Monday, December 30, 2013

Use Rekeywiz to Encrypt files on windows 7

CREATE A EFS CERTIFICATE AND BACKUP

STEP1 :goto RUN type:rekeywiz


STEP 2:you will see the EFS wizard ,click Next

STEP 3:select or create a file encryption certificate , select create a new certificate

STEP 4:either you will create a self signed certificate or you a 3rd party cetificate
in this demonstration i will create a self signed certificate.


STEP 5:click next to see the progress bar of creating a self signed certificate.

STEP 6:Backup the certificate and Key, you have to select the path for backup c: or d: drive , if you have and external drive you select it for backup .type the password and and confirm password .click next


STEP 7:select the drives for EFS certificate or choose later.


STEP 8:click next to update the EFS

STEP 9:your EFS files have been updated and you will see certificate.

STEP 10:click close to close the EFS wizard.



How to use Resource Monitor on windows 7

GO TO RUN (WINDOW+R)

TYPE: RESMON

YOU WILL SEE RESOURCE MONITOR , SO YOU CAN SEE EVERYTHING IN REAL TIME RESOURCES USED BY THE SYSTEM 





DNS Server log on windows server 2008 R2

DNS Server log file creation at 01-12-2013 11:46:58

Message logging key (for packets - other items use a subset of these fields):
Field #  Information         Values
-------  -----------         ------
  1     Date
  2     Time
  3     Thread ID
  4     Context
  5     Internal packet identifier
  6     UDP/TCP indicator
  7     Send/Receive indicator
  8     Remote IP
  9     Xid (hex)
 10     Query/Response      R = Response
                            blank = Query
 11     Opcode              Q = Standard Query
                            N = Notify
                            U = Update
                            ? = Unknown
 12     [ Flags (hex)
 13     Flags (char codes)  A = Authoritative Answer
                            T = Truncated Response
                            D = Recursion Desired
                            R = Recursion Available
 14     ResponseCode ]
 15     Question Type
 16     Question Name

01-12-2013 11:47:03 059C EVENT   The DNS server has finished the background loading of zones. All zones are now available for DNS updates and zone transfers, as allowed by their individual zone configuration.
01-12-2013 11:47:04 059C EVENT   The DNS server has started.
01-12-2013 11:47:05 84C Note: got GQCS failure on a dead socket context status=995, socket=340, pcon=0000000000A07370, state=-1, IP=0.0.0.0
01-12-2013 11:47:05 850 Note: got GQCS failure on a dead socket context status=995, socket=340, pcon=0000000000A07370, state=-1, IP=0.0.0.0
01-12-2013 11:47:05 84C Note: got GQCS failure on a dead socket context status=995, socket=344, pcon=0000000000A07490, state=-1, IP=::
01-12-2013 11:47:05 850 Note: got GQCS failure on a dead socket context status=995, socket=344, pcon=0000000000A07490, state=-1, IP=::
01-12-2013 11:47:05 850 Note: got GQCS failure on a dead socket context status=995, socket=344, pcon=0000000000A24080, state=-1, IP=0.0.0.0
01-12-2013 11:47:05 850 Note: got GQCS failure on a dead socket context status=995, socket=592, pcon=0000000000A241A0, state=-1, IP=::
01-12-2013 11:47:05 850 Note: got GQCS failure on a dead socket context status=995, socket=592, pcon=0000000000A241A0, state=-1, IP=::
01-12-2013 11:47:05 84C Note: got GQCS failure on a dead socket context status=995, socket=344, pcon=0000000000A24080, state=-1, IP=0.0.0.0
01-12-2013 11:52:05 0848 EVENT   The zone 2.168.192.in-addr.arpa is configured to accept updates but the A record for the primary server in the zone's SOA record is not available on this DNS server. This may indicate a configuration problem. If the address of the primary server for the zone cannot  be resolved DNS clients will be unable to locate a server to accept updates for this zone. This will cause DNS clients to be unable to perform DNS updates.
01-12-2013 11:52:05 0848 EVENT   The zone msn.com is configured to accept updates but the A record for the primary server in the zone's SOA record is not available on this DNS server. This may indicate a configuration problem. If the address of the primary server for the zone cannot  be resolved DNS clients will be unable to locate a server to accept updates for this zone. This will cause DNS clients to be unable to perform DNS updates.

