Search This Blog

Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Thursday, September 13, 2018

The Complete Ethical Hacking Masterclass Beginner To Expert Video Training Course On 2 DVDs


Duration : 12:00 Hours

Introduction
1 Lesson

Setting Up Your Environment
6 Lessons

Anonymity
6 Lessons

Getting started with LInux
3 Lessons

Networking Fundamentals
4 Lessons

Information Gathering
14 Lessons

Getting started with Metasploit
5 Lessons

Web Server Hacking
4 Lessons

Exploitation
9 Lessons

Wired and WIreless attacks
5 Lessons

Wireshark - Network Sniffing
4 Lessons

Post Exploitation & Privilege Escalation
2 Lessons

Remote Access Tools (RAT's)
3 Lessons

Rootkits
1 Lesson

Useful Scripts
1 Lesson

Buy This Course DVD Now @







                    







Spring Framework Beginner to Expert Video Training DVD




Duration : 13h 44m


Welcome to the Spring Framework Master Class

Introduction to the Spring Framework Master Class Introduction to the Spring Framework in 10
Steps

Eclipse in 5 Steps

Maven in 5 Steps

Spring Framework in Depth

JUnit in 5 Steps

Mockito in 5 Steps

Unit Testing with the Spring Framework

Basic Web Application

Spring Boot in 10 Steps

Spring AOP

Interacting with Databases - Spring JDBC, JPA and Spring Data

Congratuations

Appendix - Spring Old Course

Bonus Courses

Effective Automated Testing with Spring

Spring Framework In Depth

Learn Spring Cloud

Spring Test-Driven Development with JUnit



Buy This Course DVD Now @







                    






Tuesday, August 21, 2018

Implementing Microsoft Azure Infrastructure Solutions 2018 EXAM 70-533 Video Training Course DVD




Duration : 15.45 Hours
51 Video Lessons



1. Introduction Section

1.1 About the Author 00:00:27
1.2 About the Course and Using the LA Toys Interactive Diagram 00:05:20
2. Manage Azure Identities
2.1 Implement Azure AD B2C 00:09:50
2.2 Implement Azure AD B2B Collaboration 00:11:03
2.3 Implement Social Identity Provider Authentication 00:04:20
2.4 Manage Domains with Azure Active Directory Domain Services 00:19:57
2.5 Integrate with Azure Active Directory (Azure AD) 00:17:51
2.6 Monitor On-Premises Identity Infrastructure and Synchronization Services with Azure AD Connect Health 00:04:53
2.7 Leverage Microsoft Graph API 00:08:49

3. Implement Virtual Networks 
3.1 Configure Virtual Networks - Part 1 00:04:40
3.2 Configure Virtual Networks - Part 2 00:11:57
3.3 Configure Virtual Networks - Part 3 00:12:43
3.4 Configure Virtual Networks - Part 4 00:11:58
3.5 Configure Virtual Networks - Part 5 00:15:40
3.6 Design and Implement Multi-Site or Hybrid Network Connectivity 00:08:40

4. Design and Implement a Storage Strategy 
4.1 Implement Azure Storage Blobs and Azure Files - Part 1 00:10:49
4.2 Implement Azure Storage Blobs and Azure Files - Part 2 00:14:36
4.3 Implement Azure Storage Blobs and Azure Files - Part 3 00:10:31
4.4 Implement Azure Storage Blobs and Azure Files - Part 4 00:14:56
4.5 Implement Azure Storage Blobs and Azure Files - Configure Custom Domains 00:08:52
4.6 Manage Access 00:10:17
4.7 Configure Diagnostics, Monitoring, and Analytics 00:07:40
4.8 Implement Storage Encryption 00:09:57

