SSCP Video Course Domain 7 - Malicious Code

Video description

Malicious Code

Shon Harris

The fast, powerful way to prepare for your SSCP exam!

Get all the hands-on training you need to pass (ISC)²’s tough SSCP exam, get certified, and move forward in your IT security career! In this online video, the world’s #1 information security trainer walks you through every skill and concept you’ll need to master. This online video contains over four hours of training adapted from Shon Harris’s legendary five-day SSCP boot camps–including realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-world settings!

Comprehensive coverage of SSCP domains of knowledge:

     .    Cookies

     .    Virus

     .    Passwords

     .    Home Page Hijacking

     .    Malicious Code Attacks

     .    Automatic Patch Management Solutions

About the Shon Harris Security Series

This online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris’s unsurpassed experience in teaching IT security professionals.

Category: Security

System Requirements

OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more

Table of contents

  1. Course Introduction 00:17:17
  2. Domain 7 - Malicious Code 00:01:23
  3. Vulnerabilities at Different Layers 00:00:36
  4. Tiered Network Architectures 00:00:53
  5. Sensitive Data Availability 00:02:00
  6. Cookies 00:02:35
  7. Find Out Where You Have Been 00:00:47
  8. Pulling Data 00:01:03
  9. Web Server Error Pages 00:00:36
  10. Common Web Server Flaws 00:01:53
  11. Improper Data Validation 00:01:22
  12. Directory Traversal 00:02:00
  13. Buffer Overflow 00:01:59
  14. Cross Site Scripting Attack 00:01:31
  15. Common SQL Injection Attack 00:01:38
  16. CGI Information 00:02:38
  17. Logging Activities 00:01:20
  18. Best Practices 00:03:19
  19. Agenda (1) 00:00:36
  20. Are ALL Patches Applied? 00:00:45
  21. Patching Process Chart 00:02:40
  22. Patching Issues 00:01:41
  23. Agenda 2 00:02:11
  24. Boot Sector Invasion 00:00:47
  25. Types of Viruses 00:00:52
  26. More Malware 00:01:47
  27. Blended Malware 00:01:21
  28. Hoaxes 00:01:00
  29. Agenda 3 00:03:51
  30. Attack Characteristics 00:00:57
  31. Disclosing Data in an Unauthorized Manner 00:01:50
  32. Covert Storage Channel 00:01:28
  33. Covert Timing Channel 00:01:35
  34. Circumventing Access Controls 00:01:03
  35. Attacks 00:01:46
  36. Attack Type - Race Condition 00:01:35
  37. Attacking Through Applications 00:02:24
  38. How a Buffer Overflow Works 00:01:00
  39. Watching Network Traffic 00:01:19
  40. Traffic Analysis 00:01:17
  41. Functionally Two Different Types 00:03:20
  42. Double File Extensions 00:01:53
  43. Denial of Service Definition 00:01:37
  44. History of Denial of Service 00:00:49
  45. Denial of Service Attacks 00:01:11
  46. SYN Flood 00:01:21
  47. SYN Attacks 00:01:54
  48. SYN Attacks Defense 00:02:26
  49. DDoS 00:03:31
  50. Distributed DoS 00:00:45
  51. DoS Tools 00:01:43
  52. Other DDoS Variations 00:01:34
  53. DDoS Defenses 00:04:51
  54. DDoS Countermeasures 00:00:56
  55. RPC Null Fragment Attack 00:02:56
  56. Another Danger to Be Aware of…Spyware 00:01:54
  57. New Spyware Is Being Identified Every Week 00:00:55
  58. Passwords 00:05:52
  59. Password Generators 00:01:33
  60. Password Attacks 00:03:09
  61. Rainbow Table 00:02:47
  62. Countermeasures for Password Cracking 00:05:36
  63. Cognitive Passwords 00:01:44
  64. One-Time Password Authentication 00:00:49
  65. Synchronous Token 00:02:13
  66. One Type of Solution 00:01:07
  67. Synchronous Steps 00:01:34
  68. Challenge/Response Authentication 00:03:45
  69. Asynchronous Steps 00:02:14
  70. Cryptographic Keys 00:01:39
  71. Passphrase Authentication 00:01:37
  72. Memory Cards 00:00:49
  73. Smart Card 00:02:06
  74. Characteristics 00:01:39
  75. Card Types 00:01:04
  76. Home Page Hijacking 00:01:53
  77. Webpage Defacement 00:00:45
  78. Precautions 00:00:55
  79. Password Verifier 00:00:36
  80. Online Attack 00:00:52
  81. Offline Attack 00:01:35
  82. Salt 00:02:15
  83. Ping 00:01:35
  84. Ping of Death 00:02:08
  85. Session Hijacking 00:01:06
  86. Attack Steps 00:01:26
  87. Spoofing 00:05:46
  88. Man-in-the-Middle (MiM) Attack 00:05:22
  89. Mobile Code with Active Content 00:02:00
  90. Types of Mobile Code Attacks 00:03:55
  91. Attacks and Exploits 00:02:01
  92. JavaScript and Visual Basic Script 00:01:51
  93. Structure and Focus of Malicious Code Attacks 00:04:20
  94. Phases of an Attack 00:03:28
  95. Reconnaissance 00:02:34
  96. DNS Commands and Tools 00:01:13
  97. Whois Tool Screen Capture 00:01:56
  98. Tools 00:01:01
  99. SNMP Tools 00:01:46
  100. Port Scanning 00:00:55
  101. Security Probes - Nessus 00:01:02
  102. Access and Privilege Escalation 00:02:34
  103. Hackers 00:06:22
  104. Motivations 00:02:33
  105. Internal Risk 00:08:07
  106. Defense In Depth 00:01:26
  107. Application Defenses 00:03:53
  108. Operating System Defenses 00:02:59
  109. Network Defenses 00:02:38
  110. Anti-Virus Software 00:03:32
  111. Patch Management 00:00:50
  112. Issues with Patches 00:01:01
  113. Automatic Patch Management Solutions 00:02:22
  114. Vulnerability Management 00:02:30
  115. Network Monitors and Analyzers 00:00:50
  116. Content/Context Filtering 00:01:32
  117. Honeypot 00:04:35
  118. Honeynet 00:00:58
  119. Attack Prevention Techniques 00:01:03
  120. Safe Recovery Techniques and Practices 00:02:42
  121. File Backup and Restoration Plan 00:01:17
  122. Domain 7 Review 00:01:04
  123. Course Closure 00:19:05

Product information

  • Title: SSCP Video Course Domain 7 - Malicious Code
  • Author(s):
  • Release date: May 2009
  • Publisher(s): Pearson
  • ISBN: 9780789741981