sans 512 indexes

32
Module 1: Situational Awareness 1-13 Business Situational Awareness 1-14 Business Situational Awareness - Tenet Nosce Know Thyself 1-18 Business Situational Awareness - Positional and Personal Aut 1-20 Business Situational Awareness - How to Budget Time 1-23 Business Situational Awareness - How to Budget Employee's Ti 1-27 Business Situational Awareness - Budget Structure 1-30 Business Situational Awareness - IT Department Budgets 1-32 Business Situational Awareness - Situational Awareness Summa 1-36 Project Management For Security Leaders 1-40 Project Management - Initiation 1-42 Project Management - Scope 1-44 Project Management - Develop 1-46 Project Management - Scheduling 1-49 Project Management - Execution 1-50 Project Management - Monitoring, Controlling, Conflict 1-51 Project Management - Closing Out the Project 1-53 Project Management - PMO - Project Management Office 1-54 Module 2: The Network Infrastructure 1-59 Network Infrastructure 1-60 Network Infrastructure - OSI vs. TCP/IP 1-62 Network Infrastructure -OSI Model 1-62 Network Infrastructure -Network Components 1-63 Network Infrastructure -Hubs 1-63 Network Infrastructure -Bridges/Switches 1-64 Network Infrastructure -Attacks on Layer 2 Switches 1-64 Network Infrastructure -Spanning Tree Protocol 1-65 Network Infrastructure -Dynamic Host Configuration Protocol 1-65 Network Infrastructure -Router 1-67 Network Infrastructure -Network Attached Storage (NAS) 1-67 Network Infrastructure -VLANs 1-69 Network Infrastructure -Segmenting Your Internal Network 1-71 Network Infrastructure -Management Application - Network Par 1-73 Network Infrastructure -Physical and Logical Topologies 1-75 Network Infrastructure -Bus Topology 1-75 Network Infrastructure -Ring Topology 1-76 Network Infrastructure -Star Topology 1-76 Network Infrastructure -Ethernet 1-80 Network Infrastructure -Token Ring and FDDI 1-82 Network Infrastructure -Asynchronous Transfer Mode (ATM) 1-85 Network Infrastructure -Permanent Virtual Circuit (PVC) 1-86 Network Infrastructure -Switched Virtual Circuit (SVC) 1-86 Network Infrastructure -WAN Access Technologies 1-87 Network Infrastructure -VoIP Overview for Managers 1-88 Network Infrastructure -VoIP Components& Protocols 1-91 Network Infrastructure -VoIP Threats & Security 1-93 Network Infrastructure -Management Application - Questions t 1-96 Module 3: Computer and Network Addressing 1-101 Computing & Network Addressing - Frame and Packet Address (M 1-104 Computing & Network Addressing - MACs and OUIs 1-105

Upload: sisi-x-z

Post on 23-Oct-2014

173 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: SANS 512 Indexes

Module 1: Situational Awareness 1-13Business Situational Awareness 1-14Business Situational Awareness - Tenet Nosce Know Thyself 1-18Business Situational Awareness - Positional and Personal Authority 1-20Business Situational Awareness - How to Budget Time 1-23Business Situational Awareness - How to Budget Employee's Time 1-27Business Situational Awareness - Budget Structure 1-30Business Situational Awareness - IT Department Budgets 1-32Business Situational Awareness - Situational Awareness Summary 1-36Project Management For Security Leaders 1-40Project Management - Initiation 1-42Project Management - Scope 1-44Project Management - Develop 1-46Project Management - Scheduling 1-49Project Management - Execution 1-50Project Management - Monitoring, Controlling, Conflict 1-51Project Management - Closing Out the Project 1-53Project Management - PMO - Project Management Office 1-54Module 2: The Network Infrastructure 1-59Network Infrastructure 1-60Network Infrastructure - OSI vs. TCP/IP 1-62Network Infrastructure -OSI Model 1-62Network Infrastructure -Network Components 1-63Network Infrastructure -Hubs 1-63Network Infrastructure -Bridges/Switches 1-64Network Infrastructure -Attacks on Layer 2 Switches 1-64Network Infrastructure -Spanning Tree Protocol 1-65Network Infrastructure -Dynamic Host Configuration Protocol 1-65Network Infrastructure -Router 1-67Network Infrastructure -Network Attached Storage (NAS) 1-67Network Infrastructure -VLANs 1-69Network Infrastructure -Segmenting Your Internal Network 1-71Network Infrastructure -Management Application - Network Partitions 1-73Network Infrastructure -Physical and Logical Topologies 1-75Network Infrastructure -Bus Topology 1-75Network Infrastructure -Ring Topology 1-76Network Infrastructure -Star Topology 1-76Network Infrastructure -Ethernet 1-80Network Infrastructure -Token Ring and FDDI 1-82Network Infrastructure -Asynchronous Transfer Mode (ATM) 1-85Network Infrastructure -Permanent Virtual Circuit (PVC) 1-86Network Infrastructure -Switched Virtual Circuit (SVC) 1-86Network Infrastructure -WAN Access Technologies 1-87Network Infrastructure -VoIP Overview for Managers 1-88Network Infrastructure -VoIP Components& Protocols 1-91Network Infrastructure -VoIP Threats & Security 1-93Network Infrastructure -Management Application - Questions to ask about 1-96Module 3: Computer and Network Addressing 1-101Computing & Network Addressing - Frame and Packet Address (MAC=48 bi 1-104Computing & Network Addressing - MACs and OUIs 1-105Computing & Network Addressing - The IP Address 1-105Computing & Network Addressing - Rogue Wireless Access Points 1-107Computing & Network Addressing - ARP Attacks 1-107Computing & Network Addressing - Classles Internet Domain Routing - CI 1-109