Thursday, December 19, 2013

Security + Syllabus new 2013

 1 Measuring and Weighing Risk
 2 Infrastructure and Connectivity
 3 Protecting Networks 81
 4 Threats and Vulnerabilities
 5 Access Control and Identity Management
 6 Educating and Protecting the User
 7 Operating System and Application Security
 8 Cryptography Basics
 9 Cryptography Implementation
 10 Physical and Hardware-Based Security
 11 Security and Vulnerability in the Network
 12 Wireless Networking Security
 13 Disaster Recovery and Incident Response
 14 Security-Related Policies and Procedures
 15 Security Administration

A+ Syllabus New 2013

A+ hardware  
Domain% of examination
Installation, configuration and upgrading35%
Diagnosing and troubleshooting21%
Preventive maintenance5%
Motherboard/processors/memory11%
Printers9%
Basic networking19%
Total100%


A+ OS technologies
Domain% of examination
OS fundamentals28%
Installation, configuration and upgrading31%
Diagnosing and troubleshooting25%
Networks16%
Total100%
Topics on A+ hardware

  • Installation, configuration and upgrading -- 35%
    • Identify physical parts
    • Motherboard
    • Firmware
    • Power supply
    • Storage devices
    • Memory (physical vs. cache)
    • Portable storage devices
    • Network cards and network cables
    • Printers
    • Identify IRQ, I/O and DMA settings
    • Legacy devices
    • Identify port types
    • Serial
    • Parallel
    • Infrared
    • Wireless
    • SCSI
    • RAID (0,1,5)
  • Diagnosing and troubleshooting -- 21%
    • Hardware vs. software problems
    • Troubleshooting techniques
    • Tools of the trade
    • Cooling systems
    • Adapters
    • Portable systems
  • Preventive maintenance -- 5%
    • Cleaning compounds
    • Non-static vacuums
    • Ventilation
    • Hard drive maintenance (defrag)
    • UPS (uninterruptible power supply)
  • Motherboard/processors/memory -- 11%

    • Popular CPU chips
    • Voltage
    • AT/ATX power supply
    • Speeds
    • Cache (LI, LII, LIII)
    • Memory types (FPM, EDO, RAMBUS, SIMM, DIMM)
    • USB, AMR, CNR
    • CMOS settings
    • Plug-and-play BIOS
  • Printers -- 9%

    • Printer types (laser, ink jet, dot matrix)
    • Interface types (serial, parallel, USB, SCSI, IEEE1394)
    • Local vs. network printing
    • Troubleshooting
    • Error codes
  • Basic networking --19%

    • Cable types (coaxial, UTP, STP, fiber)
    • Connector types (BNC,RG45)
    • Concepts
    • Installing network cards
    • Addressing
    • Bandwidth
    • Protocols
    • Topologies (LAN, WAN, DSL, CABLE)
    • Topology wiring
Topics on A+ operating systems

Sunday, August 11, 2013

640-554 CCNA Security syllabus

Exam Topics (CCNA Security) 640-554

Common Security Threats

    Describe common security threats

Security and Cisco Routers

    Implement security on Cisco routers

    Describe securing the control, data, and management plane

    Describe Cisco Security Manager

    Describe IPv4 to IPv6 transition


AAA on Cisco Devices

    Implement AAA (authentication, authorization, and accounting)

    Describe TACACS+

    Describe RADIUS

    Describe AAA

    Verify AAA functionality


IOS ACLs

    Describe standard, extended, and named IP IOS access control lists (ACLs) to filter packets

    Describe considerations when building ACLs

    Implement IP ACLs to mitigate threats in a network


Secure Network Management and Reporting

    Describe secure network management

    Implement secure network management


Common Layer 2 Attacks

    Describe Layer 2 security using Cisco switches

    Describe VLAN security

    Implement VLANs and trunking

    Implement spanning tree


Tuesday, July 30, 2013

Exam 70-413 Designing and Implementing a Server Infrastructure (MCSE SYLLABUS NEW 2013)



Plan and deploy a server infrastructure (20–25%)

        Design an automated server installation strategy

            Design considerations including images and bare metal/virtual deployment; design a server implementation using Windows Assessment and Deployment Kit (ADK); design a virtual server deployment

        Plan and implement a server deployment infrastructure

            Configure multicast deployment; configure multi-site topology and distribution points; configure a multi-server topology; configure autonomous and replica Windows Deployment Services (WDS) servers

