|
Security+
Certification
Links
Comptia Security+ Exam
Certmag.com
Top Paying Certifications
Security
Certification Staples
ISC2
Certifications Page
Security Websites
Security Now!
www.sans.org
www.cert.org
CVE Common Vulnerabilities and Exposures
DShield.org
ARP Cache Poisoning
Grc.com – ARP Cache Poisoning
Trojan Horses and NetBus
Windowssecurity.com
- Trojan Horses, Back Doors…
Different Trojan Horse
Ports
Old
NetBus Article
Open Mail Relay (OMR) and DNS
Wikipedia
Open Mail Relay
Answers.com Open Mail
Relay
www.dnsreports.com
Fixing Open DNS Servers
DNS Not
Secure
IDS and IPS
IDS FAQs
from sans.org
Intrusion Prevention
Systems from securityfocus.com
Honeypots
Securityfocus.com Honeypot Article
Honeypots: The sweet spot in network security
Project.honeynet.org
Intrusion Detection, Honeypots and Incident Handling Resources
Transport Layer Security (TLS)
Wikipedia – Transport Layer Security
HTTP Over TLS
IETF TLS – RFC 2246
RADIUS and TACACS+
Wikipedia
– TACACS+
Wireless and Wireless Security
WikiPedia
802.11
www.wi-fi.org
Network
World Wireless Security Article
wi-fi.org
Security Article
Microsoft
WPA Setup
WiFi Protected Access (WPA) Weaknesses
WiFi Net News 802.11n Discussions
Encryption and Key Exchange
RSA
Laboratories Crypto FAQ
What is Diffie-Hellman?
What is the
RSA Cryptosystem?
Wikipedia – Hash Function
IETF MD5 –
RFC 1221
Microsoft
Technet Public Key Interoperability Article
Digital Certificates
Wikipedia
X.509 Certificates
Wikipedia
PKCS
Certificate Authority List
from Netscape
TCP/IP
Well Known
TCP/UDP Port Numbers
John Kristoff's Overview of TCP
RFC 793 - TCP
The Basics of Transmission
Control Protocol
TCP
Sequence Numbers Explained -- give it time to load and scroll up a
bit
Tutorial
Articles on TCP/IP Sequence Diagrams
Configuring Access Control Lists
IP Access Lists
Configuration Guide (47KB)
Access List Resource Document (35KB)
Reflexive
Access Lists and Established Keyword
Configuring
Commonly used IP Access Lists
Virtual LANs (VLANs)
InterSwitch Link and IEEE 802.1Q Frame Format
Understanding
and Configuring VLAN Trunking Protocol
Configuring
Routing Between VLANs with IEEE 802.1Q Encapsulation
Network Address Translation (NAT)
Frequently
Asked Questions about Cisco IOS NAT
Configuring
Static and Dynamic NAT Simultaneously
Infosec Security Policies
http://www.sans.org/resources/policies/
Acceptable
Use Policy
Creating a
Computer Security Incident Response Team – cert.org
Secure
Infrastructure Design – cert.org
Security Often Sacrificed for Convenience
SNMP and Management
http://www.snmplink.org/
SNMP
Version 3 (Cisco)
Cisco
Security Advisory: Malformed SNMP Message-Handling Vulnerabilities
Configuring
SSH
Download Putty
Telnet/SSH Software (350KB)
Digital Rights Management (DRM)
Wikipedia DRM
DRM Watch
Rootkits and Rootkit
Revealer from Sysinternals – Sony’s
Rootkit
Digital WatermarkingWorld
Steganography
Wikipedia Steganography
Identity Management
Wikipedia
Single Sign-on
Psynch Identity Management Article
MTech Password Synchronization
Single
Sign-on Software list
Implementing
Password Synchronization
|