SANS 512 Indexes
SANS 512 Indexes
SANS 512 Indexes
VPN's
512.4 The Value of Information
Managing Software Security - How much security is Appropriate
Managing Software Security - Architectural Issues
Managing Software Security - Insist on Safe Defaults
Managing Software Security - Implement User Accountability
Managing Software Security - Beware of Pre-existing Software
Managing Software Security - Write Modular Code
Managing Software Security - Address Error Handing
Managing Software Security - Software Coding Errors
Managing Software Security - Specific Implementation Flaws
Managing Software Security - Code Reviews
Managing Software Security - Sound Review Process
Managing Software Security - Code Analysis Tool Options
Honeypots and Honeynets
Honeypots and Honeynets - What are Honeypots
Honeypots and Honeynets - Interation Honeypots
Honeypots and Honeynets - Why you need a Honeypot
Honeypots and Honeynets - Honeypot 172.16.1.0/24
Honeypots and Honeynets - Honeyd
Honeypots and Honeynets - Honey Tokens
Honeypots and Honeynets - LaBrea Tarpit
Honeypots and Honeynets - How LaBrea Works
Honeypots and Honeynets - Nepenthes - a Honeypot to detect/collect Malware
Honeypots and Honeynets - Detecting Honeypots
Honeypots and Honeynets - Is it Legal
Honeypots and Honeynets - Honeypot Summary
Managing Intellectual Property
Managing Intellectual Property - What is IP
Managing Intellectual Property - "Know How" makes the subtle difference
Managing Intellectual Property - Patents
Managing Intellectual Property - What is a Copyright
Managing Intellectual Property - Fair Use Copyright
Managing Intellectual Property - Copyright Battlefield
Managing Intellectual Property - Copyright Defenses
Managing Intellectual Property - Framing
Managing Intellectual Property - Organizational Policy DMCA
Managing Intellectual Property - Digital Rights Management
Managing Intellectual Property - Content Scrambling System (CSS)
Managing Intellectual Property - Sony DRM Flasco
Managing Intellectual Property - XCP/EULA
Managing Intellectual Property - Trademark or Servicemark
ManagingIntellectual Property - Brand Identity
Managing Intellectual Property - Trade Dress
Managing Intellectual Property - Why Register a Mark
Managing Intellectual Property - How do I know Something is Trademarked
Managing Intellectual Property - Attacks on Trademarks
Managing Intellectual Property - Misappropriation of Trademarks
Managing Intellectual Property - Dilution: Bluring and Tarnishing
Managing Intellectual Property - Licensing and Franchising
Managing Intellectual Property - Intangible Assets - Trade Secrets and Know How
Managing Intellectual Property - What is a Trade Secret
Managing Intellectual Property - Know How Management Proprietary
Managing Intellectual Property - Know How Business Proprietary
Managing Intellectual Property - Economic Advantage
Managing Intellectual Property - IP Valuation
512.4 The Value of Information
Managing Intellectual Property - How to assign a value
Managing Intellectual Property - Intangible Assets
Managing Intellectual Property - IP Valuation Rights
Managing Intellectual Property -IP Valuation Database
Managing Intellectual Property - Intangible Asset Attacks
Managing Intellectual Property - Protecting the Intangibles
Managing Intellectual Property - Why is it Important to Protect Intellectual Property (IP
Managing Intellectual Property - Cybersquatting
Managing Intellectual Property - Social Cost of Intellectual Property Misuse
Managing Intellectual Property - Internal IP Attack Detect
Managing Intellectual Property - Watermark Example
Managing Intellectual Property - External IP Detection
Managing Intellectual Property - 10 Keys to Managing IP
Module 20: Incident Handling
Incident Handling - Legal Aspects
Incident Handling - What is an Incident
Incident Handling - Type of Incidents
Incident Handling - Reflector Attack
Incident Handling - Amplifier Attack
Incident Handling - Synflood
Incident Handling - Examples of a Incident
Incident Handling - 6 Steps
Incident Handling - Preparation
Incident Handling - Identification
Incident Handling - Signs of an Incident
Incident Handling - Incident Analysis
Incident Handling - Containment
Incident Handling - Eradication
Incident Handling - Recovery
Incident Handling - Follow-up
Incident Handling - Key Mistakes
Incident Handling - Putting the Steps Together
Incident Handling and the Legal System
Incident Handling and the Legal System - United States Code Title 18, Section 30
Incident Handling and the Legal System - Law Relating to (Regulatory, Criminal, Civ
Incident Handling and the Legal System - Terrorism, Infrastructure Protection