5. Create and Manage Azure Resource Manager Virtual Machines (20-25%)
5.1 Deploy Workloads on Azure Resource Manager (ARM) Virtual Machines (VMs) - Part 1 00:17:33
5.2 Deploy Workloads on Azure Resource Manager (ARM) Virtual Machines (VMs) - Part 2 00:16:44
5.3 Perform Configuration Management - Part 1 00:15:47
5.4 Perform Configuration Management - Part 2 00:08:13
5.5 Design and Implement VM Storage - Disk Encryption 00:15:42
5.6 Monitor ARM VMs 00:17:33
5.7 Manage ARM VM Availability 00:14:15
5.8 Scale ARM VMs 00:11:06
5.9 Manage Containers with Azure Container Services - Part 1 00:11:36
5.10 Manage Containers with Azure Container Services - Part 2 00:06:44
5.11 Manage Containers with Azure Container Services - Part 3 00:07:23

6. Design and Implement Azure App Service Apps 
6.1 Deploy Web Apps - Part 1 00:13:30
6.2 Deploy Web Apps - Part 2 00:19:20
6.3 Configure Web Apps 00:13:56
6.4 Configure Diagnostics, Monitoring, and Analytics 00:10:06
6.5 Configure Web Apps for Scale and Resilience - Part 1 00:06:27
6.6 Configure Web Apps for Scale and Resilience - Part 2 00:16:41
6.7 Configure Diagnostics, Monitoring and Analytics - Remote Debugging 00:02:34

7. Design and Deploy ARM Templates 
7.1 Implement ARM Templates 00:15:56
7.2 Control Access - Part 1 00:14:27
7.3 Control Access - Part 2 00:02:47
7.4 Design Role-Based Access Control (RBAC) 00:07:54

8. Manage Azure Security and Recovery Services 
8.1 Manage Data Protection and Security Compliance - Part 1 00:15:49
8.2 Manage Data Protection and Security Compliance - Part 2 00:10:09
8.3 Implement Recovery Services - Part 1 00:09:58
8.4 Implement Recovery Services - Part 2 00:14:16

9. Manage Azure Operations
9.1 Enhance Cloud Management with Automation 00:11:57
9.2 Collect and Analyze Data Generated by Resources in Cloud and On-Premises Environments 00:14:05


Buy This Course DVD Now @







                  







Thursday, March 8, 2018

The Complete Cyber ​​Security Video Training Course on 5 DVDs




Duration - 52 Hours
530 Video Lessons
5 DVDs


1_Hacking Exposed (DVD1 & DVD2)
Duration : 11 Hours

Learn how to stop hackers, prevent tracking, advanced anonymous browsing, and Learn a practical skill-set in defeating all online threats, including - advanced hackers, trackers, malware, zero days, exploit kits, cyber criminals and more.

Introduction 6 Lectures
know Yourself - The Threat and Vulnerability Landscape 11 Lectures
Know Your Enemy - The Current Threat and Vulnerability Landscape 18 Lectures
Encryption Crash Course 13 Lectures
Setting up a Testing Environment Using Virtual Machines (Lab) 5 Lectures
Operating System Security & Privacy (Windows vs Mac OS X vs Linux) 17 Lectures
Security Bugs and Vulnerabilities 13 Lectures
Reducing Threat Privilege 4 Lectures
Social Engineering and Social Media Offence and Defence 6 Lectures
Security Domains 2 Lectures
Security Through Isolation and Compartmentalization 18 Lectures
Wrap Up 6 Lectures
BONUS Section 01:03

2_Network security (DVD-3)
Duration : 12:10 Hours

WiFi Security, WiFi Hackers, Firewalls, Wireshark. Plus Best Password Managers
Introduction 6 Lectures
Goals and Learning Objectives - Volume 2 1 Lecture
Routers - Port and Vulnerability scanning 5 Lectures
Firewalls 14 Lectures
Network Attacks, Architecture and Isolation 5 Lectures
Wireless and Wi-Fi Security 8 Lectures
Network Monitoring for Threats 7 Lectures
How We Are Tracked Online 11 Lectures
Search Engines and Privacy 7 Lectures
Browser Security and Tracking Prevention 18 Lectures
Passwords and Authentication Methods 17 Lectures
Wrap Up 5 Lectures
BONUS Section 

