Enter your email address:

Delivered by FeedBurner

Bookmark and Share
Custom Search
Bookmark and Share

CCNA Security - Exam-Pack 640-553: IINS

Labels: ,

Here's what you'll learn in each video of the Cisco CCNA Security - Exam-Pack 640-553: IINS Series:
Video 1 - "Welcome to CCNA Security: Cisco Certification and Getting the Most from This Series" - With every new program, there is typically an included "Read Me First" text file. In the same sense, consider this nugget the "Watch Me First" of the series. This nugget presents the strategies you can use for getting the most from the series, changes to the Cisco certification program, and the ideal CCNA Security lab environment.Video 2 - "Welcome to CCNA Security: Understanding the Threats" - It's impossible to defend against something you don't understand. In this nugget, Jeremy defines the goal behind having a secure network and the categories of intruders and attacks.
Video 3 - "Welcome to CCNA Security: Understanding the Threats, Part 2" - Jeremy continues defining the properties of a secure network by discussing many of the network attacks you can face and a general mitigation strategy. In addition, Jeremy discusses the components behind the Cisco Self-Defending Network system.

Video 4 - "Foundation Router Security: Using SDM to Lock Down Your Router" - The Cisco Security Device Manager (SDM) is a powerful graphic interface you can use to manage your router and perform complex tasks with the click of a mouse button. This nugget walks through the process of configuring your router to support Cisco SDM and using the SDM to perform a security audit or one-step lockdown of your device.
Video 5 - "Foundation Router Security: Implementing Secure Router Management" - One of the first areas of security you should consider is the management traffic between you and the network devices. In this nugget, Jeremy describes creating an Out Of Band (OOB) management network and three areas of network management: syslog, SNMP, and SSH.
Video 6 - "Foundation Router Security: Understanding and Implementing AAA" - AAA is more than just roadside assistance; it represents authentication, authorization, and accounting (AAA) methods you can use on a Cisco device. This nugget describes the concepts behind AAA and walks through the setup of a AAA device and the Cisco ACS TACACS+ server.
Video 7 - "Foundation Router Security: Using IOS-based Tools for Administrative Access" - While server security is essential, network security is of the utmost importance. One of the first network areas requiring more security is the area of administrative access. By default Cisco switches and routers will allow someone to attempt to logon to the device infinitely. This nugget focuses on locking down this logon prompt, configuring role-based access (sub-administrators), and securing the IOS and configuration files on your devices.
Video 8 - "Foundation Router Security: Becoming an ACL Wizard" - Understanding the implementation of Access Control Lists (ACLs) is critical for any Cisco environment, however, you can apply ACLs in more ways than one. In this nugget, Jeremy walks through guidelines for using ACLs followed by four practical scenarios of ACL implementation.
Video 9 - "Foundation Switch Security: Locking Down the Catalyst Switch" - In this nugget, all eyes turn to the internal network as Jeremy discusses Layer 2 security for your network. This initial nugget explores the reasons for L2 security, common attacks at L2, and concludes with one of the core mitigation techniques: port security.
Video 10 - "Foundation Switch Security: Locking Down the Catalyst Switch, Part 2" - Layer 2 security continues as Jeremy builds multiple layers of security at the switch level including Spanning Tree Protocol (STP) protection, Rogue DHCP server control, Storm Control, SPAN, and Private VLANs.
Video 11 - "Foundation Switch Security: Understanding NAC, Cisco CSA and VoIP Security" - The evolution of network attacks have dictated an entire new generation of Layer 2 security methods. In this nugget, Jeremy discusses these newer forms of security such as Network Admission Control (NAC), 802.1x, the Cisco Security Agent (CSA), and VoIP security.
Video 12 - "Security Services: Implementing Router-Based Firewalls" - The security focus moves from the switch environment to the routed network. This initial nugget discusses Cisco's two firewall strategies: The Cisco IOS Classic Firewall and the Zone-based Firewall.
Video 13 - "Security Services: Implementing Router-Based Firewalls, Part 2" - Cisco's Zone-based Firewall strategy is a completely new style of firewall for IOS routers. This nugget walks through the implementation of the new Zone-based Firewall on live Cisco gear.
Video 14 - "Security Services: Implementing Router-Based IPS" - The Cisco Integrated Service Router (ISR) product line was designed to implement many traditionally separate network functions into a single device. This made the implementation of Intrusion Prevention System (IPS) a natural one. In this nugget, Jeremy discusses the place and configuration of Cisco IPS on an ISR device.
Video 15 - "Security Services: Understanding VPN Components - IPSec and Encryption Virtual Private Networks" - (VPNs) have become a commonplace technology to allow remote users to access a network and bridge multiple offices connected to the Internet into a seamless network fabric. The architecture behind VPN technology is anything but commonplace. In this nugget, Jeremy discusses the IP Security (IPSec) protocol used to create VPN connections, focusing specifically on the encryption capabilities.
Video 16 - "Security Services: Understanding VPN Components - Digital Signatures and PKI" - The VPN discussion continues as Jeremy explains the ideas behind the Public Key Infrastructure (PKI) and certificate-based authentication.
Video 17 - "Security Services: Understanding VPN Architecture" - This final, conceptual nugget on VPN technology focuses on the process devices go through when establishing a VPN connection. Special attention is given to the important concepts of identifying interesting traffic and the Internet Key Exchange (IKE) phases.
Video 18 - "Security Services: Implementing Site-to-Site VPNs via Command Line" - It's time to put the VPN concepts into action! In this nugget, Jeremy walks through the step-by-step process to configure a site-to-site VPN using the command line interface.
Video 19 - "Security Services: Implementing Site-to-Site VPNs via SDM" - Once you have seen the command-line configuration of a site-to-site VPN, this nugget shows you the "easy configuration method" by setting up the same VPN using the Cisco Security Device Manager (SDM) graphic interface.
Video 20 - "A Final Word to CCNA Security Test Takers" - To conclude the CCNA Security series, Jeremy gives some final tips to those focused on the certification exam.


