๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Hands-On Information Security Lab Manual

โœ Scribed by Andrew Green, Michael Whitman, Herbert Mattord


Publisher
Course Technology
Year
2013
Tongue
English
Leaves
546
Edition
4
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


HANDS-ON INFORMATION SECURITY LAB MANUAL, Fourth Edition, helps you hone essential information security skills by applying your knowledge to detailed, realistic exercises using Microsoftยฎ Windowsยฎ 2000, Windows XP, Windows 7, and Linux. This wide-ranging, non-certification-based lab manual includes coverage of scanning, OS vulnerability analysis and resolution, firewalls, security maintenance, forensics, and more. The Fourth Edition includes new introductory labs focused on virtualization techniques and images, giving you valuable experience with some of the most important trends and practices in information security and networking today. All software necessary to complete the labs are either available online as a free download or included in the accompanying CD, making it easy to plan and complete lab work. An ideal resource for introductory, technical, and managerial courses or self-study, this versatile manual is a perfect supplement to the PRINCIPLES OF INFORMATION SECURITY, SECURITY FUNDAMENTALS, and MANAGEMENT OF INFORMATION SECURITY books.

โœฆ Table of Contents


Contents
Ch 1: Information Security Process Flows
Flow 1.1: Firewalls
Flow 1.2: Remote Access Protection
Flow 1.3: Access Controls
Flow 1.4: Vulnerability Assessment
Flow 1.5: Penetration Testing
Flow 1.6: Forensics and Anti-Forensics
Flow 1.7: Client Security
Flow 1.8: Perimeter Defense
Flow 1.9: Server Security
Flow 1.10: Intrusion Detection
Flow 1.11: Network Security
Flow 1.12: Cyber Defense
References
Ch 2: Background and Theory for Lab Exercises
2.1: Footprinting
2.2: Scanning and Enumeration
2.3: OS Processes and Services
2.4: Vulnerability Identification and Research
2.5: Vulnerability Validation
2.6: Systems Remediation and Hardening
2.7: Web Browser Security and Configuration
2.8: Data Management
2.9: Data Backup and Recovery
2.10: Access Controls
2.11: Host-Based Intrusion Detection
2.12: Log Security
2.13: Privacy and Anti-Forensics
2.14: Software Firewalls
2.15: Linksys Firewall Routers and Access Points
2.16: Network Intrusion Detection
2.17: Network Traffic Analysis
2.18: Virtual Private Networks and Remote Access
2.19: Digital Certificates
2.20: Password Circumvention
2.21: Antivirus Defense
2.22: Bot Management and Defense
Ch 3: Windows Labs
Lab 3.0: Using VMware
Lab 3.1: Footprinting
Lab 3.2: Scanning and Enumeration
Lab 3.3: Windows OS Processes and Services
Lab 3.4: Vulnerability Identification and Research
Lab 3.5: Vulnerability Validation
Lab 3.6: System Remediation and Hardening
Lab 3.7: Windows Web Browser Security and Configuration
Lab 3.8: Data Management
Lab 3.9: Windows Data Backup and Recovery
Lab 3.10: Windows Access Controls
Lab 3.11: Windows Host Intrusion Detection
Lab 3.12: Windows Log Security Issues
Lab 3.13: Windows Privacy and Anti-Forensics Issues
Lab 3.14: Software Firewalls
Lab 3.15: Linksys Firewall Routers and Access Points
Lab 3.16: Network Intrusion Detection Systems
Lab 3.17: Network Traffic Analysis
Lab 3.18: Virtual Private Networks and Remote Access
Lab 3.19: Digital Certificates
Lab 3.20: Password Circumvention
Lab 3.21: Antivirus
Lab 3.22: Malware Prevention and Detection
Ch 4: Linux Labs
Lab 4.0: Using VMware
Lab 4.1: Footprinting
Lab 4.2: Scanning and Enumeration
Lab 4.3: OS Processes and Services
Lab 4.4: Vulnerability Identification and Research
Lab 4.5: Vulnerability Validation
Lab 4.6: System Remediation and Hardening
Lab 4.7: Web Browser Security
Lab 4.8: Data Management
Lab 4.9: Data Backup, Restore, and Recovery in Linux
Lab 4.10: Access Controls in Linux
Lab 4.11: Host Intrusion Detection in Linux
Lab 4.12: Log and Security in Linux
Lab 4.13: Linux Privacy and Anti-Forensics Issues
Lab 4.14: Software Firewalls
Lab 4.15: Linksys Firewall Routers and Access Points
Lab 4.16: Network Intrusion Detection Systems
Lab 4.17: Network Traffic Analysis
Lab 4.18: Virtual Private Networks and Remote Access
Lab 4.19: Digital Certificates
Lab 4.20: Password Circumvention in Linux
Lab 4.21: Antivirus in Linux
Lab 4.22: Malware Prevention and Detection
Index


๐Ÿ“œ SIMILAR VOLUMES


The Hands-on XBEE Lab Manual
๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› Newnes ๐ŸŒ English

</div><div class='box-content'><ul><li><p><span class=''review_text''><P/><IT>''For communications systems engineers and designers, this guide to the Digi International XBee radio communication modules provides practical instruction on real world uses of this robust collection of communications prod

Applied Information Security: A Hands-on
โœ David Basin, Patrick Schaller, Michael Schlรคpfer (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<p><p>This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software. The experiments highlight key information security problems that arise in modern operating systems, networks, and

Applied Information Security: A Hands-on
โœ David Basin, Patrick Schaller, Michael Schlรคpfer (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<p><p>This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software. The experiments highlight key information security problems that arise in modern operating systems, networks, and

CCNA Security Lab Manual
โœ Cisco Networking Academy ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Cisco Press ๐ŸŒ English

This book has a lot of information on how to configure many security related setups using Cisco devices. Everything from simple AAA to SDM setup and point to point VPNs. Anyone interested in learning the necessary commands for the IINS (CCNA Security) test should buy this book, read it, and practi

The Hands-on ARM mbed Development Lab Ma
โœ Kurniawan A. ๐Ÿ“‚ Library ๐ŸŒ English

PE Press, 2015. - 119 p., English, ISBN 9781329144286, EPUB, 4,39 MB (+source code).<br/>This book helps you to get started with ARM mbed development. Several codes samples are provided to illustrate how to work with ARM mbed boards using online mbed Compiler. The following is highlight topics in th

Principles of Computer Security Comptia
โœ Nestler, Vincent;White, Gregory B;Conklin, William Arthur;Hirsch, Matthew ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› McGraw-Hill/Osborne Media ๐ŸŒ English

Written by leading IT security educators, this fully updated Lab Manual supplements "Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition" "Principles of Computer Security Lab Manual, Second Edition," contains more than 30 labs that challenge you to solve real-world problems