3_Anonymous Browsing (DVD-4)
Duration : 13:30 Hours

Anonymous, Hide my IP, Internet Privacy, Hacker OPSEC, Tor, proxy servers and virtual private networks Best

Introduction 6 Lectures
Goals and Objectives for Volume III 1 Lecture
OPSEC (Operational Security) 9 Lectures
Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu 5 Lectures
Virtual Private Networks (VPNs) 13 Lectures
Tor 16 Lectures
VPN and Tor Routers 6 Lectures
Proxies – HTTP, HTTPS, SOCKs and Web 4 Lectures
SSH Secure Shell 7 Lectures
I2P - The Invisible Internet Project 5 Lectures
Other Privacy and Anonymising Services 5 Lectures
Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection 8 Lectures
Chaining/Nesting Privacy and Anonymising Services 14 Lectures
Off-site Internet Connections - Hotspots and Cafes 7 Lectures
Mobile, Cell Phones & Cellular Networks 7 Lectures
Wrap Up 5 Lectures
BONUS Section 00:47

4_End Point Protection (DVD-5)
Duration : 16:38 Hours

Antivirus and Malware, Disk Encryption, Detection and Removal of Malware and Hackers, Applications and Execution Control
Introduction 6 Lectures
Goals and Learning Objectives - Volume 4 2 Lectures
File and Disk Encryption 22 Lectures
Anti-Virus and End-Point-Protection 14 Lectures
Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR) 4 Lectures
End-Point-Protection Technology 26 Lectures
Threat Detection and Monitoring 17 Lectures
Malware and Hacker Hunting on the End-Point 30 Lectures
Operating System and Application Hardening 11 Lectures
Secure Deleting, Evidence Elimination and Anti-Forensics 12 Lectures
Email Security, Privacy and Anonymity 17 Lectures
Messengers - Security, Privacy and Anonymity 10 Lectures
Wrap Up 5 Lectures
BONUS Section 01:03

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term

Thursday, February 8, 2018

Implementing Microsoft Azure Infrastructure Exam 70-533 Video Training Course DVD



Duration : 32 Hours

98 Video Lessons
PDF Guides

 Important Information on Latest Azure Certification Updates
 Welcome to the Course

Design and Implement Azure App Service Apps
 App Service Overview
 Web App Overview
 Demo: Create a Web App via the Portal
 Demo: Create a Web App via CLI
 Demo: Create a Web App via PowerShell
 App Service General Configuration
 Demo: App Service General Settings
 Demo: Custom Certificates and Domain Names
 Demo: KUDU
 Web App Deployments
 Demo: Deployment Slots and Settings
 Demo: Deployment Options/Sources
 Demo: Slot Swaps and Rollbacks
 Demo: Post-Deployment Actions
 Demo: Web Deploy From Visual Studio
 App Service Monitoring
 Demo: App Service Monitoring
 Demo: Alerts
 Autoscaling, High Availability, and Resilience
 Demo: App Service Plan Autoscale
 WebJobs Overview
 Demo: Web App Migration via the Migration Assistant
 Demo: Remote Debugging
 Demo: App Service Console, Diagnostics and Monitoring
 Create and Manage Azure Resource Manager Virtual Machines
 Virtual Machines Overview
 Virtual Machine Sizes
 Desired State Configuration, VM Agent, Puppet and Chef
 VM Disks Overview
 Azure File Service
 VM Disk Encryption
 Demo: VM Monitoring
 Availability Sets
 Virtual Machine Scale Sets
 Demo: Scale Up a VM with PowerShell
 Demo: VMSS Scaling