        Plan and implement server upgrade and migration

            Plan for role migration; migrate server roles; migrate servers across domains and forests; design a server consolidation strategy; plan for capacity and resource optimization

        Plan and deploy Virtual Machine Manager services

            Design Virtual Machine Manager service templates; define operating system profiles; configure hardware and capability profiles; manage services; configure image and template libraries; manage logical networks

        Plan and implement file and storage services

            Planning considerations include iSCSI SANs, Fibre Channel SANs, Virtual Fibre Channel, storage spaces, storage pools, and data de-duplication; configure the iSCSI Target server; configure the Internet Storage Name server (iSNS); configure Network File System (NFS); install Device Specific Modules (DSMs)

Exam 70-412 Configuring Advanced Windows Server 2012 Services (MCSE SYLLABUS NEW 2013)



Configure and manage high availability (15–20%)

        Configure Network Load Balancing (NLB)
            Install NLB nodes; configure NLB prerequisites; configure affinity; configure port rules; configure cluster operation mode; upgrade an NLB cluster
        Configure failover clustering
            Configure Quorum; configure cluster networking; restore single node or cluster configuration; configure cluster storage; implement Cluster Aware Updating; upgrade a cluster
        Manage failover clustering roles
            Configure role-specific settings including continuously available shares; configure VM monitoring; configure failover and preference settings

        Manage Virtual Machine (VM) movement
            Perform Live Migration; perform quick migration; perform storage migration; import, export, and copy VMs; migrate from other platforms (P2V and V2V)

Configure file and storage solutions (15–20%)
       Configure advanced file services
            Configure NFS data store; configure BranchCache; configure File Classification Infrastructure (FCI) using File Server Resource Manager (FSRM); configure file access auditing
        Implement Dynamic Access Control (DAC)
            Configure user and device claim types; implement policy changes and staging; perform access-denied remediation; configure file classification
        Configure and optimize storage
            Configure iSCSI Target and Initiator; configure Internet Storage Name server (iSNS); implement thin provisioning and trim; manage server free space using Features on Demand
Implement business continuity and disaster recovery (15–20%)
        Configure and manage backups
            Configure Windows Server backups; configure Windows Online backups; configure role-specific backups; manage VSS settings using VSSAdmin; create System Restore snapshots
        Recover servers
            Restore from backups; perform a Bare Metal Restore (BMR); recover servers using Windows Recovery Environment (Win RE) and safe mode; apply System Restore snapshots; configure the Boot Configuration Data (BCD) store
        Configure site-level fault tolerance
            Configure Hyper-V Replica including Hyper-V Replica Broker and VMs; configure multi-site clustering including network settings, Quorum, and failover settings

Exam 70-411 Administering Windows Server 2012(MCSE SYLLABUS NEW 2013)



Deploy, manage, and maintain servers (15–20%)
        Deploy and manage server images
            Install the Windows Deployment Services (WDS) role; configure and manage boot, install, and discover images; update images with patches, hotfixes, and drivers; install features for offline images
        Implement patch management
            Install and configure the Windows Server Update Services (WSUS) role; configure group policies for updates; configure client-side targeting; configure WSUS synchronization; configure WSUS groups
        Monitor servers
            Configure Data Collector Sets (DCS); configure alerts; monitor real-time performance; monitor virtual machines (VMs); monitor events; configure event subscriptions; configure network monitoring
Configure file and print services (15–20%)

        Configure Distributed File System (DFS)
            Install and configure DFS namespaces; configure DFS Replication Targets; configure Replication Scheduling; configure Remote Differential Compression settings; configure staging; configure fault tolerance
        Configure File Server Resource Manager (FSRM)
            Install the FSRM role; configure quotas; configure file screens; configure reports
        Configure file and disk encryption
            Configure Bitlocker encryption; configure the Network Unlock feature; configure Bitlocker policies; configure the EFS recovery agent; manage EFS and Bitlocker certificates including backup and restore
        Configure advanced audit policies
            Implement auditing using Group Policy and AuditPol.exe; create expression-based audit policies; create removable device audit policies