Incident Handling and the Legal System - Search/Seizure
Incident Handling and the Legal System - Arrest/False Arrest
Incident Handling and the Legal System - Evidence Must Be Admissible
Incident Handling and the Legal System - Chain of Custody
Incident Handling and the Legal System - Evidence Gathering
Incident Handling and the Legal System - Types of Evidence
Incident Handling and the Legal System - Real and Direct
Incident Handling and the Legal System - Best Evidence
Incident Handling Foundations - Summary
Module 21: Information Warfare
Information Warfare - Tools
Information Warfare - Star Wars and Perception Management
Information Warfare - Malicious code/virus blitz
Information Warfare - Irhabi
Information Warfare - Madrid Bombing
Information Warfare - The White House
Information Warfare - Could Currency be Destabilized
Information Warfare - Could a City be Destroyed
512.4 The Value of Information
Information Warfare - Y2K
Information Warfare - Offshore Coding and SW Engneering 2007
Information Warfare - Terrorism and Economic Warfare
Information Warfare -Information Warfare Theory
Information Warfare - Zero-Sum Game
Information Warfare - Asymmetry Year 2001
Information Warfare - Cycle Time
Information Warfare - Indications and Warning
Information Warfare - Vista Scenario
Information Warfare - I & W Analysis Model
Information Warfare - Measures of Effectiveness
Information Warfare - Offensive Players
Information Warfare - Offensive Operations Goal
Information Warfare - Increase Value to Offense
Information Warfare - Auto Manufature Scenario
Information Warfare - Decrease Value to Defense
Information Warfare - Defensive Dominance Deterrence
Information Warfare - Management Application
Module 22: Disaster Recovery / Contingency
Contingency Planning - Business Continuity Plan
Contingency Planning - Diaster Recovery Plan
Contingency Planning - Classical BCP/DRP
Contingency Planning - Modern BCP/DRP
Contingency Planning - Basic Elements of Continuity Planning
Contingency Planning - Business Impact Analysis
Contingency Planning - BIA Questions
Contingency Planning - Recovery Time Objective
Contingency Planning - BCP/DRP Planning Process
Contingency Planning - Top BCP/DRP Planning Mistakes
Contingency Planning - Management Application Leading the Business Continuity Te
Module 23: Managing Ethics
Ethics - What Are Ethics
512.1 Managing the Plant, Network & IA
Concepts of situational awareness and the fundamental sources of information that lead to BSA
Module 1:Budget Awareness and Project Management
Budget Awareness and Project Management
Business Situational Awarness
Project Management For Security Leaders
512.2 Defense-In-Depth
Module 8: Defense-in-Depth
Defense-in-Depth
Change Management and Security
Malicious Software
Security Tool Selection
Defense-in-Depth: Summary
Encryption 101
Cryptography Fundamentals
General Types of Cryptosystems
Encryption 102
Cryptography Algorithms and Concepts
Applying Cryptography
Crptography Applications, VPNs and IPSec
PGP and PKI
Applying Cryptography Summary
Wireless Network Security
Wireless Advantages and Bluetooth
802.11
Wireless Network Security: Summary
Steganography
Steganography
Operations Security (OPSEC)
Defensive OPSEC
Offensive OPSEC
Managerial Wisdom
512.4 The Value of Information
Information Warfare
Information Warfare
Managing Ethics
Managing Ethics
IT Risk Management
Risk Management and Auditing
512.5 Management Practicum
Managing Globally
Managing IT Business and Program Growth
Security and Organizational Structure
Managing the Total Cost of Ownership
Managing Negotiations
Fraud Management
Managing Legal Liability
Managing Privacy
Managing Technical People
Management Practicum: Summary
9
13
41
60
101
135
207
225
269
318
343
9
11
29
87
173
203
229
277
292
298
344
431
9
39
67
105
143
177
181
195
230
235
267
285
341
9
19
37
123
163
183
189
241
281
9
25
51
89
117
141
157
171
211
243
512.1 Managing the Plant, Network IA
Business Situational Awareness 1-14
Business Situational Awareness - Tenet Nosce Know Thyself 1-18
Business Situational Awareness - Positional and Personal Authority 1-20
Business Situational Awareness - How to Budget Time 1-23
Business Situational Awareness - How to Budget Employee's Time 1-27
Business Situational Awareness - Budget Structure 1-30
Business Situational Awareness - IT Department Budgets 1-32
Business Situational Awareness - Situational Awareness Summary 1-36
Project Management For Security Leaders 1-40
Project Management - Initiation 1-42
Project Management - Scope 1-44
Project Management - Develop 1-46
