Concealer is a Mac app that keeps files and confidential information secure, out of sight, and organised. Concealer stores information in the form of cards and uses the latest encryption methods (AES-256) to protect information such as credit card numbers, passwords, software license codes, files of any type, and much more.Account InformationAccount cards in Concealer come with various templates that make storing credit card info, passwords, and much more very simple. Just choose a category, copy your information into the pre-defined fields, and know that your information is protected from unwanted eyes. Concealer can also copy multiple fields to the Clipboard to make pasting it into login or payment forms a real snap. Files and FoldersConcealer not only hides your files, but also protects them using AES-256 encryption, in a sparse bundle. Use the master password or assign a separate password for twice the protection. Adding files to a file storage card is as simple as a drag and drop from the Finder. Easy and effective. Text FilesHave your information in a text file? Don't feel like copying it to various fields? Just copy and paste it into a note card and format it right inside Concealer. This can also be a great way to hide diaries or other sensitive text documents. What it comes down to is that regardless of the information, Concealer can protect it in any form!Mac Minimum System Requirements:Mac Recommended System Requirements:Processor:Â Â IntelRAM:Â Â 4 GBHard Disk:Â Â 300 MBVideo Card:Â Â anySupported OS:Â Â Mac Yosemite 10.10, Mac Mavericks 10.9, Mac Mountain Lion 10.8, Mac Lion 10.7, Mac Snow Leopard 10.6, Mac Leopard 10.5, Mac OS X, Macintosh
Learning CCIE Exam Video Training (Cisco Certified Internetwork Expert) [Download]
Brand: Dev Training
This is a Excellent Application on Helping you Pass your CCIE Exam, Cisco Certified Internetwork Expert) Includes Video Training and Practice Exam.System Requirements:Supported OS: Â Â [Mac Mountain Lion 10.8, Mac Lion 10.7]Processor: Â Â Intel ProcessorRAM: Â Â 1GBHard Disk: Â Â 6GBVideo Card: Â Â Standard Graphic Card
Laplink SafeErase 6 permanently erases your data for complete protection. Deleted data can often be recovered. Even when hard disks are formatted, anyone can use simple data recovery software and obtain personal confidential data - unless you use Laplink SafeErase! Protect yourself and your data with SafeErase, the fastest and most secure way to permanently delete sensitive information. SafeErase utilizes a series of government recommended deletion methods to completely wipe personal data from your hard drive so that it is unrecoverable. Laplink SafeErase 6 is the solution for the secure removal of sensitive data on your hard disk and offers you valuable protection. SafeErase does not simply erase files, but it destroys them using recognized and recommended methods. The reasons for securely deleting data are many. Old E-mail files, Internet history, file caches, financial data, business information and private data should be protected from unauthorized access. You can choose from different algorithms to erase data. These methods are recommended and used by the US Department of Defense and the German Federal Office of Information Security. In other words, SafeErase provides the highest standard in security. If selling, giving away, or recycling your computer, use Laplink SafeErase 6 to delete your entire computer so that no data can be reconstructed or accessed.
Learning Microsoft Windows Server 2012 Certification - Exam 70-411 [Online Code]
Number of Videos: 8.75 hours - 96 lessonsAuthor: John SavillUser Level: Beginner***Updated for Windows Server 2012 R2*** In this Microsoft Windows Server 2012 Certification (Exam 70-411) training course, expert John Savill teaches you how to design, implement and administer the core components of the Windows Server 2012 operating system.The skills that you are taught in this tutorial include everything you need to pass the Administering Windows Server 2012 exam, a required component of the MCSA certification from Microsoft. John begins your training with a chapter on deploying Windows Server 2012.You cover installation, configuration, ongoing patching and backup of the operating system. This video tutorial covers the design and implementation of core Windows services including file services, printing, networking, active directory and group policy. Each topic the author presents is broken down into short and easy to understand lessons, allowing you learn quickly and understand more of what you are being taught.Once you have completed this training video for Microsoft Windows Server 2012 Certification (Exam 70-411 - Administering Windows Server 2012) you will have the knowledge required to design, implement and administer the basic services in a Windows Server environment, bringing you one step closer to achieving your Microsoft Certified Solutions Associate designation.System Requirements:Supported OS: Â Â [Mac Mountain Lion 10.8, Mac Lion 10.7, Mac Snow Leopard 10.6, Mac Leopard 10.5, Mac OS X, Macintosh]Processor: Â Â AnyRAM: Â Â AnyHard Disk: Â Â 1.38GBVideo Card: Â Â Any