Design and Implement a Storage Strategy
 Storage Overview
 Demo: Storage Overview
 Storage Blobs Overview
 Demo: Azure Storage Explorer
 Demo: AzCopy
 Demo: PowerShell Blob CRUD
 Shared Access Signatures, Stored Access Policies, and Storage Keys
 Demo: Shared Access Signatures
 Azure Table Storage Overview
 Azure Queue Storage Overview
 Demo: Diagnostics, Monitoring, and Analytics
 Storage Data Security
 Content Delivery Networks
 Demo: Azure CDN
 Azure SQL Database Overview
 Demo: Azure SQL Database Overview
 Azure SQL Database Replication and Data Sync
 Azure SQL Database Migration
 Demo: Azure SQL Database Import and Export
 Azure SQL Database Security
 Azure SQL Database Scaling
 Recovery Services
 Demo: Recovery Services

Implement Azure Active Directory
 Azure Active Directory Overview
 Azure AD Connect
 Demo: Azure AD Connect
 Demo: Custom AD Domains
 OAuth and OpenID Connect
 SAML and WS-Federation
 Demo: Federated Identity with Workplace by Facebook and G Suite/Google 

Apps
 Azure AD Applications
 Graph API
 Demo: Create an Azure AD App
 Demo: Obtain an OAuth Token from an Azure AD App
 Demo: Manage Azure AD Users with the Graph API
 Azure AD B2C and Azure AD B2B Overview
 Demo: Create and Configure an Azure AD B2C

Implement Virtual Networks
 Virtual Network Overview
 Load Balancer and Application Gateway
 Demo: Azure Load Balancer
 Demo: Application Gateway
 User Defined Routes
 Network Security Groups
 Demo: Network Security Groups
 IP Addressing Overview
 Hybrid Networking Overview
 Demo: P2S VPN Setup
 S2S VPN Gateway Configuration
 ExpressRoute Configuration
 Peering and VNet-to-VNet VPNs
 Demo: VNet Peering

Design and Deploy ARM Templates
 ARM Template Overview
 ARM Template Structure
 Demo: ARM Template Structure
 Demo: ARM Template Deployment With PowerShell
 Role-Based Access Control Overview
 Service Principals
 Resource Policies and Locking Resources
 Demo: Resource Policies
 Demo: Resource Locks

Congratulations and Next Steps

Thursday, November 30, 2017

Learn Security Penetration Testing Video Training Course on 2 DVDs


Duration : 4.30 Hours

40 Video Lessons
01 - Security Penetration Testing  Introduction
02 - 1.0 Learning objectives
03 - 1.1 Introducing Ethical Hacking and Pen Testing
04 - 1.2 Getting Started with Ethical Hacking and Pen Testing
05 - 1.3 Understanding the Legal Aspects of Penetration Testing
06 - 1.4 Exploring Penetration Testing Methodologies
07 - 1.5 Exploring Penetration Testing and other Cyber Security Certifications
08 - 1.6 Building Your Own Lab
09 - 1.7 Understanding Vulnerabilities, Threats, and Exploits
10 - 1.8 Understanding the Current Threat Landscape
11 - 2.0 Learning objectives
12 - 2.1 Installing Kali
13 - 2.2 Examining Kali Modules and Architecture
14 - 2.3 Managing Kali Services
15 - 3.0 Learning objectives
16 - 3.1 Understanding Passive Reconnaissance
17 - 3.2 Exploring Passive Reconnaissance Methodologies
18 - 3.3 Surveying Essential Tools for Passive Reconnaissance
19 - 4.0 Learning objectives
20 - 4.1 Understanding Active Reconnaissance
21 - 4.2 Exploring Active Reconnaissance Methodologies 
22 - 4.3 Surveying Essential Tools for Active Reconnaissance
23 - 5.0 Learning objectives
24 - 5.1 Understanding Web Applications
25 - 5.2 Understanding Web Architectures
26 - 5.3 Uncovering Web Vulnerabilities
27 - 5.4 Exploring Methodologies for Testing Web Applications
28 - 5.5 Understanding the Exploitation of Web Applications
29 - 5.6 Surveying Defenses to Mitigate Web Application Hacking
30 - 6.0 Learning objectives
31 - 6.1 Understanding Authentication and Authorization Mechanisms
32 - 6.2 Understanding Authentication and Authorization Attacks
33 - 6.3 Exploring Password Storage Mechanisms
34 - 6.4 Attacking Password Storage
35 - 6.5 Exploring Password Cracking
36 - 7.0 Learning objectives
37 - 7.1 Reviewing Database Fundamentals
38 - 7.2 Attacking a Database
39 - 7.3 Surveying Defenses to Mitigate Database Hacking
40 - Security Penetration Testing  Summary


