Saturday, February 28, 2009

Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

Product Description
Identify, mitigate, and respond to network attacks
* Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware
* Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS
* Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration
* Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI)
* Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM)
Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network.
This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products.
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner’s guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments.
The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network.
“I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider’s guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks.”
–Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems®
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Download Link:

Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

P2P Networking and Applications

# Hardcover: 408 pages
# Publisher: Morgan Kaufmann (December 29, 2008)
# Language: English
# ISBN-10: 0123742145
# ISBN-13: 978-0123742148
Review
* Uses well-known commercial P2P systems as models, thus demonstrating real-world applicability.
* Discusses how current research trends in wireless networking, high-def content, DRM, etc. will intersect with P2P, allowing readers to account for future developments in their designs.
* Provides online access to the Overlay Weaver P2P emulator, an open source tool that supports a number of peer-to-peer applications with which readers can practice.

Download Link:

P2P Networking and Applications

Some Videos on TCP IP Subnetting

Download Link:

Some Videos on TCP IP Subnetting

http://rapidshare.com/files/195342948/readme.zip

Wireshark Troubleshooting Network Performance

This course focuses on the causes of poor network performance including packet-loss, retransmissions, high latency, low throughput rates, minimal bandwidth, application errors, configuration faults, resolution problems and protocol behavior problems. Section
1: Analyzer Placement a) Analyzing Hubbed Networks b) Analyzing Switched Networks c) Analyzing Routed Networks d) Analyzing WAN Links e) Capturing in Stealth Mode Section
2: Normal Network Communications a) When Everything Goes Right b) The Multi-Step Resolution Process c) Building the Packet Section
3: Causes of Performance Problems a) Where Network Faults Occur b) Time is of the Essence Section
4: Wireshark Functions for Troubleshooting a) Using Pre-Defined Coloring Rules b) Basic and Advanced IO Graphs c) Use the Delta Time Value d) Analyze Expert Information
e) Look Who s Talking f) Graph Bandwidth Use, Round Trip Time and TCP Performance g) Flow Graphing h) Statistics (Various) Section
5: Latency Issues a) The Five Primary Points in Calculating Latency b) Plotting High Latency Times c) Free Latency Calculators d) Using the frame.time_delta Filter Section
6: Packet Loss and Retransmissions a) Packet Loss and Recovery UDP v. TCP b) Previous Segment Lost Events c) Duplicate ACKs d) TCP Retransmissions and Fast Retransmissions e) Out-of-Order Segments Section
7: Misconfigurations and Redirections a) Visible Misconfigurations b) Don t Forget the Time Section
8: Dealing with Congestion a) Shattered Windows b) Flooded Out Section
9: Baseline Network Communications a) Your First Task When You Finish this Class

Download Link:

Wireshark_Troubleshooting_Network_Performance.part1.rar

Wireshark_Troubleshooting_Network_Performance.part2.rar

Wireshark_Troubleshooting_Network_Performance.part3.rar

Wireshark_Troubleshooting_Network_Performance.part4.rar

http://rapidshare.com/files/195342948/readme.zip

Wireshark Functionality and Fundamentals


Learn to use Wireshark efficiently and effectively by placing your analyzer in an ideal location to capture traffic (even on a switched network). Learn to focus on key traffic using capture filters and display filters. Graph
traffic, use navigation and colorization techniques and time values to easily spot network problems. Customize your Wireshark system and use the Expert system to identify problem areas. Learn how tshark, editcap, capinfos and other command-line tools work and test yourself by completing lab exercises.

Download Link:

Wireshark_Functionality_and_Fundamentals.part1.rar

Wireshark_Functionality_and_Fundamentals.part2.rar

Wireshark_Functionality_and_Fundamentals.part3.rar

Wireshark_Functionality_and_Fundamentals.part4.rar

Wireshark_Functionality_and_Fundamentals.part5.rar

Wireshark_Functionality_and_Fundamentals.part6.rar

http://rapidshare.com/files/195342948/readme.zip

Wireshark TCP/IP Network Analysis

This course focuses on both the normal and abnormal communication patterns of the TCP/IP suite and most common applications including DHCP, DNS, FTP, Telnet, HTTP, POP and SMTP. Course Overview - Introduction Section
1: TCP/IP Functionality Overview a) Resources and References for Analysts b) Capture on Hubbed, Switched and Routed Networks c) The TCP/IP Resolution Process d) Packets Going the Wrong Way e) Faults in the Resolution Process f) Test Yourself: What If Section
2: Analyze DNS Traffic a) Understand DNS Packet Structure b) Filter on DNS Traffic c) Analyze Normal DNS Traffic d) Analyze Unusual DNS Traffic Section
3: Analyze ARP Traffic a) Understand ARP Packet Structure b) Filter on ARP Traffic c) Analyze Normal ARP Traffic d) Analyze Unusual ARP Traffic Section
4: Analyze IPv4 Traffic a) Understand IPv4 Packet Structure
b) Filter on IPv4 Traffic c) Analyze Normal IPv4 Traffic d) Analyze Unusual IPv4 Traffic Section
5: Analyze ICMP Traffic a) Understand ICMP Packet Structure b) Filter on ICMP Traffic c) Analyze Normal ICMP Traffic d) Analyze Unusual ICMP Traffic Section
6: Analyze UDP Traffic a) Understand UDP Packet Structure b) Filter on UDP Traffic c) Analyze Normal UDP Traffic d) Analyze Unusual UDP Traffic Section
7: Analyze TCP Traffic a) Understand TCP Packet Structure b) Filter on TCP Traffic c) Analyze Normal TCP Traffic d) Analyze Unusual TCP Traffic Section
8: Analyze DHCP Traffic a) Understand DHCP Packet Structure b) Filter on DHCP Traffic c) Analyze Normal DHCP Traffic d) Analyze Unusual DHCP Traffic Section
9: Analyze HTTP Traffic a) Understand HTTP Packet Structure b) Filter on HTTP Traffic c) Analyze Normal HTTP Traffic d) Analyze Unusual HTTP Traffic Section
10: Analyze Telnet Traffic a) Understand Telnet Packet Structure b) Filter on Telnet Traffic c) Analyze Normal Telnet Traffic d) Analyze Unusual Telnet Traffic Section
11: Analyze FTP Traffic a) Understand FTP Packet Structure b) Filter on FTP Traffic c) Analyze Normal FTP Traffic d) Analyze Unusual FTP Traffic Section
12: Analyze POP Traffic a) Understand POP Packet Structure b) Filter on POP Traffic c) Analyze Normal POP Traffic d) Analyze Unusual POP Traffic Section
13: Analyze SMTP Traffic a) Understand SMTP Packet Structure b) Filter on SMTP Traffic c) Analyze Normal SMTP Traffic d) Analyze Unusual SMTP Traffic.

Download Link:

Wireshark_TCPIP_Network_Analysis.part1.rar

Wireshark_TCPIP_Network_Analysis.part2.rar

Wireshark_TCPIP_Network_Analysis.part3.rar

Wireshark_TCPIP_Network_Analysis.part4.rar

Wireshark_TCPIP_Network_Analysis.part5.rar

Wireshark_TCPIP_Network_Analysis.part6.rar

http://rapidshare.com/files/195342948/readme.zip