Page 2: SANS 512 Indexes

Computing & Network Addressing - Determine the Network and the Host 1-111Computing & Network Addressing - Broadcast Address 1-114Computing & Network Addressing - Private Address 1-116Computing & Network Addressing - Domain Name System (DNS) 1-118Computing & Network Addressing - Static Host Tables 1-119Computing & Network Addressing - DNS 1-121Computing & Network Addressing - DNS - Queries 1-123Computing & Network Addressing - DNS - Attacks 1-126Computing & Network Addressing - DNS - Cache Poisoning 1-127Computing & Network Addressing - DNS - Domain Hijacking 1-128Computing & Network Addressing - DNS - Protecting 1-130Module 4: IP Terminology and Concepts 1-135IP Terminology and Concepts - Network Protocol - What is 1-137IP Terminology and Concepts - TCP/IP Packets and Frames 1-139IP Terminology and Concepts - Preamble 1-140IP Terminology and Concepts - IP - Internet Protocol 1-142IP Terminology and Concepts - How to Determine the Protocol 1-143IP Terminology and Concepts - IP - Header Identified Protocol 1-144IP Terminology and Concepts - IP Header Identifies Protocol 1-146IP Terminology and Concepts - IP Header Key Fields 1-148IP Terminology and Concepts - Protocol - 8 1-148IP Terminology and Concepts - Time-to-Live TTL 1-149IP Terminology and Concepts - Fragment Offset - 16 bits 1-149IP Terminology and Concepts - UDP & TCP Ports 1-152IP Terminology and Concepts - UDP Header 1-156IP Terminology and Concepts - TCP - The Transmission Control Protocol 1-161IP Terminology and Concepts - TCP Header 1-162IP Terminology and Concepts - TCP Code Bits 1-164IP Terminology and Concepts - Establishing a TCP Connection 1-166IP Terminology and Concepts - TCP Session Open and Close 1-168IP Terminology and Concepts - TCP Error Checking 1-169IP Terminology and Concepts - TCP Timeouts 1-170IP Terminology and Concepts - TCP And UDP Differences 1-171IP Terminology and Concepts - ICMP 1-172IP Terminology and Concepts - PING 1-174IP Terminology and Concepts - UNIX and Windows Traceroute 1-176IP Terminology and Concepts - Traceroute 1-178IP Terminology and Concepts - Application Layer Security Protocol 1-179IP Terminology and Concepts - Sniffer - What is 1-182IP Terminology and Concepts - Reading Packets 1-185IP Terminology and Concepts - Field OFFSET offset 0 1-185IP Terminology and Concepts - What are the first 3 fields in a packet 1-188IP Terminology and Concepts - What are the next 3 fields in a packet 1-190IP Terminology and Concepts - Decoding an IP Header 1-192IP Terminology and Concepts - What protocol is this packet and where does 1-194IP Terminology and Concepts - Decoding a TCP Header 1-196IP Terminology and Concepts - TCP/IP & TCP Dump pocket reference gui 1-198IP Terminology and Concepts - Reading Packets Summary 1-199Module 5: Offensive Vulnerability Scanning 1-207Offensive Vulnerability Scanning - 5 VM Management Axioms 1-208Offensive Vulnerability Scanning - Primary Threat Concerns 1-209Offensive Vulnerability Scanning - Threat Concerns 1-212Offensive Vulnerability Scanning - Hping v3.0 - Spoofing Port Scanner 1-214Offensive Vulnerability Scanning - p0f - Passive OS Detection 1-216

Page 3: SANS 512 Indexes

Offensive Vulnerability Scanning - Phone Scanning 1-218Offensive Vulnerability Scanning - PhoneSweep 1-219Offensive Vulnerability Scanning - TCP/IP Based Scanner Techniques 1-221Offensive Vulnerability Scanning - Basic port/ip scanners 1-223Offensive Vulnerability Scanning - Stealth/spoofing scanners 1-223Offensive Vulnerability Scanning - OS Fingerprinting 1-223Advance Reconnaissance and Vulnerability Scanning 1-225Advance Reconnaissance and Vulnerability Scanning - Social Engineering 1-227Advance Reconnaissance and Vulnerability Scanning - Social Engineering 1-229Advance Reconnaissance and Vulnerability Scanning - Fire on Your Posisi 1-230Advance Reconnaissance and Vulnerability Scanning - P2P - Firewall Sub 1-231Advance Reconnaissance and Vulnerability Scanning - KaZaA Firewall Su 1-231Advance Reconnaissance and Vulnerability Scanning - Instant Messenger 1-234Advance Reconnaissance and Vulnerability Scanning - Gathering Data 1-237Advance Reconnaissance and Vulnerability Scanning - P2P and IM Contro 1-238Advance Reconnaissance and Vulnerability Scanning - Vulnerablility Scan 1-240Advance Reconnaissance and Vulnerability Scanning - How to do a Vulnera 1-242Advance Reconnaissance and Vulnerability Scanning - Nmap and Nessus, 1-248Advance Reconnaissance and Vulnerability Scanning - Metasploit 1-251Advance Reconnaissance and Vulnerability Scanning - Pen Test Techniqu 1-253Advance Reconnaissance and Vulnerability Scanning - Management Applic 1-255Advance Reconnaissance and Vulnerability Scanning - Vulnerablility Asse 1-257Advance Reconnaissance and Vulnerability Scanning - Operating System An 1-258Advance Reconnaissance and Vulnerability Scanning - CISecurity.org 1-261 Summary of Module 5 1-263Module 6: Managing Safety, Physical Security and the Procurement 1-269Management Application Safety - Safety and the Computer Security Mana 1-270Management Application Safety -Hurricane Katrina Illustrates 1-274Management Application Safety -Smoke and Fire 1-275Management Application Safety -Leadership and Evacuation 1-279Management Application Safety -Richard Rescorla - Case Study 1-279Management Application Safety -Why Evacuation Matters 1-280Management Application Safety -Building Evacuation and Exit Plan (BEEP 1-281Management Application Safety -Safety Walkthrough 1-286Management Application Safety -Physical Security - Managing 1-288Management Application Safety -Physical Security - Locks 1-294Management Application Safety -Physical Security - Intruder Detection 1-298Management Application Safety -Physical Security - Resistance to Explosi 1-303Management Application Safety -Physical Security - Power and Cooling 1-305Management Application Safety -Physical Security - Current 1-306Management Application Safety -Physical Security - Power to the Datacent 1-308Management Application Safety -Physical Security - Cooling Basics 1-310Management Application Safety -Power and Cooling Summary 1-314Management Application Safety -Safety and PHYSSEC Summary 1-315Managing the Procurement Process 1-318Managing the Procurement Process - Procurement - SWOT 1-319Managing the Procurement Process -Procurement - Vendor and Product S 1-320Managing the Procurement Process -Procurement - Price and Value 1-325Managing the Procurement Process -Procurement - The Secret Life of a S 1-326Managing the Procurement Process -Procurement - Analytical Hierarchy 1-331Managing the Procurement Process -Procurement - Analytical Hieracy P 1-337Managing the Procurement Process -Procurement - Vendor Selection Su 1-339Managing the Procurement Process -Procurement - RFP 1-340

Page 4: SANS 512 Indexes

512.2 Defense-In-Depth

Module 7 - Attacks Against the Enterprise 2-10Mitnick-Shimomura 2-11Mitnick-Shimomura - When Toads Attack 2-13Mitnick-Shimomura - BadGuy Finger 2-15Mitnick-Shimomura - RPC Information 2-17Mitnick-Shimomura - Tracing the Trust 2-17Mitnick-Shimomura - Silence B with DoS 2-18Mitnick-Shimomura - Phase 2 Cutting Phone Lines 2-18Mitnick-Shimomura - Attacker Probes Weakness TCP Stack 2-21Mitnick-Shimomura - Phase 3 Analyzing the Lock 2-21Mitnick-Shimomura - Attacker Pretends to be B 2-24Mitnick-Shimomura - Phase 4: Picking the Lock 2-24Mitnick-Simomura - Make A Defenseless 2-25Mitnick-Simomura - Finish the Job 2-26Methods of Attacks 2-29Methods of Attacks - Malicious Code 2-31Methods of Attacks - Trojan Horses 2-31Methods of Attacks - Logic Bombs 2-31Methods of Attacks - Rober Duronio 2-32Methods of Attacks - Trap Doors 2-32Methods of Attacks - DEBUG mode Sendmail 2-33Methods of Attacks - Defending against logic bombs -Chey Cobb 2-34Methods of Attacks - DoS Denial of Service 2-35Methods of Attacks - Disruption of configuration information 2-37Methods of Attacks - Satellites Vulnerable to Hackers 2-39Methods of Attacks - Ministry of Denfence Satellite 2-39Methods of Attacks - Double Illumination 2-41Methods of Attacks - Tamil Rebels Hijack US Satellite 2-41Methods of Attacks - Exfiltration, MITM, Replay 2-43Methods of Attacks - Extrusion Detection 2-43Methods of Attacks - Layer 3 Monitoring 2-44Methods of Attacks - Man-in-the-Middle 2-45Methods of Attacks - Physical Attacks 2-49Methods of Attacks - Physical Security Protection 2-50Methods of Attacks - Laptop/Desktop Protection 2-50Methods of Attacks - Ring Approach to Physical Security Defense in 2-50Methods of Attacks - Basic Input/Output System (BIOS) 2-51Methods of Attacks - Buffer Overflows 2-53Methods of Attacks - Buffer Overflows Code Example 2-55Methods of Attacks - Buffer Overflows Concepts 2-56Methods of Attacks - Flooding and Spam 2-58Methods of Attacks - SPAM Management 2-59Methods of Attacks - Flooding Attacks 2-60Methods of Attacks - Spear Phishing 2-62Methods of Attacks - Remote Maintenance 2-64Methods of Attacks - HTTP Tunnels 2-66Methods of Attacks - Default Passwords and Backdoors 2-67Methods of Attacks - Zotob 2-68Methods of Attacks - MySpooler 2-68Methods of Attacks - Cisco Wireless Location 2-68Methods of Attacks - Race Conditions 2-70Methods of Attacks - Interrupts 2-73Methods of Attacks - Browsing and Enumeration 2-75Methods of Attacks - RPCinfo 2-76Methods of Attacks - Finger 2-77