Number of Videos:2.5 hours - 16 lessonsUser Level:BeginnerPresented by security ace David R. Miller, this course covers what you will need to know to pass the CISSP Domain 8 - Software Development Security exam. Domain 8 focuses on the challenges of securing software applications from malicious attack. The course starts with a look at the various types of applications and identifies the risks within their architecture.It goes on to examine the software development life cycle, offering several highly recommended models for enhancing security during the phases of the life cycle and within the applications themselves. Specific risks, countermeasures, and controls are covered along with a description of the testing strategies used to ensure more secure applications.Learn what is required to pass Domain 8 of the 2015 CISSP Certification CourseUnderstand the security risks inherent within the architecture of the different forms of applicationsReview the security dangers associated with the different SDLC methodologiesExplore buffer overflow and injection risks, and how to protect against themMaster the controls used to secure the computing environment and the SDLCGain insight regarding the testing strategies used to secure software applicationsDavid R. Miller (CISSP, PCI QSA, CEH) is President of the MicroLink Corporation, a provider of information systems security, compliance, and training services. He has lectured on information security to many audiences, including those at the U.S. Military Academy at West Point, the U.S. Army Advanced Battle Command, Cisco Systems Inc., Oracle Corporation, and Symantec Corporation. He is the author (or co-author) of numerous books on network systems and information security, and many training videos for O'Reilly.PC Minimum System Requirements:PC Recommended System Requirements:Processor:Â Â AnyRAM:Â Â AnyHard Disk:Â Â 2GBVideo Card:Â Â AnySupported OS:Â Â Windows 10, Windows 8, Windows 7, Windows Vista, Windows XP, Windows 2000, Windows
Understanding Intrusion Detection Systems [Online Code]
Brand: O'Reilly Media
Number of Videos:2.75 hours - 45 lessonsUser Level:BeginnerAn outsider might be inside your network and ready to release attack traffic. A disgruntled employee might be inside your system and ready to delete files. You're a systems or network admin and it's your job to prevent these types of malicious events.Where do you begin? A good start is knowing with some certainty that the attackers are even present and a good intrusion detection system will do just that. In this video, security expert Ric Messier explains why intrusion detection systems are necessary, what they do, how they work, where to find them, and how to implement them. Understand intrusion detection: Its meaning, its value, and how to implement it Master the workings of host-based and network-based intrusion detection systems Learn about network captures, cryptographic hashes, alerting, incident response, and more Gain awareness of anomaly based and signature based intrusion detection systems Learn to use open source intrusion detection systems like Snort, Suricata, and Bro Understand how to perform file integrity checks using Tripwire and Samhain Review multiple forms of built-into-the-OS IDS systemsRic Messier directs the Cybersecurity & Digital Forensics program at Champlain College in Burlington, VT. He runs the private security firm WasHere Consulting and is also a Senior Consultant with the security firm IP Architects, LLC. He is author of multiple O'Reilly security titles, including Professional Guide to Wireless Network Hacking and Penetration Testing, Introduction to Penetration Testing, and Mastering Python - Networking and Security.PC Minimum System Requirements:PC Recommended System Requirements:Processor:Â Â AnyRAM:Â Â AnyHard Disk:Â Â 2GBVideo Card:Â Â AnySupported OS:Â Â Windows 10, Windows 8, Windows 7, Windows Vista, Windows XP, Windows 2000, Windows
Number of Videos: 5 hours - 89 lessonsAuthor:Ric MessierUser Level:IntermediateEthical hacking, or security testing, is the art and science of finding the flaws in an organization's network systems or web applications. Identifying those vulnerabilities can give the organization a fighting chance to fix them before the bad guys find them.This course is a hands-on overview of the open source tools that information security professionals use to conduct professional caliber penetration tests. Prerequisites include a basic understanding of the ways network systems and operating systems work, basic familiarity with Linux, the ability to run virtual machines (VMWare, etc.) so you can set up attack systems and target systems, and a computer that's ready to run Kali Linux and Metasploit software.Explore the concepts of security testing and the knowledge required to perform itUnderstand reconnaissance and the publicly available tools used to gather information on potential targetsDiscover the