======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================Term

Wednesday, September 20, 2017

Ethical Hacking From Scratch Video Course Training DVD






Duration : 12 Hours

Introduction 12:34
Course Introduction & Overview 03:15
Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam  06:10
What Is Hacking & Why Learn It ? 03:09
Setting up The Lab 25:39
Lab Overview & Needed Software  03:25
Installing Kali 2017 As a Virtual Machine 08:32
Installing Metasploitable As a Virtual Machine 04:13
Installing Windows As a Virtual Machine  03:21
Creating & Using Snapshots  06:08

Linux Basics 20:53
Basic Overview of Kali Linux  07:05
The Terminal & Linux Commands  09:06
Updating Sources & Installing Programs  04:42
Network Penetration Testing 28:47
Network Penetration Testing Introduction 02:42

Networks Basics  03:09
Connecting a Wireless Adapter To Kali 07:18
What is MAC Address & How To Change It 04:44
Wireless Modes (Managed & Monitor) 05:02
Enabling Monitor Mode Manually (2nd method) 02:36
Enabling Monitor Mode Using airmon-ng (3rd method) 03:16

Network Penetration Testing - Pre Connection Attacks31:57
Packet Sniffing Basics Using Airodump-ng 05:40
Targeted Packet Sniffing Using Airodump-ng 07:27
Deauthentication Attack (Disconnecting Any Device From The Network) 05:16
Creating a Fake Access Point (Honeypot) - Theory 03:44
Creating a Fake Access Point (Honeypot) - Practical 09:50
Network Penetration Testing - Gaining Access (WEP/WPA/WPA2 Cracking)55:38

Gaining Access Introduction 01:16
WEP Cracking - Theory Behind Cracking WEP Encryption 03:26
WEP Cracking - Basic Case 06:27
WEP Cracking - Fake Authentication 05:59
WEP Cracking - ARP Request Replay Attack 04:44
WPA Cracking - Introduction 02:03
WPA Cracking - Exploiting WPS Feature 07:17
WPA Cracking - Theory Behind WPA/WPA2 Cracking 02:18
WPA Cracking - How To Capture The Handshake 04:43
WPA Cracking - Creating a Wordlist 06:08
WPA Cracking - Using a Wordlist Attack 02:49
Securing Your Network From The Above Attacks 02:03
How to Configure Wireless Security Settings To Secure Your Network 06:25

Network Penetration Testing - Post Connection Attacks 01:43:25
Introduction  02:43
Information Gathering - Discovering Connected Clients using netdiscover 03:31
Gathering More Information Using Autoscan 08:42
Gathering Even More Information Using Zenmap 11:15
MITM - ARP Poisonning Theory 05:51
MITM - ARP Spoofing using arpspoof 05:51
MITM - ARP Spoofing Using MITMf 05:21
MITM - Bypassing HTTPS 04:40
MITM - Session Hijacking 06:34
MITM - DNS Spoofing 05:10
MITM - Capturing Screen Of Target & Injecting a Keylogger 05:12
MITM - Injecting Javascript/HTML Code 06:43
MITM - Using MITMf Against Real Networks 09:08
Wireshark - Basic Overview & How To Use It With MITM Attacks 09:08
Wireshark - Sniffing Data & Analysing HTTP Traffic 08:00
Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network 05:36
Network Penetration Testing - Detection & Security 11:02
Detecting ARP Poisonning Attacks 05:11
Detecting suspicious Activities Using Wireshark 05:51
Gaining Access To Computer Devices 04:14
Gaining Access Introduction 04:14