Page 5: SANS 512 Indexes

512.2 Defense-In-Depth

Methods of Attacks - Traffic Analysis 2-80Methods of Attacks - Alteration of Code 2-82Methods of Attacks - Rootkits 2-84Methods of Attacks - Interrupt Attacks 2-85Methods of Attacks - Sony DRM 2-88Intelligent Network 2-88Intelligent Network - Performance and Perimeter Protection 2-90Intelligent Network - Unified Threat Management Security Devices 2-92Intelligent Network -Process of Troubleshooting 2-100Intelligent Network -Firewall Shortcomings and the Default Rule 2-102Intelligent Network -Firewall Rule-base Auditing 2-103Intelligent Network -Type of Firewalls 2-105Intelligent Network -Packet Filter 2-105Intelligent Network -Fooling Packet Filters 2-105Intelligent Network -Proxy or Application Gateway 2-106Intelligent Network -Adaptive Security Appliance 2-107Intelligent Network -Circuit Firewalls 2-107Intelligent Network -Ingress/Egress Filtering 2-108Intelligent Network -Telework and the Intelligent Network 2-110Intelligent Network -IDS/IPS Technology 2-112Intelligent Network -IDS Alerts 2-114Intelligent Network -NIDS Overview 2-116Intelligent Network -Signaure Analysis Works - How 2-117Intelligent Network -Rules and Signature Criteria 2-118Intelligent Network -How Anomaly Analysis Works 2-120Intelligent Network -How Application/Protocol Analysis Works 2-121Intelligent Network -Deep Packet Inspection 2-122Intelligent Network -Shallow Packet Inspection 2-121Intelligent Network -Data Normalization 2-123Intelligent Network -NIDS Challenges 2-125Intelligent Network -Topology Limitations 2-126Intelligent Network -Spanning Ports 2-126Intelligent Network -Network Taps 2-127Intelligent Network -NIDS Cost 2-128Intelligent Network -Snort as a NIDS 2-130Intelligent Network -Snort Rules - Writing 2-132Intelligent Network -Snort Rules - Simple 2-134Intelligent Network -Snort Rule - Advance 2-135Intelligent Network -NIDS - Managing 2-136Intelligent Network -Content Monitoring Systems 2-138Intelligent Network -IPS - What is 2-139Intelligent Network -File Integrity Checking Works - How 2-142Intelligent Network -Log Monitoring Works - How 2-143Intelligent Network -Log Monitoring - Inclusive Analysis 2-143Intelligent Network -Log Monitoring - Exclusive Analysis 2-144Intelligent Network -Tripwire 2-136Intelligent Network -Tripwire Threat List 2-147Intelligent Network -Tripwire Example 2-148Intelligent Network -Internet Storm Center 2-149Intelligent Network -HIPS Detail 2-150Intelligent Network -File Integrity, Network & Application Behavior 2-151Intelligent Network -HIPS Advantages & Challenges 2-153Intelligent Network -HIPS Challenges 2-153Intelligent Network -HIPS Recommendations 2-155Intelligent Network -NIPS 2-157

Page 6: SANS 512 Indexes

512.2 Defense-In-Depth

Intelligent Network -NIPS - Passive Analysis 2-160Intelligent Network -NIPS Challenges 2-161Intelligent Network -NIPS Recommendation 2-164Intelligent Network -IDS/IPS Summary 2-166Inteligent Network Summary (SIM/SIEM) 2-169Module 8: Defense-In-Depth 2-173Defense In Depth - Security is Risk - Focus of 2-174Defense-In-Depth- Security - Confidentiality, Integrity and Availability 2-175Defense-In-Depth - Prioritizing CIA 2-177Defense-In-Depth -Threat - What is a 2-178Defense-In-Depth -Threat - In Defense in Depth 2-180Defense-In-Depth -Attack Surface 2-183Defense-In-Depth -Software Attack Surface 2-184Defense-In-Depth -Network Attack Surface 2-184Defense-In-Depth -Human Attack Surface 2-185Defense-In-Depth -DiD - Approaches to (Defense in Depth) 2-186Defense-In-Depth -DiD - Uniform Protection 2-191Defense-In-Depth -DiD - Protected Enclaves 2-193Defense-In-Depth -DiD - Information Centric 2-195Defense-In-Depth -DiD - Vector Oriented 2-198Defense-In-Depth -Role-Based Access Control 2-200Change Management & Security 2-204Change Management & Security - Signature of Error in Change 2-205Change Management & Security - Intentional Change 2-207Change Management & Security - Separation of Duties 2-208Change Management & Security - Separation of Duties - Purchasing 2-209Change Management & Security - Separation of Duties - Developmen 2-209Change Management & Security - Separation of Duties - Staging 2-209Change Management & Security - Separation of Duties - Production 2-210Change Management & Security - Indicators of Change Management 2-211Change Management & Security - Snowflakes as an Indicator 2-213Change Management & Security - Best in Class Ops and Security 2-214Change Management & Security - MITRE Computer Networking Infras 2-216Change Management & Security - Tenets - Six Configuration Manag 2-217Change Management & Security - Tenets - Hardening Systems 2-217Change Management & Security - Tenets - Develop Repeatable Build 2-218Change Management & Security - Tenets - Implement Change Contro 2-219Change Management & Security - Tenets - Audit Change Control 2-219Change Management & Security - Tenets - Don't Troubleshoot 2-219Change Management & Security - Tenets - Reengineer the Frailest box 2-219Change Management & Security - 10 Steps to Improvement 2-221Change Management & Security - Reevaluating Incident Handling Resp 2-225Change Management & Security - Summary Change Management 2-226Malicious Software/Objectives 2-230-231Malicious Software - Taxonomy 2-232 Malicious Mobile CodeMalicious Software - Virus 2-233 Parasite can't exist by selfMalicious Software - Modifying Program Files 2-234Malicious Software - Macro 2-234Malicious Software - COM Program Infectors 2-235Malicious Software - EXE Program Infectors 2-236Malicious Software - Virus and Hoax Information 2-237Malicious Software - Worms 2-239 Self replicatingMalicious Software - Morris Worms 2-242 fingerd sendmailMalicious Software - Other Unix or Linux Worms 2-244 Ramen Malicious Software - Lion 2-244