Configure network services and access (15–20%)
        Configure DNS zones
            Configure primary and secondary zones; configure stub zones; configure conditional forwards; configure zone and conditional forward storage in Active Directory; configure zone delegation; configure zone transfer settings; configure notify settings
        Configure DNS records
            Create and configure DNS Resource Records (RR) including A, AAAA, PTR, SOA, NS, SRV, CNAME, and MX records; configure zone scavenging; configure record options including Time To Live (TTL) and weight; configure round robin; configure secure dynamic updates
        Configure VPN and routing
            Install and configure the Remote Access role; implement Network Address Translation (NAT); configure VPN settings; configure remote dial-in settings for users; configure routing
        Configure DirectAccess
            Implement server requirements; implement client configuration; configure DNS for Direct Access; configure certificates for Direct Access
Configure a Network Policy Server infrastructure (10–15%)

        Configure Network Policy Server (NPS)
            Configure multiple RADIUS server infrastructures; configure RADIUS clients; manage RADIUS templates; configure RADIUS accounting; configure certificates
        Configure NPS policies
            Configure connection request policies; configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing); manage NPS templates; import and export NPS policies
        Configure Network Access Protection (NAP)
            Configure System Health Validators (SHVs); configure health policies; configure NAP enforcement using DHCP and VPN; configure isolation and remediation of non-compliant computers using DHCP and VPN; configure NAP client settings


Configure and manage Active Directory (15–20%)
        Configure service authentication
            Create and configure Service Accounts; create and configure Group Managed Service Accounts; create and configure Managed Service Accounts; configure Kerberos delegation; manage Service Principal Names (SPNs)
        Configure Domain Controllers
            Configure Universal Group Membership Caching (UGMC); transfer and seize operations masters; install and configure a read-only domain controller (RODC); configure Domain Controller cloning
        Maintain Active Directory
            Back up Active Directory and SYSVOL; manage Active Directory offline; optimize an Active Directory database; clean up metadata; configure Active Directory snapshots; perform object- and container-level recovery; perform Active Directory restore
        Configure account policies
            Configure domain user password policy; configure and apply Password Settings Objects (PSOs); delegate password settings management; configure local user password policy; configure account lockout settings
Configure and manage Group Policy (15–20%)
        Configure Group Policy processing
            Configure processing order and precedence; configure blocking of inheritance; configure enforced policies; configure security filtering and WMI filtering; configure loopback processing; configure and manage slow-link processing; configure client-side extension (CSE) behavior
        Configure Group Policy settings
            Configure settings including software installation, folder redirection, scripts, and administrative template settings; import security templates; import custom administrative template file; convert administrative templates using ADMX Migrator; configure property filters for administrative templates
        Manage Group Policy objects (GPOs)
            Back up, import, copy, and restore GPOs; create and configure Migration Table; reset default GPOs; delegate Group Policy management
        Configure Group Policy preferences
            Configure Group Policy Preferences (GPP) settings including printers, network drive mappings, power options, custom registry settings, Control Panel settings, Internet Explorer settings, file and folder deployment, and shortcut deployment; configure item-level targeting

Exam 70-410 Installing and Configuring Windows Server 2012 (SYLLABUS NEW 2013)



Install and configure servers (15–20%)

        Install servers
            Plan for a server installation; plan for server roles; plan for a server upgrade; install Server Core; optimize resource utilization by using Features on Demand; migrate roles from previous versions of Windows Server
        Configure servers
            Configure Server Core; delegate administration; add and remove features in offline images; deploy roles on remote servers; convert Server Core to/from full GUI; configure services; configure NIC teaming
        Configure local storage
            Design storage spaces; configure basic and dynamic disks; configure MBR and GPT disks; manage volumes; create and mount virtual hard disks (VHDs); configure storage pools and disk pools

Exam 70-414 Implementing an Advanced Server Infrastructure(MCSE SYLLABUS NEW 2013)



·       

·         Manage and maintain a server infrastructure (25–30%)

·         Design an administrative model

·         Design considerations including user rights, built-in groups, and end-user self-service portal; design a delegation of administration structure for Microsoft System Center 2012

·         Design a monitoring strategy

·         Design considerations including monitoring servers using Audit Collection Services (ACS), performance monitoring, centralized monitoring, and centralized reporting; implement and optimize System Center 2012 – Operations Manager management packs; plan for monitoring Active Directory

·         Design an updates infrastructure

·         Design considerations including Windows Server Update Services (WSUS), System Center 2012 – Configuration Manager, and cluster-aware updating; design and configure Virtual Machine Manager for software update management; update VDI desktop images

