MGT514.2 Security Strategic Planning, Policy, and Leadership Strategic Roadmap Development

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Define Current State

ïVision and Mission

Lab #1: Mission Statement

SWOT Analysis

Lab #2: SWOT Exercise

Develop the Plan

ïVisioning and Innovation

Security Framework

Security Roadmap

Gap Analysis

Lab #3: Roadmap Development

Business Case Development

Deliver the Program

Security Metrics Program

Marketing and Exec Communications

MGT514.3 Security Strategic Planning, Policy, and Leadership Security Policy Development and Assessment

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Purpose of Policy

Policy Pyramid

Develop Policy

Language of Policy

Lab #1: Positive and Negative Voicing

Policy Structure

Policy and Culture

Define Requirements

Development Examples

Lab #2: Vulnerability Management Policy

Manage Policy

Approve, Socialize, and Measure

Assess Policy and Procedure

SMART Approach

Policy Assessment

Lab #3: Cloud Computing Policy

MGT514.4 Security Strategic Planning, Policy, and Leadership Leadership & Management Competencies

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Why Choose Leadership

Understanding Leadership

Lab #1: Management and Leadership

Leadership Essentials

Building Trust

Servant Leadership

Effective Communications

Active Listening

Providing Feedback

Lab #2: Performance Review

Challenging Conversations

Build Effective Teams

Learning to Delegate

Lab #3: Delegation

Coaching, Mentoring, and Sponsorship

Leading Change

MGT514.5 Security Strategic Planning, Policy, and Leadership Strategic Planning Workshop

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Background

Case Study Method

Case Studies

iPremier Case (A)

iPremier Case (B)

iPremier Case (C)

PharmaCo Case (A)

PharmaCo Case (B)

PharmaCo Case (C)

HealthHound Case

Summary

Course Summary

Resources

Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion

فهرست مطالب Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion:

Introduction

Part I A New Era for the Microsoft Firewall

Chapter 1 What’s New in TMG

Chapter 2 What Are the Differences Between TMG and UAG?

Part II Planning for TMG

Chapter 3 System Requirements

Chapter 4 Analyzing Network Requirements

Chapter 5 Choosing the Right Network Topology

Chapter 6 Migrating to TMG

Chapter 7 Choosing a TMG Client Type

Part III Implementing a TMG Deployment

Chapter 8 Installing TMG

Chapter 9 Troubleshooting TMG Setup

Chapter 10 Exploring the TMG Console

Part IV TMG as Your Firewall

Chapter 11 Configuring TMG Networks

Chapter 12 Understanding Access Rules

Chapter 13 Configuring Load-Balancing Capabilities

Chapter 14 Network Inspection System

Part V TMG as Your Caching Proxy

Chapter 15 Web Proxy Auto Discovery for TMG

Chapter 16 Caching Concepts and Configuration

Part VI TMG Client Protection

Chapter 17 Malware Inspection

Chapter 18 URL Filtering

Chapter 19 Enhancing E-Mail Protection

Chapter 20 HTTP and HTTPS Inspection

Part VII TMG Publishing Scenarios

Chapter 21 Understanding Publishing Concepts

Chapter 22 Publishing Servers

Chapter 23 Publishing Microsoft Office SharePoint Server

Chapter 24 Publishing Exchange Server

Part VIII Remote Access

Chapter 25 Understanding Remote Access

Chapter 26 Implementing Dial-in Client VPN

Chapter 27 Implementing Site-to-Site VPN

Part IX Logging and Reporting

Chapter 28 Logging

Chapter 29 Enhanced NAT

Chapter 30 Scripting TMG

Part X Troubleshooting

Chapter 31 Mastering the Art of Troubleshooting

Chapter 32 Exploring HTTP Protocol

Chapter 33 Using Network Monitor 3 for Troubleshooting TMG

Microsoft® Exchange Server 2010 UNLEASHED

فهرست مطالب کتاب Microsoft® Exchange Server 2010 UNLEASHED:

Introduction

Part I: Microsoft Exchange Server 2010 Overview

1 Exchange Server 2010 Technology Primer

2 Planning, Prototyping, Migrating, and Deploying Exchange Server 2010

Part II: Planning and Designing an Exchange Server 2010 Environment

3 Understanding Core Exchange Server 2010 Design Plans

4 Architecting an Enterprise-Level Exchange Server Environment

5 Integrating Exchange Server 2010 in a Non-Windows Environment

6 Understanding Network Services and Active Directory Domain

Controller Placement for Exchange Server 2010

Part III: Implementing Exchange Server 2010 Services

7 Installing Exchange Server 2010

8 Implementing Edge Services for an Exchange Server

2010 Environment

9 Using Windows PowerShell in an Exchange Server 2010 Environment

Part IV: Securing an Exchange Server 2010 Environment

10 Client-Level Secured Messaging

11 Server and Transport-Level Security

12 Integrating Certificate-Based Public Key Infrastructure (PKI) in

Exchange Server 2010

13 Securing Exchange Server 2010 with ISA Server

14 Understanding Exchange Server Policy Enforcement Security

Part V: Migrations and Coexistence with Exchange Server 2010

15 Migrating from Active Directory 2000/2003 to Active Directory 2008

16 Transitioning from Exchange Server 2003/2007 to Exchange

Server 2010

17 Implementing Client Access and Hub Transport Servers

Part VI: Exchange Server 2010 Administration and Management

18 Administering an Exchange Server 2010 Environment

19 Exchange Server 2010 Management and Maintenance Practices

20 Using Operations Manager to Monitor Exchange Server 2010

21 Remote Administration of Exchange Server 2010 Servers

22 Documenting an Exchange Server 2010 Environment

Part VII: Unified Communications in an Exchange Server 2010 Environment

23 Designing and Implementing Mobility in Exchange Server 2010

24 Designing and Configuring Unified Messaging in Exchange

Server 2010

25 Collaborating Within an Exchange Server Environment Using

Microsoft Office SharePoint Server 2007

26 Integrating Office Communications Server 2007 in an Exchange

Server 2010 Environment

Part VIII: Client Access to Exchange Server 2010

27 Getting the Most Out of the Microsoft Outlook Client

28 Leveraging the Capabilities of the Outlook Web App (OWA) Client

29 Using Non-Windows Systems to Access Exchange Server 2010

30 Deploying the Client for Microsoft Exchange Server 2010

Part IX: Data Protection and Disaster Recovery of Exchange Server

31 Database Availability Group Replication in Exchange Server

32 Backing Up the Exchange Server 2010 Environment

33 Recovering from a Disaster in an Exchange Server

2010 Environment

Part X: Optimizing Exchange Server 2010 Environments

34 Optimizing an Exchange Server 2010 Environment

35 Designing and Optimizing Storage in an Exchange Server

2010 Environment

MySQL Notes For Professionals

فهرست مطالب کتاب MySQL Notes For Professionals:

Getting started with MySQL

Data Types

SELECT

Backticks

NULL

Limit and Offset

Creating databases

Using Variables

Comment MySQL

INSERT

DELETE

UPDATE

ORDER BY

Group By

Error 1055: ONLY_FULL_GROUP_BY: something is not in GROUP BY clause …

Joins

JOINS: Join 3 table with the same name of id.

UNION

Arithmetic

String operations

Date and Time Operations

Handling Time Zones

Regular Expressions

VIEW

Table Creation

ALTER TABLE

Drop Table

MySQL LOCK TABLE

Error codes

Stored routines (procedures and functions)

Indexes and Keys

Full-Text search

PREPARE Statements

JSON

Extract values from JSON type

MySQL Admin

TRIGGERS

Configuration and tuning

Events

ENUM

Install Mysql container with Docker-Compose

Character Sets and Collations

MyISAM Engine

Converting from MyISAM to InnoDB

Transaction

Log files

Clustering

Partitioning

Replication

Backup using mysqldump

mysqlimport

LOAD DATA INFILE

MySQL Unions

MySQL client

Temporary Tables

Customize PS1

Dealing with sparse or missing data

Connecting with UTF-8 Using Various Programming language.

Time with subsecond precision

One to Many

Server Information

SSL Connection Setup

Create New User

Security via GRANTs

Change Password

Recover and reset the default root password for MySQL 5.7+

Recover from lost root password

MySQL Performance Tips

Performance Tuning

Reserved Words

Network Design Cookbook – 2nd Edition

فهرست مطالب کتاب Network Design Cookbook – 2nd Edition:

Start Here

Introduction

Design Process

Design PODs

Example

Frameworks

Solutions

Services

Attributes

Network Security Auditing

فهرست مطالب کتاب Network Security Auditing:

Introduction

Chapter 1 The Principles of Auditing

Chapter 2 Information Security and the Law

Chapter 3 Information Security Governance, Frameworks, and Standards

Chapter 4 Auditing Tools and Techniques

Chapter 5 Auditing Cisco Security Solutions

Chapter 6 Policy, Compliance, and Management

Chapter 7 Infrastructure Security

Chapter 8 Perimeter Intrusion Prevention

Chapter 9 Access Control

Chapter 10 Secure Remote Access

Chapter 11 Endpoint Protection

Chapter 12 Unified Communications

Index

Networking with MikroTik MTCNA Study Guide

فهرست مطالب کتاب Networking with MikroTik MTCNA Study Guide:

1 MikroTik

2 RouterOS Software

3 Defaults

4 Accessing the Router

5 Configuring RouterOS

6 Managing Users

7 Interfaces

8 Addresses

9 Routing

10 VPNs and Tunnels

11 Queues

12 Firewalls

13 NAT

14 Wireless Networks

15 Wireless Security

16 Troubleshooting Tools

17 RouterOS Monitoring

18 The Dude

NodeJS Notes For Professionals

فهرست مطالب کتاب NodeJS Notes For Professionals:

Getting started with Node.js

npm

Web Apps With Express

Filesystem I/O

Exporting and Consuming Modules

Exporting and Importing Module in node.js

How modules are loaded

Cluster Module

Readline

json

Event Emitters

Autoreload on changes

Environment

Callback to Promise

Executing files or commands with Child Processes

Exception handling

Keep a node application constantly running

Uninstalling Node.js

nvm – Node Version Manager

http

Using Streams

Deploying Node.js applications in production

Securing Node.js applications

Mongoose Library

js

File upload

io communication

Mongodb integration

Handling POST request in Node.js

Simple REST based CRUD API

Template frameworks

js Architecture & Inner Workings

Debugging Node.js application

Node server without framework

JS with ES6

Interacting with Console

Cassandra Integration

Creating API’s with Node.js

Graceful Shutdown

Using IISNode to host Node.js Web Apps in IIS

CLI

NodeJS Frameworks

grunt

Using WebSocket’s with Node.JS

metalsmith

Parsing command line arguments

Client-server communication

js Design Fundamental

Connect to Mongodb

Performance challenges

Send Web Notification

Remote Debugging in Node.JS

Database (MongoDB with Mongoose)

Good coding style

Restful API Design: Best Practices

Deliver HTML or any other sort of file

TCP Sockets

Hack

Bluebird Promises

Async/Await

Koa Framework v2

Unit testing frameworks

ECMAScript 2015 (ES6) with Node.js

Routing AJAX requests with Express.JS

Sending a file stream to client

NodeJS with Redis

Using Browserfiy to resolve ‘required’ error with browsers

JS and MongoDB.

Passport integration

Dependency Injection

NodeJS Beginner Guide

Use Cases of Node.js

js

PostgreSQL integration

MySQL integration

MySQL Connection Pool

MSSQL Intergration

js with Oracle

Synchronous vs Asynchronous programming in nodejs

js Error Management

js v6 New Features and Improvement

Eventloop

Nodejs History

js

Asynchronous programming

js code for STDIN and STDOUT without using any library

MongoDB Integration for Node.js/Express.js

Lodash

csv parser in node js

Loopback – REST Based connector

Running node.js as a service

js with CORS

Getting started with Nodes profiling

js Performance

Yarn Package Manager

OAuth 2.0

Node JS Localization

Deploying Node.js application without downtime.

js (express.js) with angular.js Sample code

NodeJs Routing

Creating a Node.js Library that Supports Both Promises and Error-First Callbacks

Project Structure

Avoid callback hell

Arduino communication with nodeJs

N-API

Multithreading

Windows authentication under node.js

Require()

Route-Controller-Service structure for ExpressJS

Push notifications

Installing Node.js

NSX-T Data Center Administration Guide (VMware NSX-T Data Center 3.0)

فهرست مطالب کتاب NSX-T Data Center Administration Guide (VMware NSX-T Data Center 3.0):

1 NSX Manager

2 Tier-0 Gateways

3 Tier-1 Gateway

4 Segments

5 Host Switches

6 Virtual Private Network (VPN)

7 Network Address Translation (NAT)

8 Load Balancing

9 Distributed Load Balancer

10 Forwarding Policies

11 IP Address Management (IPAM)

12 Networking Settings

13 Security

14 Inventory

15 Multisite and Federation

16 System Monitoring

17 Network Monitoring

18 Authentication and Authorization

19 Certificates

20 Configuring NSX-T Data Center in Manager Mode

21 Backing Up and Restoring NSX Manager

22 Operations and Management 886

23 Using NSX Cloud 965