Page 7: SANS 512 Indexes

512.2 Defense-In-Depth

Malicious Software - Melissa Virus 2-245 macro virusMalicious Software - SQL Slammer 2-247 UDP port 1434 / small 404 bytesMalicious Software - Sasser/Netsky Worms 2-249Malicious Software - Worms less of a problem today (we think) 2-251Malicious Software - Trojans 2-252 Dirext action; backdoor rootkitMalicious Software - Malicious Browser 2-254Malicious Software -Download.ject 2-255Malicious Software -Hybrid Threats 2-257Malicious Software -Propagation Techniques 2-261Malicious Software -Propagation Techniques - Removable Media 2-261Malicious Software -Propagation Techniques - E-mail 2-262Malicious Software -Propagation Techniques - Web Browsing 2-263Malicious Software -Propagation Techniques - Network Vulnerabilities 2-263Malicious Software -Propagation Techniques - Instant Messaging 2-264Malicious Software -Propagation Techniques - Peer-to-Peer Networks 2-265Malicious Software -Malware Defense Techniques 2-266 Scanners /Act monitorsMalicious Software -Malware - Management Application 2-270Malicious Software -Malware - Mitigating 2-272Malicious Software -Malware Summary 2-274Security Tools Selection 2-278Security Tools Selection - Goal Oriented Approach 2-280Security Tools Selection - Research Security Tools & Vendors 2-284Security Tools Selection - Product Support & Outsourcing 2-286Security Tools Selection - Cost Conscious Choice 2-288Security Tools Selection - Crosscheck Before Purchase 2-289Security Tools Selection - Implementation 2-290Defense-In-Depth Summary 2-292Module 9: Managing Security Policy 2-298Managing Security Policy - Policy Protects Organization 2-299Managing Security Policy - Security Policy Protects People 2-300- 302Managing Security Policy - Policy Protect Information 2-303Managing Security Policy - Standard Guidelines & Framework 2-305Managing Security Policy - Mission Statement 2-306Managing Security Policy - Security Posture 2-308Managing Security Policy - Security Documentation Baseline 2-311Managing Security Policy - Structure for Issue & System 2-314Managing Security Policy - Issue Specific Policies 2-317Managing Security Policy - Unwritten or Missing Policies 2-319Managing Security Policy - Firewall Rules Implies a Policy 2-320Managing Security Policy - Policy Statement or Body 2-324Managing Security Policy - SMART 2-325Managing Security Policy - OODA 2-328Managing Security Policy - OODA - Risk 2-329Managing Security Policy - OODA - www.warroom.com 2-330Managing Security Policy - OODA - Compliance State the Issue 2-331Managing Security Policy - OODA - Position 2-332Managing Security Policy - OODA - AUP Bullet Points 2-334Managing Security Policy - OODA - Compliance/Penalties 2-335Managing Security Policy - OODA - AUP Policy Approval 2-336Managing Security Policy - OODA - Non-Disclosure Agreement 2-338Managing Security Policy - OODA - NDA Protect Both Parties 2-339Module 10: Access Control and Password Management 2-344Access Control - Identity, Authentication, Authorization & Accountabili 2-345Access Control - Controlling Access 2-347Access Control - Key Terms & Principles 2-350

Page 8: SANS 512 Indexes

512.2 Defense-In-Depth

Access Control - Access Control Models 2-351Access Control - Mandatory Access Control (MAC) 2-352Access Control - Role Based Access Control (RBAC) 2-352Access Control - Rule Set Based Access Control (RSBAC) 2-352Access Control - Network Access Control (NAC) 2-353Access Control - Auditing Access 2-353Access Control - Managing Access 2-356Access Control - Managing Separation of Duties 2-359Access Control - Protocols and Centralized Control 2-360 PAP CHAPAccess Control - LDAP 2-362Access Control - IEEE 802.1x 2-363Access Control - Radious UPD port 1812 2-366Access Control - Access Control Biometrics 3-368Access Control - Password in Access Control 2-372Access Control - Reversible & Irreversible Encryption 2-373Access Control - Collision and Pre-Imagine Attacks 2-374Access Control - Access Control: Password 2-376Access Control - Password File 2-376Access Control - Password Cracking 2-377Access Control - Password Storage 2-378 Unauth disclosure, modification &Access Control - Password Hash - Strength 2-379Access Control - LMHASH 2-381 removalAccess Control - Brute Force Cracking Speed 2-383Access Control - Password Assessment - Methods 2-384Access Control - Dictionary Attack 2-387Access Control - Hybid Attack 2-387Access Control - Brute Force Attack 2-387Access Control - Pre-Computation Attack 2-387Access Control - Cracking Motivation 2-388Access Control - John Ripper vs. Linux MD5 Password File 2-389Access Control - Wordlist Mode 2-390Access Control - Single Crack Mode 2-390Access Control - Incremental Mode 2-390Access Control - External Mode 2-390Access Control - Cracking Windows Passwords 2-390Access Control - Cracking Unix Passwords 2-391Access Control - Cracking Read Hat Password File 2-391Access Control - Rainbow Tables 2-392Access Control - Fighting Pre-Computation Attacks 2-393Access Control - Winrtgen 2-394Access Control - Cain & Abel 2-396Access Control - One-Time Password 2-399Access Control - Enforce Strong Password 2-401Access Control - Management Application - Passwords 2-403Access Control - Summary of Access Control 2-405Module 11: Web Communications and Security 2-412Web Communications and Security Web Communications 101 2-414Web Communications and Security - Hypertext Transfer Protocol 2-414Web Communications and Security - HTTP Basics 2-415Web Communications and Security - HTTP Transactions 2-415Web Communications and Security - File Transfer (FTP) Protocol 2-418Web Communications and Security - Secure File Transfer Protocol 2-418Web Communications and Security - SSL-TLS 2-421Web Communications and Security - HTML Security 2-423Web Communications and Security - Directory Traversal 2-425

Page 9: SANS 512 Indexes

512.2 Defense-In-Depth

Web Communications and Security - CGI 2-427Web Communications and Security - CGI Methods 2-429Web Communications and Security - Cookies 2-431Web Communications and Security - Non-Persistent Cookie 2-433Web Communications and Security - Cross Site Scripting 2-436Web Communications and Security - Java 2-438Web Communications and Security - Active Content 2-441Web Communications and Security - ActiveX 2-444Web Communications and Security - Tools for Cracking WWW Apps 2-448Web Communications and Security - Brutus 2-449Web Communications and Security - Achilies 2-449Web Communications and Security - Libwhisker 2-450Web Communications and Security - Nikto 2-451Web Communications and Security - How are Sessions Tracked 2-452Web Communications and Security - URLs Hidden Form Elements 2-454Web Communications and Security - Hacking Session Info 2-456Web Communications and Security - SQL Injection 2-459Web Communications and Security - Web Application - Defense 2-461Web Communications and Security - Web Application Service Provid 2-462Web Communications and Security - Always Validate User Input 2-464Web Communications and Security - Simple Object Access Protocol 2-468Web Communications and Security - XML Gateway 2-474Web Communications and Security - UDDI 2-480Web Communications and Security Summary 2-482