Project Management - Scheduling 1-49
Project Management - Execution 1-50
Project Management - Monitoring, Controlling, Conflict 1-51
Project Management - Closing Out the Project 1-53
Project Management - PMO - Project Management Office 1-54
Module 2: The Network Infrastructure 1-59
Network Infrastructure 1-60
Network Infrastructure - OSI vs. TCP/IP 1-62
Network Infrastructure -OSI Model 1-62
Network Infrastructure -Network Components 1-63
Network Infrastructure -Hubs 1-63
Network Infrastructure -Bridges/Switches 1-64
Network Infrastructure -Attacks on Layer 2 Switches 1-64
Network Infrastructure -Spanning Tree Protocol 1-65
Network Infrastructure -Dynamic Host Configuration Protocol 1-65
Network Infrastructure -Router 1-67
Network Infrastructure -Network Attached Storage (NAS) 1-67
Network Infrastructure -VLANs 1-69
Network Infrastructure -Segmenting Your Internal Network 1-71
Network Infrastructure -Management Application - Network Partitions 1-73
Network Infrastructure -Physical and Logical Topologies 1-75
Network Infrastructure -Bus Topology 1-75
Network Infrastructure -Ring Topology 1-76
Network Infrastructure -Star Topology 1-76
Network Infrastructure -Ethernet 1-80
Network Infrastructure -Token Ring and FDDI 1-82
Network Infrastructure -Asynchronous Transfer Mode (ATM) 1-85
Network Infrastructure -Permanent Virtual Circuit (PVC) 1-86
Network Infrastructure -Switched Virtual Circuit (SVC) 1-86
Network Infrastructure -WAN Access Technologies 1-87
Network Infrastructure -VoIP Overview for Managers 1-88
Network Infrastructure -VoIP Components& Protocols 1-91
Network Infrastructure -VoIP Threats & Security 1-93
Network Infrastructure -Management Application - Questions to ask about Networks 1-96
Module 3: Computer and Network Addressing 1-101
Computing & Network Addressing - Frame and Packet Address (MAC=48 bits) 1-104
Computing & Network Addressing - MACs and OUIs 1-105
Computing & Network Addressing - The IP Address 1-105
Computing & Network Addressing - Rogue Wireless Access Points 1-107
Computing & Network Addressing - ARP Attacks 1-107
Computing & Network Addressing - Classles Internet Domain Routing - CIDR 1-109
Computing & Network Addressing - Determine the Network and the Host 1-111
512.1 Managing the Plant, Network IA
Computing & Network Addressing - Broadcast Address 1-114
Computing & Network Addressing - Private Address 1-116
Computing & Network Addressing - Domain Name System (DNS) 1-118
Computing & Network Addressing - Static Host Tables 1-119
Computing & Network Addressing - DNS 1-121
Computing & Network Addressing - DNS - Queries 1-123
Computing & Network Addressing - DNS - Attacks 1-126
Computing & Network Addressing - DNS - Cache Poisoning 1-127
Computing & Network Addressing - DNS - Domain Hijacking 1-128
Computing & Network Addressing - DNS - Protecting 1-130
Module 4: IP Terminology and Concepts 1-135
IP Terminology and Concepts - Network Protocol - What is 1-137
IP Terminology and Concepts - TCP/IP Packets and Frames 1-139
IP Terminology and Concepts - Preamble 1-140
IP Terminology and Concepts - IP - Internet Protocol 1-142
IP Terminology and Concepts - How to Determine the Protocol 1-143
IP Terminology and Concepts - IP - Header Identified Protocol 1-144
IP Terminology and Concepts - IP Header Identifies Protocol 1-146
IP Terminology and Concepts - IP Header Key Fields 1-148
IP Terminology and Concepts - Protocol - 8 1-148
IP Terminology and Concepts - Time-to-Live TTL 1-149
IP Terminology and Concepts - Fragment Offset - 16 bits 1-149
IP Terminology and Concepts - UDP & TCP Ports 1-152
IP Terminology and Concepts - UDP Header 1-156
IP Terminology and Concepts - TCP - The Transmission Control Protocol 1-161
IP Terminology and Concepts - TCP Header 1-162
IP Terminology and Concepts - TCP Code Bits 1-164
IP Terminology and Concepts - Establishing a TCP Connection 1-166
IP Terminology and Concepts - TCP Session Open and Close 1-168
IP Terminology and Concepts - TCP Error Checking 1-169
IP Terminology and Concepts - TCP Timeouts 1-170
IP Terminology and Concepts - TCP And UDP Differences 1-171
IP Terminology and Concepts - ICMP 1-172
IP Terminology and Concepts - PING 1-174
IP Terminology and Concepts - UNIX and Windows Traceroute 1-176
IP Terminology and Concepts - Traceroute 1-178
IP Terminology and Concepts - Application Layer Security Protocol 1-179
IP Terminology and Concepts - Sniffer - What is 1-182
IP Terminology and Concepts - Reading Packets 1-185
IP Terminology and Concepts - Field OFFSET offset 0 1-185
IP Terminology and Concepts - What are the first 3 fields in a packet 1-188
IP Terminology and Concepts - What are the next 3 fields in a packet 1-190