scanning techniques used to identify network systems' open portsLearn to identify network system vulnerabilities and confirm their exploitabilityExplore techniques for identifying web application vulnerabilities and attacksLearn about client-side attacks and client-side attack toolsGain hands-on experience using Metasploit penetration testing softwareRic Messier (GCIH, GSEC, CEH, CISSP) is the Director for Cyber Academic Programs at Circadence. He has decades of information security experience and is the author of dozens of O'Reilly titles on InfoSec and digital forensics, including "Introduction to Penetration Testing" and "Learning Linux Security". He holds degrees in Information Technology, Digital Forensic Science, and Information Assurance and Security.PC Minimum System Requirements:PC Recommended System Requirements:Processor:Â Â AnyRAM:Â Â AnyHard Disk:Â Â 2GBVideo Card:Â Â AnySupported OS:Â Â Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Vista, Windows XP, Windows 2000, Windows
Number of Videos:8.5 hours - 59 lessonsUser Level:BeginnerWorks On: Windows 7,Vista,XP- Mac OS X.This course covers in detail the information required to pass the security operations (Domain 7) portion of the Certified Information Systems Security Professional (CISSP) certification exam. While the course is primarily intended to assist IT professionals in their quest to pass the CISSP exam, it is also useful to business owners and business managers interested in information security as it offers a vision of how to assemble and maintain a comprehensive information security structure suitable for virtually any type of business or organization. If you're looking for a course on how to prevent your information assets from being compromised, this is it.Master the knowledge requirements of CISSP Domain 7 - Security OperationsLearn how to set-up a comprehensive IT security structure suitable for any organizationUnderstand security operations, provisioning, and system security maintenance tasksLearn about incident response requirements, digital investigations, and cryptographyExplore the creation of business continuity plans and disaster recovery plans Understand the processes and technologies related to data and network recoveryLearn to maintain the confidentiality, integrity, and availability of your information assetsDavid R. Miller (CISSP, PCI QSA, CEH) is President of the MicroLink Corporation, a provider of information systems security, compliance, and training services. He's lectured on information security at the U.S. Military Academy at West Point, the U.S. Army Advanced Battle Command, Cisco Systems Inc., Oracle Corporation, Symantec Corporation, and many others. He is the author (or co-author) of ten books on network systems and information security.PC Minimum System Requirements:PC Recommended System Requirements:Processor:Â Â AnyRAM:Â Â AnyHard Disk:Â Â 2GBVideo Card:Â Â AnySupported OS:Â Â Windows 10, Windows 8, Windows 7, Windows Vista, Windows XP, Windows 2000, Windows
Number of Videos:7 hours - 56 lessonsUser Level:BeginnerLooking to start or enhance your career in computer networking? Begin here. The Cisco CCENT certification is an entry level routing and switching certification recognized by IT professionals world-wide. Possessing a CCENT tells potential employers you have the knowledge and ability to install, operate, and troubleshoot small enterprise and branch networks.The Cisco ICND1 100-105 exam, also known as the Interconnecting Cisco Networking Devices Part 1 exam, is the test you must pass to obtain the CCENT. This course gets you ready for the ICND1 100-105 test. It covers in detail each of the five topics you will be tested on, including: Network fundamentals, LAN switching fundamentals, routing fundamentals, infrastructure services, and infrastructure maintenance. Take this course, pass the test, receive your CCENT, and get your career moving!Prepare yourself to pass the Cisco ICND1 100-105 exam required for CCENT certificationLearn to describe network fundamentals, build a LAN, and manage network securityBecome adept at configuring Cisco routers and switchesUnderstand Layer 3 routing tables and how to configure a routed networkLearn about inter-VLANs, static routes, RIPv2, DNS, DHCP, NAT, NTP, and access control listsDiscover how to configure, operate, and maintain network infrastructureLearn to verify and troubleshoot network protocols and network operationsJohn Pickard has been training network engineers for over 16 years. He's an associate professor at East Carolina University's College of Engineering and Technology, a Cisco Certified Network Academy Instructor, and an SME for the Cisco Networking Academy curriculum development team. He's earned numerous networking certifications (CCNP, IPv6 Forum Certified Gold Trainer, etc.) and holds a PhD in Technology Management from Indiana State University and an MBA in Business Management from Wayland Baptist University.Mac Minimum System Requirements:Mac Recommended System Requirements:Processor:Â Â AnyRAM:Â Â...