Page 10: SANS 512 Indexes

512.3 Secure Communications

Module 12: Encryption 101 3-19Cryptography Fundamentals - Cryptography - What is 3-11Cryptography Fundamentals - Cryptography - Milestones 3-13Cryptography Fundamentals - Cryptography - Secret Decoder Rings 3-14Cryptography Fundamentals - Why Managers Care About Crypto 3-17Cryptography Fundamentals - Security by Obsurity is no Security 3-19Cryptography Fundamentals - Beware of Overconfidence 3-21Cryptography Fundamentals - Credit Cards Over the Internet 3-23Cryptography Fundamentals - Management High Level Goals of Cryptography 3-25Cryptography Fundamentals - Digital Substitution 3-27Cryptography Fundamentals - General Encryption Techniques 3-31Cryptography Fundamentals - Rotation Substitution 3-33Cryptography Fundamentals - Permutation 3-35Cryptography Fundamentals - Ways to Encrypt Data 3-36Cryptography Fundamentals - Stream Ciphers 3-37Cryptography Fundamentals - Block Ciphers 3-38General Types of Cyptosystems - Cryptosystems - Type of 3-42General Types of Cryptosystems - Symmetric Key 3-43General Types of Cryptosystems - Asymmetric Key 3-45General Types of Cryptosystems - Hash Functions 3-48General Types of Cryptosystems - Management High Level Goals of Cryptography 3-51General Types of Cryptosystems- Authentication 3-51General Types of Cyptosystems - Message Integrity 3-51General Types of Cryptosystems - Non-Repudiation 3-52General Types of Cryptosystems - Privacy/Confidentiality 3-52General Types of Cryptosystems - E-mail and Confidentiality 3-53General Types of Cryptosystems- Instant Messaging and Confidentiality 3-54General Types of Cryptosystems - Long Term Storage and Confidentiality 3-55General Types of Cryptosystems - Key and Key Passphrase Legal Protection 3-56General Types of Cryptosystems - Secure Socket Layer (SSL) 3-58General Types of Cryptosystems - 3DES 3-59General Types of Cryptosystems - AES 3-59General Types of Cryptosystems - SSL 3-59Module 13: Encryption 102 3-66Cryptography - Concepts 3-68Cryptography - DES 3-74Cryptography - 2 DES 3-77Cryptography - AES 3-78Cryptography - AES Algorithm 3-80Cryptography - AES Basic Functions 3-81Cryptography - RSA 3-82Cryptography - Generaing RSA Keys 3-84Cryptography - RSA vs. DES 3-85Cryptography - Quantum Computing & Cryptography 3-86Cryptography - Elliptic Curve Cryptosystem 3-90Cryptography - Practical ECC Considerations 3-93Cryptography - Crypto Attacks 3-95Cryptography - Cipher Attacks 3-95Cryptography - Birthday Attack 3-96Cryptography - Summary 3-97Module 14: Applying Cryptography 3-102Cryptography Applications - Bruce Schneiser Advice 3-103Cryptography Applications -Encryption 3-104Cryptography Applications -Confidentiality in Transit 3-107

Page 11: SANS 512 Indexes

512.3 Secure Communications

Cryptography Applications - Remote Access Server 3-108Cryptography Applications - Types of Remote Access 3-110Cryptography Applications -SSL VPNs 3-112Cryptography Applications -SSH 3-114Cryptography Applications -SSH Dumps 3-116Cryptography Applications -VPN - System Components 3-118Cryptography Applications -VPN - Security Implications 3-119Cryptography Applications -IPSEC - Overview 3-121Cryptography Applications - Types of IPSec Headers 3-123Cryptography Applications - IPSEC - ESP 3-124Cryptography Applications - Type of IPSEC mode 3-126Cryptography Applications -IPSEC - Tunnel Mode and ESP 3-127Cryptography Applications -IPSEC - IKE 3-127Cryptography Applications -IPSEC - Examples of IPSEC Encryption 3-129Cryptography Applications -IPSEC - Key Management 3-130Cryptography Applications -IPSEC - Non IPSec VPNs 3-132Cryptography Applications -IPSEC - L2TP 3-133Cryptography Applications -IPSEC - Point to Point Protocol (PPP) 3-134Cryptography Applications -IPSEC - PPP Dumps 3-135Cryptography Applications -IPSEC - Socks 3-137Cryptography Applications -IPSEC - Socks Dumps 3-138PGP and PKI 3-140PGP and PKI - Managing PGP 3-140PGP and PKI - Web of Trust 3-142PGP and PKI - Certificate and Signature Revocation 3-143PGP and PKI - Establishing a Key 3-145PGP and PKI - Digital Signaures 3-145PGP and PKI - Key Management 3-146PGP and PKI - Chosing a Passphase 3-147PGP and PKI - Distributing Your Public Key 3-148PGP and PKI - Digital Certificate 3-149PGP and PKI - Your Key Ring 3-150PGP and PKI - Adding Keys 3-151PGP and PKI - Encrypting Outbound E-Mail 3-154PGP and PKI - Decrypting Inbound E-Mail 3-155PGP and PKI - Signing Oubound E-Mail 3-156PGP and PKI - Confirming a Signed E-Mail 3-156PGP and PKI - Components 3-157PGP and PKI - Certificate Authority 3-159PGP and PKI -Key Management and Certficate Lifecycles 3-165PGP and PKI - Problems with PKI 3-172PGP and PKI - Trusted Platform Module (TPM) 3-174Applying Cryptography: Summary 3-178Module 15: Wireless Network Security 3-184Wireless - Objective, Popularity and Usage 3-185Wireless - Advantages and Bluetooth 3-188Wireless - Advantages and Bluetooth - Bluetooth 3-190Wireless - Advantages and Bluetooth - Bluetooth Security 3-191Wireless - Advantages and Bluetooth - Bluetooth Discovery Mode 3-193Wireless - Advantages and Bluetooth - Bluetooth Attacks 3-194Wireless - Advantages and Bluetooth - Bluetooth Sniffing 3-196Wireless - Advantages and Bluetooth - Protecting Bluetooth 3-198802.11 3-202802.11 - WEP Security Issue 3-204

Page 12: SANS 512 Indexes

512.3 Secure Communications

802.11i - EAP (802.11i, 801.1x, EAP) 3-206802.1x - Authentication (802.1x) 3-208802.11i - WiFi Protected Access 3-210802.11 - Eavesdropping 3-212802.11 - Eavesdropping Mitigation 3-214802.11 - Masquerading 3-217802.11 - Masquerading Mitigation 3-219802.11 - DoS (Denial of Service) 3-222802.11 - DoS Attack Mitigation 3-224802.11 - Rogue APs 3-225802.11 - Rogue AP Mititagion 3-226802.11 - Airborne Viruses 3-228802.11 - Heisinki 3-230802.11 - Airborne Viruses Mitigation 3-231802.11 - Steps to Planning a Secure WLAN 3-232802.11 - Protecting Wireless Network 3-234802.11 - Management Application - Wireless Risk Acceptance 3-235Wireless Summary 3-238Module 16: Steganography 3-243Steganography - Crypto vs. Stego 3-246Steganography - Detecting Cryptography 3-238Steganography - Histograms 3-249Steganography - How it works 3-250Steganography - General Types of 3-252Steganography - Injections 3-253Steganography - Substitutions 3-255Steganography - S-Tools 3-256Steganography - Embedding Data in Pixels 3-259Steganography - General New File 3-261Steganography - Spam Mimic 3-262Steganography - Stego Tools 3-264Steganography - Defending Against 3-266Steganography - Detecting S-Tools 3-268Steganography - Stego Summary 3-271Module 17: Managing Privacy 3-276Managing Privacy - Objectives 3-277Managing Privacy - Personally Identifiable Information (PII) 3-281Managing Privacy - Cross-sectorial Regulatory Approach to PII (Examples) 3-285Managing Privacy - Sectorial Regulatory Approach to PII in the US (Example) 3-287Managing Privacy - OECD Privacy Principles 3-289Managing Privacy - 7 Reasons to have your (Privacy) Ducks in a Row 3-299Managing Privacy - Prominent Lawsuits 3-300Managing Privacy - Privacy Certification 3-307Managing Privacy - Platform for Privacy (P3P) and EPAL Implementation 3-308Managing Privacy - Privacy Summary 3-314Module 18: Operations Security (OPSEC) 3-318Defensive OPSEC - Management Application 3-320Defensive OPSEC - Three Laws of Defensive 3-322Defensive OPSEC - Weekly Assessment Cycle 3-323Defensive OPSEC - Employee Issues 3-325Defensive OPSEC - Employment Agreements 3-328Defensive OPSEC - Putting It All Together 3-330Defensive OPSEC - Sensitive Information 3-332Offensive OPSEC 3-336

