</div><div class='box-content'><ul><li><p><span class=''review_text''><P/><IT>''For communications systems engineers and designers, this guide to the Digi International XBee radio communication modules provides practical instruction on real world uses of this robust collection of communications prod
Hands-On Information Security Lab Manual
โ Scribed by Andrew Green, Michael Whitman, Herbert Mattord
- Publisher
- Course Technology
- Year
- 2013
- Tongue
- English
- Leaves
- 546
- Edition
- 4
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
HANDS-ON INFORMATION SECURITY LAB MANUAL, Fourth Edition, helps you hone essential information security skills by applying your knowledge to detailed, realistic exercises using Microsoftยฎ Windowsยฎ 2000, Windows XP, Windows 7, and Linux. This wide-ranging, non-certification-based lab manual includes coverage of scanning, OS vulnerability analysis and resolution, firewalls, security maintenance, forensics, and more. The Fourth Edition includes new introductory labs focused on virtualization techniques and images, giving you valuable experience with some of the most important trends and practices in information security and networking today. All software necessary to complete the labs are either available online as a free download or included in the accompanying CD, making it easy to plan and complete lab work. An ideal resource for introductory, technical, and managerial courses or self-study, this versatile manual is a perfect supplement to the PRINCIPLES OF INFORMATION SECURITY, SECURITY FUNDAMENTALS, and MANAGEMENT OF INFORMATION SECURITY books.
โฆ Table of Contents
Contents
Ch 1: Information Security Process Flows
Flow 1.1: Firewalls
Flow 1.2: Remote Access Protection
Flow 1.3: Access Controls
Flow 1.4: Vulnerability Assessment
Flow 1.5: Penetration Testing
Flow 1.6: Forensics and Anti-Forensics
Flow 1.7: Client Security
Flow 1.8: Perimeter Defense
Flow 1.9: Server Security
Flow 1.10: Intrusion Detection
Flow 1.11: Network Security
Flow 1.12: Cyber Defense
References
Ch 2: Background and Theory for Lab Exercises
2.1: Footprinting
2.2: Scanning and Enumeration
2.3: OS Processes and Services
2.4: Vulnerability Identification and Research
2.5: Vulnerability Validation
2.6: Systems Remediation and Hardening
2.7: Web Browser Security and Configuration
2.8: Data Management
2.9: Data Backup and Recovery
2.10: Access Controls
2.11: Host-Based Intrusion Detection
2.12: Log Security
2.13: Privacy and Anti-Forensics
2.14: Software Firewalls
2.15: Linksys Firewall Routers and Access Points
2.16: Network Intrusion Detection
2.17: Network Traffic Analysis
2.18: Virtual Private Networks and Remote Access
2.19: Digital Certificates
2.20: Password Circumvention
2.21: Antivirus Defense
2.22: Bot Management and Defense
Ch 3: Windows Labs
Lab 3.0: Using VMware
Lab 3.1: Footprinting
Lab 3.2: Scanning and Enumeration
Lab 3.3: Windows OS Processes and Services
Lab 3.4: Vulnerability Identification and Research
Lab 3.5: Vulnerability Validation
Lab 3.6: System Remediation and Hardening
Lab 3.7: Windows Web Browser Security and Configuration
Lab 3.8: Data Management
Lab 3.9: Windows Data Backup and Recovery
Lab 3.10: Windows Access Controls
Lab 3.11: Windows Host Intrusion Detection
Lab 3.12: Windows Log Security Issues
Lab 3.13: Windows Privacy and Anti-Forensics Issues
Lab 3.14: Software Firewalls
Lab 3.15: Linksys Firewall Routers and Access Points
Lab 3.16: Network Intrusion Detection Systems
Lab 3.17: Network Traffic Analysis
Lab 3.18: Virtual Private Networks and Remote Access
Lab 3.19: Digital Certificates
Lab 3.20: Password Circumvention
Lab 3.21: Antivirus
Lab 3.22: Malware Prevention and Detection
Ch 4: Linux Labs
Lab 4.0: Using VMware
Lab 4.1: Footprinting
Lab 4.2: Scanning and Enumeration
Lab 4.3: OS Processes and Services
Lab 4.4: Vulnerability Identification and Research
Lab 4.5: Vulnerability Validation
Lab 4.6: System Remediation and Hardening
Lab 4.7: Web Browser Security
Lab 4.8: Data Management
Lab 4.9: Data Backup, Restore, and Recovery in Linux
Lab 4.10: Access Controls in Linux
Lab 4.11: Host Intrusion Detection in Linux
Lab 4.12: Log and Security in Linux
Lab 4.13: Linux Privacy and Anti-Forensics Issues
Lab 4.14: Software Firewalls
Lab 4.15: Linksys Firewall Routers and Access Points
Lab 4.16: Network Intrusion Detection Systems
Lab 4.17: Network Traffic Analysis
Lab 4.18: Virtual Private Networks and Remote Access
Lab 4.19: Digital Certificates
Lab 4.20: Password Circumvention in Linux
Lab 4.21: Antivirus in Linux
Lab 4.22: Malware Prevention and Detection
Index
๐ SIMILAR VOLUMES
<p><p>This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software. The experiments highlight key information security problems that arise in modern operating systems, networks, and
<p><p>This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software. The experiments highlight key information security problems that arise in modern operating systems, networks, and
This book has a lot of information on how to configure many security related setups using Cisco devices. Everything from simple AAA to SDM setup and point to point VPNs. Anyone interested in learning the necessary commands for the IINS (CCNA Security) test should buy this book, read it, and practi
PE Press, 2015. - 119 p., English, ISBN 9781329144286, EPUB, 4,39 MB (+source code).<br/>This book helps you to get started with ARM mbed development. Several codes samples are provided to illustrate how to work with ARM mbed boards using online mbed Compiler. The following is highlight topics in th
Written by leading IT security educators, this fully updated Lab Manual supplements "Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition" "Principles of Computer Security Lab Manual, Second Edition," contains more than 30 labs that challenge you to solve real-world problems