·         Implement automated remediation

Saturday, April 13, 2013

CCNA SYLLABUS NEW 2013

Exam Description
The 640-802 Cisco Certified Network Associate (CCNA) is the composite exam associated with the Cisco Certified Network Associate certification. Candidates can prepare for this exam by taking the Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 and the Interconnecting Cisco Networking Devices Part 2 (ICND2) v1.0 courses. This exam tests a candidate's knowledge of installation, operation, and troubleshooting a small network, including connecting to a WAN and implementing network security.
Exam Topics
The following topics are general guidelines for the content likely to be included on the Remote Access exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Describe how a network works

  • Describe the purpose and functions of various network devices
  • Select the components required to meet a network specification
  • Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network
  • Describe common networked applications including web applications
  • Describe the purpose and basic operation of the protocols in the OSI and TCP models
  • Describe the impact of applications (Voice Over IP and Video Over IP) on a network
  • Interpret network diagrams
  • Determine the path between two hosts across a network
  • Describe the components required for network and Internet communications
  • Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach
  • Differentiate between LAN/WAN operation and features

Configure, verify and troubleshoot a switch with VLANs and interswitch communications

  • Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
  • Explain the technology and media access control method for Ethernet networks
  • Explain network segmentation and basic traffic management concepts
  • Explain basic switching concepts and the operation of Cisco switches
  • Perform and verify initial switch configuration tasks including remote access management
  • Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands
  • Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures
  • Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
  • Describe how VLANs create logically separate networks and the need for routing between them
  • Configure, verify, and troubleshoot VLANs
  • Configure, verify, and troubleshoot trunking on Cisco switches
  • Configure, verify, and troubleshoot interVLAN routing
  • Configure, verify, and troubleshoot VTP
  • Configure, verify, and troubleshoot RSTP operation
  • Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.
  • Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)

ITIL Foundation 2011 syllabus

The IT Service Lifecycle
• service strategy
• service design
• service transition
• service operation
• continual service improvement.

Overview of all Service Management
• processes and functions
• concepts and definitions
• key principles and models
• roles and activities.

Tuesday, February 19, 2013

CEH Syllabus V7 AND V8



Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: System Hacking

Module 06: Trojans and Backdoors

Module 07: Viruses and Worms

Module 08: Sniffers

Module 09: Social Engineering

Module 10: Denial of Service

Module 11: Session Hijacking

Module 12: Hacking Webservers

Module 13: Hacking Web Applications

Module 14: SQL Injection

Module 15: Hacking Wireless Networks

Module 16: Evading IDS, Firewalls, and Honeypots

Module 17: Buffer Overflow

Module 18: Cryptography

Module 19: Penetration Testing

Tuesday, January 15, 2013

CERTIFIED CYBER SECURITY EXPERT AND CEH SYLLABUS

Session 1: Cyber Ethics, Hacking introduction.
Session 2: Basic Networking Terminologies
Session 3: Information Gathering and foot-printing
Session 4: Scanning and Enumeration
Session 5: Trojans and Backdoors
Session 6: Virus and Worms
Session 7: Sniffers and keyloggers
Session 8: Phishing and its preventions
Session 9: System Hacking and Security
Session 10: Social Engineering and Honey pots
Session 11: Bots, Botnets and DoS
Session 12: Cryptography
Session 13: Google Hacking Databases
Session 14: SQL injection 1
Session 15: SQL injection 2
Session 16: Proxy servers and VPNs
Session 17: Cross site Scripting ( XSS )
Session 18: Local File Inclusion / Remote File Inclusion ( LFI / RFI )
Session 19: Secure Coding practises
Session 20: Information Disclosure vulnerabilities
Session 21: Session Hijacking ( Side jacking )
Session 22: Hacking web servers
Session 23: Vulnerability Assessment and Penetration Testing ( VAPT )
Session 24: Assembly language basics
Session 25: Buffer Overflow attacks 1
Session 26: Buffer Overflow attacks 2
Session 27: Exploit writing
Session 28: Metasploit framework
Session 29: Reverse Engineering
Session 30: Firewalls, IDS and Evading IDS
Session 31: Wireless hacking
Session 32: Mobile and VOIP hacking
Session 33: Bluetooth hacking
Session 34: Cyber crime investigation and IT ACT 2000
Session 35: Case studies of various cases solved by Techdefence
Session 36: Cyber Forensics
Session 37: Enterprise Information Security Management
Session 38: Project work 1
Session 39: Project work 2
Session 40: Online Examination