Page 13: SANS 512 Indexes

512.3 Secure Communications

Offensive OPSEC - Extract Knowledge 3-338Offensive OPSEC - Process 3-342Offensive OPSEC - Code of Ethics 3-343Offensive OPSEC - Corporate Information 3-344Offensive OPSEC - Danger of a Web Hits Counter 3-346Offensive OPSEC - Power Searching with GOOGLE 3-347Offensive OPSEC - Competitive Intelligence by Example 3-349Offensive OPSEC - whois.net 3-354Offensive OPSEC - nslookup and tracert 3-355Offensive OPSEC- Geobytes to Locate Datacenter 3'356Offensive OPSEC - Intense School, Terrible 3-357Offensive OPSEC - Wayback Machine 3-360Offensive OPSEC - That was Fun, Lets Do It Again 3-365Offensive OPSEC - Network Infornation (MISTI) 3-371How to Apply OPSEC - Summary 3-320Managerial Wisdom 3-393Seven Habits of Highly Effectively People 3-395Level 5 Leadership 3-397First Who…Then What 3-398Confront the Brutal Facts 3-399Hedgehog 3-400A Culture of Discipline 3-402Flywheel 3-404

Page 14: SANS 512 Indexes

512.3 Secure Communications

VPN's

Page 15: SANS 512 Indexes

512.4 The Value of Information

Managing Software Security - How much security is AppropriateManaging Software Security - Architectural IssuesManaging Software Security - Insist on Safe DefaultsManaging Software Security - Implement User AccountabilityManaging Software Security - Beware of Pre-existing SoftwareManaging Software Security - Write Modular CodeManaging Software Security - Address Error HandingManaging Software Security - Software Coding ErrorsManaging Software Security - Specific Implementation FlawsManaging Software Security - Code ReviewsManaging Software Security - Sound Review ProcessManaging Software Security - Code Analysis Tool OptionsHoneypots and HoneynetsHoneypots and Honeynets - What are HoneypotsHoneypots and Honeynets - Interation HoneypotsHoneypots and Honeynets - Why you need a HoneypotHoneypots and Honeynets - Honeypot 172.16.1.0/24Honeypots and Honeynets - HoneydHoneypots and Honeynets - Honey TokensHoneypots and Honeynets - LaBrea TarpitHoneypots and Honeynets - How LaBrea WorksHoneypots and Honeynets - Nepenthes - a Honeypot to detect/collect MalwareHoneypots and Honeynets - Detecting HoneypotsHoneypots and Honeynets - Is it LegalHoneypots and Honeynets - Honeypot SummaryManaging Intellectual PropertyManaging Intellectual Property - What is IPManaging Intellectual Property - "Know How" makes the subtle differenceManaging Intellectual Property - PatentsManaging Intellectual Property - What is a CopyrightManaging Intellectual Property - Fair Use CopyrightManaging Intellectual Property - Copyright BattlefieldManaging Intellectual Property - Copyright DefensesManaging Intellectual Property - FramingManaging Intellectual Property - Organizational Policy DMCAManaging Intellectual Property - Digital Rights ManagementManaging Intellectual Property - Content Scrambling System (CSS)Managing Intellectual Property - Sony DRM FlascoManaging Intellectual Property - XCP/EULAManaging Intellectual Property - Trademark or ServicemarkManagingIntellectual Property - Brand IdentityManaging Intellectual Property - Trade DressManaging Intellectual Property - Why Register a MarkManaging Intellectual Property - How do I know Something is TrademarkedManaging Intellectual Property - Attacks on TrademarksManaging Intellectual Property - Misappropriation of TrademarksManaging Intellectual Property - Dilution: Bluring and TarnishingManaging Intellectual Property - Licensing and FranchisingManaging Intellectual Property - Intangible Assets - Trade Secrets and Know HowManaging Intellectual Property - What is a Trade SecretManaging Intellectual Property - Know How Management ProprietaryManaging Intellectual Property - Know How Business ProprietaryManaging Intellectual Property - Economic AdvantageManaging Intellectual Property - IP Valuation

Page 16: SANS 512 Indexes

512.4 The Value of Information

Managing Intellectual Property - How to assign a valueManaging Intellectual Property - Intangible Assets Managing Intellectual Property - IP Valuation RightsManaging Intellectual Property -IP Valuation DatabaseManaging Intellectual Property - Intangible Asset AttacksManaging Intellectual Property - Protecting the IntangiblesManaging Intellectual Property - Why is it Important to Protect Intellectual Property (IPManaging Intellectual Property - CybersquattingManaging Intellectual Property - Social Cost of Intellectual Property MisuseManaging Intellectual Property - Internal IP Attack DetectManaging Intellectual Property - Watermark ExampleManaging Intellectual Property - External IP DetectionManaging Intellectual Property - 10 Keys to Managing IPModule 20: Incident HandlingIncident Handling - Legal AspectsIncident Handling - What is an IncidentIncident Handling - Type of IncidentsIncident Handling - Reflector AttackIncident Handling - Amplifier AttackIncident Handling - SynfloodIncident Handling - Examples of a IncidentIncident Handling - 6 StepsIncident Handling - PreparationIncident Handling - IdentificationIncident Handling - Signs of an IncidentIncident Handling - Incident AnalysisIncident Handling - ContainmentIncident Handling - EradicationIncident Handling - RecoveryIncident Handling - Follow-upIncident Handling - Key MistakesIncident Handling - Putting the Steps TogetherIncident Handling and the Legal SystemIncident Handling and the Legal System - United States Code Title 18, Section 30Incident Handling and the Legal System - Law Relating to (Regulatory, Criminal, CivIncident Handling and the Legal System - Terrorism, Infrastructure ProtectionIncident Handling and the Legal System - Search/SeizureIncident Handling and the Legal System - Arrest/False ArrestIncident Handling and the Legal System - Evidence Must Be AdmissibleIncident Handling and the Legal System - Chain of CustodyIncident Handling and the Legal System - Evidence GatheringIncident Handling and the Legal System - Types of EvidenceIncident Handling and the Legal System - Real and DirectIncident Handling and the Legal System - Best EvidenceIncident Handling Foundations - SummaryModule 21: Information WarfareInformation Warfare - ToolsInformation Warfare - Star Wars and Perception ManagementInformation Warfare - Malicious code/virus blitzInformation Warfare - IrhabiInformation Warfare - Madrid BombingInformation Warfare - The White HouseInformation Warfare - Could Currency be DestabilizedInformation Warfare - Could a City be Destroyed