Read more!

AppDev: XSLT - XSL Transformations


Course includes 6+ hours of total training time...

• 2 modules of training
• Over 2 hours of media run time
• Over 300 pages of courseware on CD-ROM
• Step-by-step hands-on-labs
• Sample code
Transforming XML with XSLT teaches you how to use the XSLT language to process your XML data into another markup format like HTML or WAP. You'll learn about the origins and current state of XSLT, and how to create simple "blueprint" stylesheets. You’ll find out about XPath, another XML technology, and learn how to use it to navigate to any node in an XML tree. You’ll discover how to use rule-based stylesheets to create powerful and flexible stylesheet applications. You'll also learn how XSLT differs from procedural programming languages, and how to apply the programming knowledge you already have to this new language and environment.
By the end of the course, you will be able to:

• Create both simple "blueprint" stylesheets to provide quick transformations of your XML data and complex XSLT-based applications that use multiple XML data sources and multiple stylesheets.
• Use XPath to navigate an XML tree and get values from text nodes and attributes.
• Determine the best place and time to process a given transformation: Programmer’s workstation at design time, or upon request using the client’s browser or the web server.
• Create rule-based stylesheets that are easy to maintain and extend.
• Design named templates that act as subroutines in an XSLT stylesheet.
• Use XSLT to calculate results and do totaling based on XML data.
• Decide if and when to use processor-specific extensions in your XSLT applications.
SESSION 1 (90 min)
Introducing XSLT

• What is XSLT?
• Are You Sure This is a Language?
• Transformation Types
• Processing XSL
Simplified Stylesheets

• The Essential Stylesheet
• Using an XSL Blueprint to Create HTML
• What Can’t a Simplified Stylesheet Do?
Using XPath to Get Around

• What Is XPath?
• Figuring Out Location Steps
• Introducing XPath Functions
Adding Template Rules

• What Are Templates?
• Un-Simplifying the Stylesheet
• Using the Template Element
• Other Top-Level Elements
Traditional Programming Concepts and XSLT

• Programming Concepts You can Use
• Working with Variables
• Calling Named Templates
• Using Functions
• Creating Modular Stylesheet Solutions
SESSION 2 (50 min)
Creating an XML Result Tree

• XML-Structured Variables
• XML Node Creation Elements
Doing Calculations in XSLT

• Programming with No Side Effects
• Applying Recursive Programming Techniques
Common XSLT Challenges

• Applying XSLT
• How Do I Group Data?
• Grouping Data: Another Solution
• How Do I Copy HTML Tags from the Data?
• How Do I Add or Remove Whitespace?
Using Processor-Specific Extensions

• The Mechanics of Extensions
• Should You Use Extensions?
• Recovering from Missing Extensions



Read more!

AppDev: SQL Server 2005 Integration Services

Labels: ,

This course will enable technology professionals with little or no ETL experience and minimal exposure to SQL Server 2005 and Visual Studio 2005 to be comfortable and productive with the SSIS tools and technologies. More...
Course includes 30+ hours of total training time...
8 modules of training
Over 10 hours of media run time
Over 650 pages of printable courseware
Step-by-step hands-on-labs
Sample code

Page description:

Download links (st):

Read more!

AppDev: Exploring Visual C# 2005


In this course, you'll see the process of creating an end-to-end Visual C# 2005 application starting with an introduction to the .NET Framework and concluding with the running complete application. Gain insight into a variety of topics focusing on the major areas of application development on the .NET Framework. The application will include coverage of Windows applications, ASP.NET, ADO.NET, Web Services, Windows Services, COM Interop, and more.Course includes 18+ hours of total training time...

• 6 modules of training
• Over 9 hours of media run time
• Step-by-step hands-on-labs
• Sample code

Page description:Code:
Download links (st):

Read more!

AppDev: Exploring Visual Basic 2005

Labels: ,

See the process of creating an end-to-end Visual Basic 2005 application starting with an introduction to the .NET Framework and concluding with the running complete application. Gain insight into a variety of topics focusing on the major areas of application development on the .NET Framework. The application will include coverage of Windows applications, ASP.NET, ADO.NET, Web Services, Windows Services, COM Interop, and more.
Course includes 18+ hours of total training time...
• 6 modules of training
• Over 9 hours of media run time
• Step-by-step hands-on-labs
• Sample code
Page description:

Download links (st):

Read more!