In this lab you will learn about access control lists in Windows 7, what they do, and how to modify them. An access control list is a set of data that tells the computer’s operating system which users or groups have access privileges to specific files or objects. You can configure which users have access to specific files, folders, or hard drives. Access control lists should limit the permissions for each user so they can only perform the necessary actions to complete their jobs.
In this lab you are going to learn about anonymizers and I will show you how to use a tool called Anonymizer Universal. When you connect to the Internet, your computer is assigned an IP address. This IP address can be used to monitor your online activities and gather information about you. An anonymizer is a tool that allows you to surf the web anonymously by routing your Internet traffic through an encrypted tunnel to a server that changes your IP to a different one. This helps ensure that your activities remain confidential.
This lab will be an introduction to assembly languages. It will cover what assembly languages are, their uses, and then an example. Assembly languages are essential for many reasons such as looking for insecure code. We will use Y86 Instruction Set Architecture to look at the assembly code for a simple c program.
This lab illustrates how to use an antivirus tool called Clam Antivirus. You will be shown how to install and configure the command line and graphical interface versions of the tool. ClamAV is a free antivirus tool used to detect malicious software. It is commonly used to protect mail servers.
In this video I'm going to talk with you about dictionary password attacks and show you how to use a tool that can perform a dictionary attack called Cain and Abel. A dictionary attack is a method of breaking into a password protected system by systematically entering words from a dictionary file that are most likely to succeed as the password.
In this lab you will learn how to use a tool called hping. Hping is a TCP/IP packet assembler/analyzer tool. It can be used for a variety of purposes including port scanning, testing firewall rules, and OS fingerprinting. This lab will provide you with a basic overview of Hping, what it does, and some simple commands to use with it.
This lab will show you how to use a penetration-testing tool called Metasploit. Metasploit is a tool used by security professionals to test exploits against systems to determine if they are at risk. It also allows for the creation of custom exploits. In this lab you will see how Metasploit can be used to exploit a Windows 7 machine by sending it a malicious payload to download.
This lab illustrates some of the differences between Internet protocol version 6 (IPv6) and Internet protocol version 4 (IPv4). You will learn about why IPv6 is needed and will see some of the different IPv6 configuration options in Windows 7.
We Add New Items Constantly - Keep Checking Back with Us!
All prices are in USD