Page 17: SANS 512 Indexes

512.4 The Value of Information

Information Warfare - Y2KInformation Warfare - Offshore Coding and SW Engneering 2007Information Warfare - Terrorism and Economic WarfareInformation Warfare -Information Warfare TheoryInformation Warfare - Zero-Sum GameInformation Warfare - Asymmetry Year 2001Information Warfare - Cycle TimeInformation Warfare - Indications and WarningInformation Warfare - Vista ScenarioInformation Warfare - I & W Analysis ModelInformation Warfare - Measures of EffectivenessInformation Warfare - Offensive PlayersInformation Warfare - Offensive Operations GoalInformation Warfare - Increase Value to OffenseInformation Warfare - Auto Manufature ScenarioInformation Warfare - Decrease Value to DefenseInformation Warfare - Defensive Dominance DeterrenceInformation Warfare - Management ApplicationModule 22: Disaster Recovery / Contingency Contingency Planning - Business Continuity PlanContingency Planning - Diaster Recovery PlanContingency Planning - Classical BCP/DRPContingency Planning - Modern BCP/DRPContingency Planning - Basic Elements of Continuity PlanningContingency Planning - Business Impact AnalysisContingency Planning - BIA QuestionsContingency Planning - Recovery Time ObjectiveContingency Planning - BCP/DRP Planning ProcessContingency Planning - Top BCP/DRP Planning MistakesContingency Planning - Management Application Leading the Business Continuity TeModule 23: Managing EthicsEthics - What Are Ethics

Page 18: SANS 512 Indexes

512.1 Managing the Plant, Network & IAConcepts of situational awareness and the fundamental sources of information that lead to BSAModule 1:Budget Awareness and Project Management Budget Awareness and Project Management Business Situational Awarness Project Management For Security Leaders

Module 2: The Network Infrastructure The Network Infrastructure

Module 3: Computer and Network Addressing Computer and Network Addressing

Module 4: IP Terminology and Concepts IP Terminology and Concepts

Module 5: Offensive Vulnerability Scanning Offensive Vulnerability Scanning Advanced Reconnaissance and Vulnerability Scanning

Module 6: Managing Safety, Physical Security and The Procurement Management Application Safety Managing the Procurement Process

512.2 Defense-In-Depth

Module 7: Attacks Against the Enterprise Internet Security Technologies: Introduction Mitnick-Shimomura Method of Attack The Intelligent Network

Module 8: Defense-in-Depth Defense-in-Depth Change Management and Security Malicious Software Security Tool Selection Defense-in-Depth: Summary

Module 9: Managing Security Policy Managing Security Policy

Module 10: Access Control and Password Management Access Control and Password Management

Module 11: Web Communication and Security Web Communication and Security

Managing Safety, Physical Security and Procurement Summary

Page 19: SANS 512 Indexes

512.3 Secure Communications

Encryption 101 Cryptography Fundamentals General Types of CryptosystemsEncryption 102 Cryptography Algorithms and ConceptsApplying Cryptography Crptography Applications, VPNs and IPSec PGP and PKI Applying Cryptography SummaryWireless Network Security Wireless Advantages and Bluetooth 802.11 Wireless Network Security: SummarySteganography SteganographyOperations Security (OPSEC) Defensive OPSEC Offensive OPSEC Managerial Wisdom

Page 20: SANS 512 Indexes

512.4 The Value of Information

Managing Intellectual Property Building a Security Awarness Program Honeypots and Honeynets Managing Intellectual Property

Incident Handling Foundations Incident Handling Foundations Incident Handling and the Legal System Incident Handling Foundations: Summary

Information Warfare Information Warfare

Managing Ethics Managing Ethics

IT Risk Management Risk Management and Auditing

Page 21: SANS 512 Indexes

512.5 Management Practicum

Managing GloballyManaging IT Business and Program GrowthSecurity and Organizational StructureManaging the Total Cost of OwnershipManaging NegotiationsFraud ManagementManaging Legal LiabilityManaging PrivacyManaging Technical PeopleManagement Practicum: Summary

Page 22: SANS 512 Indexes

91341

60

101

135

207225

269318

343

9112987

173203229277292

298

344

431

Page 23: SANS 512 Indexes

939

67

105143177

181195230

235

267285341

Page 24: SANS 512 Indexes

91937

123163183

189

241

281

Page 25: SANS 512 Indexes

9255189

117141157171211243

Page 26: SANS 512 Indexes

512.1 Managing the Plant, Network IA

Business Situational Awareness 1-14Business Situational Awareness - Tenet Nosce Know Thyself 1-18Business Situational Awareness - Positional and Personal Authority 1-20Business Situational Awareness - How to Budget Time 1-23Business Situational Awareness - How to Budget Employee's Time 1-27Business Situational Awareness - Budget Structure 1-30Business Situational Awareness - IT Department Budgets 1-32Business Situational Awareness - Situational Awareness Summary 1-36Project Management For Security Leaders 1-40Project Management - Initiation 1-42Project Management - Scope 1-44Project Management - Develop 1-46Project Management - Scheduling 1-49Project Management - Execution 1-50Project Management - Monitoring, Controlling, Conflict 1-51Project Management - Closing Out the Project 1-53Project Management - PMO - Project Management Office 1-54Module 2: The Network Infrastructure 1-59Network Infrastructure 1-60Network Infrastructure - OSI vs. TCP/IP 1-62Network Infrastructure -OSI Model 1-62Network Infrastructure -Network Components 1-63Network Infrastructure -Hubs 1-63Network Infrastructure -Bridges/Switches 1-64Network Infrastructure -Attacks on Layer 2 Switches 1-64Network Infrastructure -Spanning Tree Protocol 1-65Network Infrastructure -Dynamic Host Configuration Protocol 1-65Network Infrastructure -Router 1-67Network Infrastructure -Network Attached Storage (NAS) 1-67Network Infrastructure -VLANs 1-69Network Infrastructure -Segmenting Your Internal Network 1-71Network Infrastructure -Management Application - Network Partitions 1-73Network Infrastructure -Physical and Logical Topologies 1-75Network Infrastructure -Bus Topology 1-75Network Infrastructure -Ring Topology 1-76Network Infrastructure -Star Topology 1-76Network Infrastructure -Ethernet 1-80Network Infrastructure -Token Ring and FDDI 1-82Network Infrastructure -Asynchronous Transfer Mode (ATM) 1-85Network Infrastructure -Permanent Virtual Circuit (PVC) 1-86Network Infrastructure -Switched Virtual Circuit (SVC) 1-86Network Infrastructure -WAN Access Technologies 1-87Network Infrastructure -VoIP Overview for Managers 1-88Network Infrastructure -VoIP Components& Protocols 1-91Network Infrastructure -VoIP Threats & Security 1-93Network Infrastructure -Management Application - Questions to ask about Networks 1-96Module 3: Computer and Network Addressing 1-101Computing & Network Addressing - Frame and Packet Address (MAC=48 bits) 1-104Computing & Network Addressing - MACs and OUIs 1-105Computing & Network Addressing - The IP Address 1-105Computing & Network Addressing - Rogue Wireless Access Points 1-107Computing & Network Addressing - ARP Attacks 1-107Computing & Network Addressing - Classles Internet Domain Routing - CIDR 1-109Computing & Network Addressing - Determine the Network and the Host 1-111