IP Terminology and Concepts - Decoding an IP Header 1-192
IP Terminology and Concepts - What protocol is this packet and where does the protocol layer start 1-194
IP Terminology and Concepts - Decoding a TCP Header 1-196
IP Terminology and Concepts - TCP/IP & TCP Dump pocket reference guide 1-198
IP Terminology and Concepts - Reading Packets Summary 1-199
Module 5: Offensive Vulnerability Scanning 1-207
Offensive Vulnerability Scanning - 5 VM Management Axioms 1-208
Offensive Vulnerability Scanning - Primary Threat Concerns 1-209
Offensive Vulnerability Scanning - Threat Concerns 1-212
Offensive Vulnerability Scanning - Hping v3.0 - Spoofing Port Scanner 1-214
Offensive Vulnerability Scanning - p0f - Passive OS Detection 1-216
Offensive Vulnerability Scanning - Phone Scanning 1-218
512.1 Managing the Plant, Network IA
Offensive Vulnerability Scanning - PhoneSweep 1-219
Offensive Vulnerability Scanning - TCP/IP Based Scanner Techniques 1-221
Offensive Vulnerability Scanning - Basic port/ip scanners 1-223
Offensive Vulnerability Scanning - Stealth/spoofing scanners 1-223
Offensive Vulnerability Scanning - OS Fingerprinting 1-223
Advance Reconnaissance and Vulnerability Scanning 1-225
Advance Reconnaissance and Vulnerability Scanning - Social Engineering 1-227
Advance Reconnaissance and Vulnerability Scanning - Social Engineering - Defense 1-229
Advance Reconnaissance and Vulnerability Scanning - Fire on Your Posisition 1-230
Advance Reconnaissance and Vulnerability Scanning - P2P - Firewall Subversion 1-231
Advance Reconnaissance and Vulnerability Scanning - KaZaA Firewall Subversion 1-231
Advance Reconnaissance and Vulnerability Scanning - Instant Messengers 1-234
Advance Reconnaissance and Vulnerability Scanning - Gathering Data 1-237
Advance Reconnaissance and Vulnerability Scanning - P2P and IM Controls 1-238
Advance Reconnaissance and Vulnerability Scanning - Vulnerablility Scanners 1-240
Advance Reconnaissance and Vulnerability Scanning - How to do a Vulnerability Scan 1-242
Advance Reconnaissance and Vulnerability Scanning - Nmap and Nessus, the outside view 1-248
Advance Reconnaissance and Vulnerability Scanning - Metasploit 1-251
Advance Reconnaissance and Vulnerability Scanning - Pen Test Techniques 1-253
Advance Reconnaissance and Vulnerability Scanning - Management Application - Scanning Tools 1-255
Advance Reconnaissance and Vulnerability Scanning - Vulnerablility Assessment 1-257
Advance Reconnaissance and Vulnerability Scanning - Operating System Analysis - Inside View 1-258
Advance Reconnaissance and Vulnerability Scanning - CISecurity.org 1-261
Summary of Module 5 1-263
Module 6: Managing Safety, Physical Security and the Procurement 1-269
Management Application Safety - Safety and the Computer Security Manager 1-270
Management Application Safety -Hurricane Katrina Illustrates 1-274
Management Application Safety -Smoke and Fire 1-275
Management Application Safety -Leadership and Evacuation 1-279
Management Application Safety -Richard Rescorla - Case Study 1-279
Management Application Safety -Why Evacuation Matters 1-280
Management Application Safety -Building Evacuation and Exit Plan (BEEP) 1-281
Management Application Safety -Safety Walkthrough 1-286
Management Application Safety -Physical Security - Managing 1-288
Management Application Safety -Physical Security - Locks 1-294
Management Application Safety -Physical Security - Intruder Detection 1-298
Management Application Safety -Physical Security - Resistance to Explosive 1-303
Management Application Safety -Physical Security - Power and Cooling 1-305
Management Application Safety -Physical Security - Current 1-306
Management Application Safety -Physical Security - Power to the Datacenter 1-308
Management Application Safety -Physical Security - Cooling Basics 1-310
Management Application Safety -Power and Cooling Summary 1-314
Management Application Safety -Safety and PHYSSEC Summary 1-315
Managing the Procurement Process 1-318
Managing the Procurement Process - Procurement - SWOT 1-319
Managing the Procurement Process -Procurement - Vendor and Product Selection 1-320
Managing the Procurement Process -Procurement - Price and Value 1-325
Managing the Procurement Process -Procurement - The Secret Life of a Salesperson 1-326
Managing the Procurement Process -Procurement - Analytical Hierarchy Process 1-331
Managing the Procurement Process -Procurement - Analytical Hieracy Process Summary 1-337
Managing the Procurement Process -Procurement - Vendor Selection Summary 1-339
Managing the Procurement Process -Procurement - RFP 1-340