JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
.English
>
Academics
>
Tools
> Tool Downloads (Pg. 4)
Academics - Tools
[1]
[2]
[3]
[4]
Multimedia
QuickTime Installer
Apple's multimedia viewer for .mov extensions, many new capabilities
Download Page
Real Player 8.0
Streaming multimedia and stand-alone formats
Download Page
Windows Media Player
The complete multimedia suite from Microsoft
Download
Novell
Pandora
Set of tools for hacking, intruding, and testing the security and insecurity of Novell Netware
General Overview
Download Win9x Online File
Download WinNT File
Download Offline File
Documentation
NT - 2000
File Splitter Deluxe
Split any size or type of file into smaller pieces for transport or evaluation
Download
Description
Password Recovery Tools
Accent Access Password Recovery
Download File
Description
Accent Money Password Recovery
Download
Description
Accent Office Password Recovery
Download
Description
Accent Word Password Recovery
Download
Description - Instructions
Advanced pdf Password Recovery
Download File
Description
LastBit Office Password Recovery Tools
Download
(Description)
(Program Web Site)
Passware Kit
Download
Port and Network Scan
NMap
Network scanner and mapper for evaluation (MS, Linux versions available)
Download Page
Description
YAPS - yet another port sniffer
Some sniffing tools in an evaluation version
Description
Security General
Network Stumbler
Find, connect to, analyze wireless access points using a variety of wireless NICs
Net Stumbler Forum
UNIX
SWatch
Actively monitor messages as they are written to a log file via the syslog utility, view contents of any file within the UNIX platform
Download
Description
.English
>
Academics
>
Tools
> Tool Downloads (Pg. 4)