Page 27: SANS 512 Indexes

512.1 Managing the Plant, Network IA

Computing & Network Addressing - Broadcast Address 1-114Computing & Network Addressing - Private Address 1-116Computing & Network Addressing - Domain Name System (DNS) 1-118Computing & Network Addressing - Static Host Tables 1-119Computing & Network Addressing - DNS 1-121Computing & Network Addressing - DNS - Queries 1-123Computing & Network Addressing - DNS - Attacks 1-126Computing & Network Addressing - DNS - Cache Poisoning 1-127Computing & Network Addressing - DNS - Domain Hijacking 1-128Computing & Network Addressing - DNS - Protecting 1-130Module 4: IP Terminology and Concepts 1-135IP Terminology and Concepts - Network Protocol - What is 1-137IP Terminology and Concepts - TCP/IP Packets and Frames 1-139IP Terminology and Concepts - Preamble 1-140IP Terminology and Concepts - IP - Internet Protocol 1-142IP Terminology and Concepts - How to Determine the Protocol 1-143IP Terminology and Concepts - IP - Header Identified Protocol 1-144IP Terminology and Concepts - IP Header Identifies Protocol 1-146IP Terminology and Concepts - IP Header Key Fields 1-148IP Terminology and Concepts - Protocol - 8 1-148IP Terminology and Concepts - Time-to-Live TTL 1-149IP Terminology and Concepts - Fragment Offset - 16 bits 1-149IP Terminology and Concepts - UDP & TCP Ports 1-152IP Terminology and Concepts - UDP Header 1-156IP Terminology and Concepts - TCP - The Transmission Control Protocol 1-161IP Terminology and Concepts - TCP Header 1-162IP Terminology and Concepts - TCP Code Bits 1-164IP Terminology and Concepts - Establishing a TCP Connection 1-166IP Terminology and Concepts - TCP Session Open and Close 1-168IP Terminology and Concepts - TCP Error Checking 1-169IP Terminology and Concepts - TCP Timeouts 1-170IP Terminology and Concepts - TCP And UDP Differences 1-171IP Terminology and Concepts - ICMP 1-172IP Terminology and Concepts - PING 1-174IP Terminology and Concepts - UNIX and Windows Traceroute 1-176IP Terminology and Concepts - Traceroute 1-178IP Terminology and Concepts - Application Layer Security Protocol 1-179IP Terminology and Concepts - Sniffer - What is 1-182IP Terminology and Concepts - Reading Packets 1-185IP Terminology and Concepts - Field OFFSET offset 0 1-185IP Terminology and Concepts - What are the first 3 fields in a packet 1-188IP Terminology and Concepts - What are the next 3 fields in a packet 1-190IP Terminology and Concepts - Decoding an IP Header 1-192IP Terminology and Concepts - What protocol is this packet and where does the protocol layer start 1-194IP Terminology and Concepts - Decoding a TCP Header 1-196IP Terminology and Concepts - TCP/IP & TCP Dump pocket reference guide 1-198IP Terminology and Concepts - Reading Packets Summary 1-199Module 5: Offensive Vulnerability Scanning 1-207Offensive Vulnerability Scanning - 5 VM Management Axioms 1-208Offensive Vulnerability Scanning - Primary Threat Concerns 1-209Offensive Vulnerability Scanning - Threat Concerns 1-212Offensive Vulnerability Scanning - Hping v3.0 - Spoofing Port Scanner 1-214Offensive Vulnerability Scanning - p0f - Passive OS Detection 1-216Offensive Vulnerability Scanning - Phone Scanning 1-218

Page 28: SANS 512 Indexes

512.1 Managing the Plant, Network IA

Offensive Vulnerability Scanning - PhoneSweep 1-219Offensive Vulnerability Scanning - TCP/IP Based Scanner Techniques 1-221Offensive Vulnerability Scanning - Basic port/ip scanners 1-223Offensive Vulnerability Scanning - Stealth/spoofing scanners 1-223Offensive Vulnerability Scanning - OS Fingerprinting 1-223Advance Reconnaissance and Vulnerability Scanning 1-225Advance Reconnaissance and Vulnerability Scanning - Social Engineering 1-227Advance Reconnaissance and Vulnerability Scanning - Social Engineering - Defense 1-229Advance Reconnaissance and Vulnerability Scanning - Fire on Your Posisition 1-230Advance Reconnaissance and Vulnerability Scanning - P2P - Firewall Subversion 1-231Advance Reconnaissance and Vulnerability Scanning - KaZaA Firewall Subversion 1-231Advance Reconnaissance and Vulnerability Scanning - Instant Messengers 1-234Advance Reconnaissance and Vulnerability Scanning - Gathering Data 1-237Advance Reconnaissance and Vulnerability Scanning - P2P and IM Controls 1-238Advance Reconnaissance and Vulnerability Scanning - Vulnerablility Scanners 1-240Advance Reconnaissance and Vulnerability Scanning - How to do a Vulnerability Scan 1-242Advance Reconnaissance and Vulnerability Scanning - Nmap and Nessus, the outside view 1-248Advance Reconnaissance and Vulnerability Scanning - Metasploit 1-251Advance Reconnaissance and Vulnerability Scanning - Pen Test Techniques 1-253Advance Reconnaissance and Vulnerability Scanning - Management Application - Scanning Tools 1-255Advance Reconnaissance and Vulnerability Scanning - Vulnerablility Assessment 1-257Advance Reconnaissance and Vulnerability Scanning - Operating System Analysis - Inside View 1-258Advance Reconnaissance and Vulnerability Scanning - CISecurity.org 1-261 Summary of Module 5 1-263Module 6: Managing Safety, Physical Security and the Procurement 1-269Management Application Safety - Safety and the Computer Security Manager 1-270Management Application Safety -Hurricane Katrina Illustrates 1-274Management Application Safety -Smoke and Fire 1-275Management Application Safety -Leadership and Evacuation 1-279Management Application Safety -Richard Rescorla - Case Study 1-279Management Application Safety -Why Evacuation Matters 1-280Management Application Safety -Building Evacuation and Exit Plan (BEEP) 1-281Management Application Safety -Safety Walkthrough 1-286Management Application Safety -Physical Security - Managing 1-288Management Application Safety -Physical Security - Locks 1-294Management Application Safety -Physical Security - Intruder Detection 1-298Management Application Safety -Physical Security - Resistance to Explosive 1-303Management Application Safety -Physical Security - Power and Cooling 1-305Management Application Safety -Physical Security - Current 1-306Management Application Safety -Physical Security - Power to the Datacenter 1-308Management Application Safety -Physical Security - Cooling Basics 1-310Management Application Safety -Power and Cooling Summary 1-314Management Application Safety -Safety and PHYSSEC Summary 1-315Managing the Procurement Process 1-318Managing the Procurement Process - Procurement - SWOT 1-319Managing the Procurement Process -Procurement - Vendor and Product Selection 1-320Managing the Procurement Process -Procurement - Price and Value 1-325Managing the Procurement Process -Procurement - The Secret Life of a Salesperson 1-326Managing the Procurement Process -Procurement - Analytical Hierarchy Process 1-331Managing the Procurement Process -Procurement - Analytical Hieracy Process Summary 1-337Managing the Procurement Process -Procurement - Vendor Selection Summary 1-339Managing the Procurement Process -Procurement - RFP 1-340