Uncategorized

EC-Council CEH 312-50 v10 – Cryptography

Intro Into Cryptography In this section, we’ll discuss cryptography. Actually, one of my favorite sections of the entire course. We’ll discuss its implementations. Stream ciphers, block ciphers, the Enigma machine. We’ll discuss asymmetric encryption, hybrid encryption. We’ll compare the two as well as their strength. We’ll look at key exchanges, hashing collisions, common hash algorithms. We’ll discuss ransomware, IPsec as a age, PKI applications, quantum cryptography and Vera quipped. Beginings of Cryptography Encryption has been around a very long time, even since the Roman times. Caesar himself is actually credited…

EC-Council CEH 312-50 v10 – Cryptography Part 2

Hashing, Hashing Collisions, Common Hash Algorithms The next thing we want to discuss is a hash. And a hash is simply functions that are primarily used to generate fixed length output data that can act as a shortened reference to the original data. So it represents it’s a fingerprint of the original data, if you will. This is useful when the original data is too cumbersome to use in its entirety. One practical use is a data structure called a hash table where the data is stored associatively searching linearly…

CSA CCSK – Understand Cloud Agreements

Artifact 1 – Customer Agreement Hello friends. So welcome to this lecture on cloud service agreements. So in this lecture we’ll study that, okay? Before making a contract or before using any of the cloud service provider services, what kind of expectations we need to set, what all we want that cloud service provider should agree and then only we’ll go ahead and use the services in order to avoid any kind of future completion applications. So let’s study what is there in the cloud service agreement. So one thing…

CSA CCSK – Protecting data from Un-Authorized Access

Cloud Deployment Model and Security Concerns Hello friends. So welcome to this lecture on cloud deployment model and security concerns. So we have already gone through that there are different models like public cloud, private cloud, hybrid cloud, community cloud and each of the model they are having their different security concerns. From organization perspective, the first point that organization needs to consider is that what are the different compliance or legal requirements they are having and what those requirements say. Let’s say the firewall should be there or some…

CSA CCSK – Protecting data from Un-Authorized Access Part 2

Where to check AWS and MS Audit reports Hello friends. So welcome to this lecture on how to check AWS and Microsoft audit reports. In the last lecture we have already discussed that it is very important to check the effectiveness of the audits. That okay, what kind of audits CSP is doing and is somebody performing the regular audits? What is the frequency? And are different industry specific audit reports being available? Less vendor doing the audit as per the different regulations because different type of customers will be…

CSA CCSK – Legal and Compliance

Information Management Legal Responsibilities Hello friends. So welcome to this lecture on information management legal responsibilities. We need to understand the various legal responsibilities from a provider, from a customer and an end user perspective. So this is it. Like there will be various things we’ll be covering in this legal and compliance lectures. So one thing guys need to make sure that all the materials or the lectures are being used are on the basis of best practice in case of for legal and compliance. So do not consider…

CSA CCSK – Handling Security Incidents with CSP

CSP incident response and Security Notification Hello friends. So welcome to this lecture on CSP Incident Response and security notification. So in this lecture we’ll study that okay, when an incident happens, in case of cloud, what all would be required, because breaches do generally happen on premise or on cloud as well. So in that case, what should be the reaction? What we need to check at the CSP end that okay, whether they have any kind of incident response plan and how do they notify the customer. So…

CSA CCSK – Cloud Assets and Secure Configuration Management

Challenges in Cloud Asset Discovery Hello friends. So welcome to this lecture on challenges in cloud asset discovery. So, in the last section we discussed about cloud service agreement, service level agreement and then acceptable use policy. So this is all about while assessing the cloud service provider and checking the different service provider and looking at, okay, what are the different expectations. Now, once we have moved the data into the cloud, we have provisioned in the servers. Now, the next challenge which comes in terms of in case…

Cisco CCNP Security 300-715 SISE – Web Auth and Guest Services

Lab Demo Configure Guest Access with Guest Self Registration 2 In our last session, we just finished up Portal Behavior and Flow Settings configuration and did a quick summary of the new guest flow based on that new configuration. And now we’ll do some customization. And here we’ll combine a couple of new pieces that we haven’t seen yet, so we can add footer elements and as we can see, that will get added to our preview page. You should see this at the very bottom. All access is flawed….

Cisco CCNP Security 300-715 SISE – ISE Profiler

Introducing Cisco ISE Profiler The Cisco Identity Engine Profiler service is used to identify, locate and determine the capabilities of endpoints or identities which exist in the network. This is important in order to determine the appropriate network access allowed for particular device types. To accomplish this task, the Cisco Ice profiler function uses a sensor which relies on various probes to collect information from the endpoints. The sensor then forwards the data collected to the profile or analyzer within Cisco Ice. The analyzer uses the information and classifies the…

img