected.
    All trademarks and copyrights are the property of their respective holders.






  • 239 CCSP CBT Nuggets - SNRS 642-504



    This was training originally created as an upgrade to 642-502 SNRS that complied with Cisco 642-503 SNRS objectives. However, it also complies with Cisco 642-504 SNRS objectives.
    If you're using Cisco routers and switches, much of your security can be accomplished using the features built into the hardware and IOS. Our Exam-Pack: 642-504 SNRS videos are all about router and switching security, including recent Cisco updates.
    Topics, which are carefully mapped to the Cisco 642-504 SNRS certification exam, include:
    • Authorize access for legitimate users with the AAA architecture.
    • Use Cisco's IOS Firewall for Context-Based Access Control (CBAC) and Intrusion Prevention.
    • Create identity-based networking services to prevent denial-of-service (DoS) and other Layer 2 attacks.
    • Configure VPN solutions using IPSEC tunneling for secure branch-to-branch data transmission.
    • Establish advanced VPN security by creating a Certificate Authority (CA) on a private subnet.
    • Simplify remote VPN management using Easy VPN.
    • Manage multiple devices more easily using Cisco's Security Device Manager (SDM) web interface.
    • Securing the control, management and data planes with Network Foundation Protection (NFP).
    • Configuring GRE tunnels and dynamic multipoint VPN.
    • Overview of Cisco IOS Zone-based Policy Firewall (ZBPF).
    This video series supplements and updates existing training videos. Exam-Pack: 642-504 SNRS prepares you to tackle the 642-504 SNRS exam and enter the workplace as a knowledgeable security professional. The 642-504 SNRS exam is one of five required for Cisco Certified Security Professional (CCSP) certification.
    A thorough understanding of Cisco networking such as a CCENT/CCNA certification or equivalent knowledge is recommended before viewing these videos.

    Cisco CCSP Exam-Pack: 642-504 SNRS Contains:
    - Cisco AAA: Using Cisco's Access Control Server 3.3
    - Cisco AAA: Configuring Cisco Devices for RADIUS and TACACS+
    - Configure Cisco IOS Firewall Features: Cisco CBAC
    - Configure Cisco IOS Firewall Features: Cisco CBAC Part 2
    - Configure Cisco IOS Firewall Features: Firewall Authentication Proxy
    - Configure Cisco IOS Firewall Features: Intrusion Prevention System, Part 1
    - Configure Cisco IOS Firewall Features: Intrusion Prevention System, Part 2
    - Implement Layer 2 Security: Understanding and Mitigating Attack Types
    - Implement Layer 2 Security: Cisco Identity-Based Networking Services
    - Implement Layer 2 Security: Configuring 802.1x
    - Cisco VPN Configuration: VPN Concepts Overview
    - Cisco VPN Configuration: Configuring IKE with Pre-Shared Keys
    - Cisco VPN Configuration: Understanding Certificate Authorities
    - Cisco VPN Configuration: Configuring CA-based VPNs
    - Cisco VPN Configuration: Understanding and Using Cisco Easy VPN Solution, Part 1
    - Cisco VPN Configuration: Understanding and Using Cisco Easy VPN Solution, Part 2
    - Cisco SDM: Introduction and Setup
    - Cisco SDM: Using Cisco SDM to Configure Cisco Routers
    - Intro to Cisco product updates
    - Going farther with SDM
    - Securing control, management and data planes with NFP
    - Configuring GRE tunnels and dynamic multi-point VPN
    - Web VPN configuration: Understanding features and modes
    - Cisco IOS Zone-based Policy Firewalls (ZBPF) configuration

    All trademarks and copyrights are the property of their respective holders.



    Disclaimer

    disc

    rapid

    Search

    Get Email Updates

    Ads

    Ads

    Visitors