Default gateway
10602049836327222433493328
Course Reference Material
|
White Board Files![]()
![]()
![]()
|
Useful Web Links |
Useful Course Material |
NT/NTLM Password Hash Generator Link
What is the SSL Certificate Chan Professor Messer Web Site for Comp TIA Study How STRONG is your password On Line XOR Calculator. AND/OR/XOR explained Initialisation Vectors explained GCHQ Tap Fibre for Data Collection BT an Toshiba showcase Quantum communications Link High Assurance SSL Link Kerberos![]()
SAML64 WEP Key |
Module 1 Security Threats and Controls
FIPS & EAL some comparisions Difference between Federation and SSO NIST and European equivalent Comparison of IT standards Mapping between NIST 800-53 and ISO 27001 NIST & NSA Backdoors Difference between Virus Worms and Trojan Horses. "newbie".. hence "newb", and later "n00b" CERT UK, CERT US The story behind WIKILeaks Schneier on Security Darren Brown Kill a Stranger another Link GaMeOver Zeus FBI PDF "pwned" Security Monkey Case Files PenTest Module 2 Cryptography and Access Control Initialisation Vectors explained One-Time Pad explained Online Diffie Hellman CalculatorElliptical Curve Cryptography ECC explained Quantum Key Distibution Youtube Heartbleed vulnerability Salted Password Hashing MD5 Avalanche effect Hello World hash will be totally different to Hello MD5 Considered harmful today Brute Force Password Calculator Active Directory YouTube Link World1, and MD5 Collision Demo Module 3 Network Security WEP Explained How Quantum Cryptography Works (Plus Traditional) Creating a Rogue CA Certificate PPTP explained L2TP explained Module 4 Host Data, and Application Security Microsoft Baseline Security Analyser (MBSA) Download SANS Official Website Link Data Loss Prevention Symantec Video Link Big Data Video PFS with SSL/TLS Authenticate RSA Encrypt D/H IaaS/NaaS/SaaS/PaaS Link Federation and Trusts with Office 365 using SAML Logon to a website using Facebook credentials Traffic Light Protocol for sensitive information Safe Harbor and the EU Data Loss Prevention example Heartland Payment Thin Clients for VDI HP Link Buffer Overflow Youtube Link Module 5 Operational Security Locking down Ethernet Link EMI & RFI Difference Link Fire Classes within the UK SCADA PDF Link Supervisory Control & Data Acquisition Staeful Firewall inspection of ACADA and Cisco Support Staged Payloads, malware for the Android Is your Samsung TV Spying on you Link Bluejacking tools The Pareto Principle 80/20 rule ITIL IT Infrastructur Library Data Protection Act UK American Red Cross Rogue tweet Disaster McDonalds Twitter Campaign gone wrong RAID Array with Diagrams, Parity definition Idiots Guide to RAID Array, another Link Asynchronous or Synchronous replication Incident Handling Response Guide (NIST) Site Security Handbook RFC2196 Information Security Policies RUSECURE |