Gaining Access - Server Side Attacks 01:17:44
Introduction 04:05
Basic Information Gathering & Exploitation 10:05
Using a Basic Metasploit Exploit  07:31
Exploiting a Code Execution Vulnerability 10:03
MSFC - Installing MSFC (Metasploit Community) 05:46
MSFC - Scanning Target(s) For Vulnerabilities 03:21
MSFC - Analysing Scan results & Exploiting Target System 09:42
Nexpose - Installing Nexpose 09:59
Nexpose - How To Configure & Launch a Scan09:16
Nexpose - Analysing Scan Results & Generating Reports  07:56

Gaining Access - Client Side Attacks 01:03:46
Introduction 02:19
Installing Veil 3 07:49
Veil Overview & Payloads Basics 07:20
Generating An Undetectable Backdoor Using Veil 3 09:44
Listening For Incoming Connections 07:18
Using A Basic Deliver Method To Test The Backdoor & Hack Windows 10 07:12
Backdoor Delivery Method 1 - Using a Fake Update 09:50
Backdoor Delivery Method 2 - Backdooring Downloads on The Fly 08:23
How to Protect Yourself From The Discussed Delivery Methods 03:51

Gaining Access - Client Side Attacks - Social Engineering 01:29:26
Introduction 02:43
Maltego Basics 05:48
Discovering Websites, Links & Social Networking Accounts Associated With Target 07:32
Discovering Twitter Friends & Associated Accounts 04:57
Discovering Emails Of The Target's Friends 03:48
Analysing The Gathered Info & Building An Attack Stratigy 08:41
Backdooring Any File Type (images, pdf's ...etc) 04:41
Compiling & Changing Trojan's Icon 06:16
Spoofing .exe Extension To Any Extension (jpg, pdf ...etc) 08:29
Spoofing Emails - Send Emails As Any Email Account You Want 07:33
BeEF Overview & Basic Hook Method 06:39
BeEF - hooking targets using MITMf 03:11
BeEF - Running Basic Commands On Target 04:24
BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 02:17
BeEF - Gaining Full Control Over Windows Target 03:39
Detecting Trojans Manually 05:32
Detecting Trojans Using a Sandbox 03:16
-
Gaining Access - Using The Above Attacks Outside The Local Network 24:17
Overview of the Setup 06:06
Ex1 - Generating a Backdoor That Works Outside The Network 05:24
Configuring The Router To Forward Connections To Kali 06:58
Ex2 - Using BeEF Outside The Network 05:49
Post Exploitation 43:29
Introduction 02:02
Meterpreter Basics 06:22
File System Commands 05:09
Maintaining Access - Basic Methods 05:07
Maintaining Access - Using a Reliable & Undetectable Method 06:53
Spying - Capturing Key Strikes & Taking Screen Shots 02:39
Pivoting - Theory (What is Pivoting?) 07:06
Pivoting - Exploiting Devices on The Same Network As The Target Computer 08:11

Website Penetration Testing 08:07
Introduction - What Is A Website ? 04:16
How To Hack a Website? 03:51
Website Pentesting - Information Gathering 38:05
Gathering Basic Information Using Whois Lookup 05:36
Discoverin Technologies Used On The Website 06:03
Gathering Comprehensive DNS Information 05:57
Discovering Websites On The Same Server 03:42
Discovering Subdomains 05:05
Discovering Sensitive Files 07:25
Analysing Discovered Files 04:17

Website Pentesting - File Upload, Code Execution & File Inclusion Vulns 36:12
Discovering & Exploiting File Upload Vulnerabilities 06:43
Discovering & Exploiting Code Execution Vulnerabilities 07:25
Discovering & Exploiting Local File Inclusion Vulnerabilities 05:16
Remote File Inclusion Vulnerabilities - Configuring PHP Settings 03:45
Remote File Inclusion Vulnerabilities - Discovery & Exploitation 05:44
Preventing The Above Vulnerabilities 07:19

Website Pentesting - SQL Injection Vulnerabilities 59:18
What is SQL 05:48
Dangers of SQL Injection Vulnerabilities 02:53
Discovering SQL injections In POST 07:56
Bypassing Logins Using SQL injection Vulnerability 04:48
Discovering SQL injections in GET 06:44
Reading Database Information 05:26
Finding Database Tables 03:33
Extracting Sensitive Data Such As Passwords 04:29
Reading & Writing Files On The Server Using SQL Injection Vulnerability 05:57
Discoverting SQL Injections & Extracting Data Using SQLmap 06:47
The Right Way To Prevent SQL Injection 04:57

Website Pentesting - Cross Site Scripting Vulnerabilities 20:35
Introduction - What is XSS or Cross Site Scripting? 03:09
Discovering Reflected XSS 03:46
Discovering Stored XSS 02:56
Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF 05:31
Preventing XSS Vulnerabilities 05:13

Website Pentesting - Discovering Vulnerabilities Automatically Using OWASP ZAP 08:29
Scanning Target Website For Vulnerabilities 04:18
Analysing Scan Results  04:11

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term


Shipping Banner

Wednesday, July 19, 2017

Learn Hadoop Security Video Training Tutorial DVD Rs 425/-




Duration: 5 hours 25 minutes

Chapter: Course Overview
About This Course 
About The Instructor 
Course Sittings 
At The End Of This Course 

Chapter: Tooling
Initializing Amazon Web Services 
Using Cloudera Director To Spin Up A Test Cluster 
Crash Course In Cloudera Manager 

Chapter: Hadoop Insecurities
Permissions And Encryption 
Where Permissions Stop 
Hive: Transform Harmful 

Chapter: Authentication With MIT Kerberos
Installing MIT Kerberos 
Enabling Kerberos Authentication 
Using MIT Kerberos
Submitting Jobs And Running Queries With Kerberos Auth 

Chapter: Authentication With Active Directory
Installing An AD Server 
Preparing AD Server For Hadoop 
Impala LDAP Authentication With Active Directory 
Using Hue With Active Directory 
Preparing Cluster With Kerberos Authentication 
Running The CM Wizard
Using Kerberos 
Sharing Kerberos Tickets With Active Directory 
Chapter: Authorization
No Authorization 
Enabling Sentry Authorization
Using Sentry - Defining Roles
Using Sentry - Querying With Hue
Custom Code And Hive UDFs With Sentry
HDFS Extended ACLs
HDFS Sentry Sync
Sentry Authentication With Solr - Part 1 
Sentry Authentication With Solr - Part 2 

Chapter: Encryption
Creating An HDFS Encryption Zone
Using HDFS Encryption Zones 
SSL: Crash Course In SSL Tools 
SSL: Preparing A Cluster For SSL Using A Self-Signed Root CA 
SSL: Enabling SSL For HDFS And Yarn 
SSL: Verifying SSL With HDFS And Yar 
SASL Hive And HiveServer2 
SSL With HBase And Oozie 
SSL With Impala 
SSL With Hue 

Chapter: Developer Topics
UserGroupInformation Basics
Delegation Tokens
Secure Impersonation 

Chapter: Administrator Topics
Role Assignments And Gateway Isolation
Hbase ACLs
Audits 
Sqoop
Joining An AD Domain

Chapter: Secure Hadoop Topics
The Secure Hadoop Market 
Cheats 

 ======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term


Shipping Banner