Written by leading IT security educators, this fully updated Lab Manual supplements Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition Principles of Computer Security Lab Manual, Second Edition, contains more than 30 labs that challenge you to solve real-world problems wit
Principles of Computer Security Comptia Security+ and Beyondprinciples of Computer Security Comptia Security+ and Beyond Lab Manual Lab Manual
โ Scribed by Nestler, Vincent;White, Gregory B;Conklin, William Arthur;Hirsch, Matthew
- Publisher
- McGraw-Hill/Osborne Media
- Year
- 2011
- Tongue
- English
- Leaves
- 353
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Written by leading IT security educators, this fully updated Lab Manual supplements "Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition" "Principles of Computer Security Lab Manual, Second Edition," contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence to "Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition."
The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the Key Term Quiz helps to build vocabulary.
"Principles of Computer Security Lab Manual, Second Edition," features: New, more dynamic design and a larger trim size The real-world, hands-on practice you need to pass the certification exam and succeed on the job Lab solutions on the textbook OLC (Online Learning Center)
All-inclusive coverage:
Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy
โฆ Table of Contents
Cover......Page 1
Principles of Computer Security: CompTIA Security+โข and Beyond Lab Manual......Page 2
ยฉ......Page 3
About the Authors......Page 5
About the Technical Editor......Page 6
Contents at a Glance......Page 8
Contents......Page 10
Acknowledgments......Page 16
Introduction......Page 17
Additional Resources for Teachers......Page 21
Part I: Networking Basics: How Do Networks Work?......Page 22
Chapter 1 Workstation Network Configuration and Connectivity......Page 24
Lab 1.1: Network Workstation Client Configuration......Page 26
Lab 1.2: Computer Name Resolution......Page 40
Lab 1.3: IPv6 Basics......Page 47
Chapter 2 Network Transports......Page 56
Lab 2.1: Network Communication Analysis......Page 57
Lab 2.2: Port Connection Status......Page 70
Chapter 3 Network Applications......Page 80
Lab 3.1: FTP Communication (FTP-HTTP)......Page 81
Lab 3.2: E-Mail Protocols: SMTP and POP3......Page 92
Part II: Vulnerabilities and Threats: How Can Systems Be Compromised?......Page 104
Chapter 4 Penetration Testing......Page 106
Lab 4.1: IP Address and Port Scanning, Service Identity Determination......Page 107
Lab 4.2: GUI-Based Vulnerability Scanners......Page 117
Lab 4.3: Researching System Vulnerabilities......Page 124
Lab 4.4: Using Metasploit......Page 128
Lab 4.5: Password Cracking......Page 134
Chapter 5 Attacks Against Applications......Page 142
Lab 5.1: Web SQL Injection......Page 143
Lab 5.2: Web Browser Exploits......Page 148
Lab 5.3: E-Mail System Exploits......Page 153
Chapter 6 More Attacks: Trojan Attacks, MITM, Steganography......Page 162
Lab 6.1: Trojan Attacks......Page 163
Lab 6.2: Man-in-the-Middle Attack......Page 171
Lab 6.3: Steganography......Page 179
Part III: Prevention: How Do We Prevent Harm To Networks?......Page 186
Chapter 7 Hardening The Host Computer......Page 188
Lab 7.1: Hardening the Operating System......Page 189
Lab 7.2: Using Antivirus Applications......Page 201
Lab 7.3: Using Firewalls......Page 207
Chapter 8 Securing Network Communications......Page 212
Lab 8.1: Using GPG to Encrypt and Sign E-Mail......Page 213
Lab 8.2: Using Secure Shell (SSH)......Page 229
Lab 8.3: Using Secure Copy (SCP)......Page 241
Lab 8.4: Using Certificates and SSL......Page 253
Lab 8.5: Using IPsec......Page 263
Part IV: Detection and Response: How Do We Detect and Respond to Attacks?......Page 274
Chapter 9 Preparing for and Detecting Attacks......Page 276
Lab 9.1: System Log Analysis......Page 277
Lab 9.2: Intrusion Detection Systems......Page 290
Lab 9.3: Backing Up and Restoring Data......Page 303
Chapter 10 Digital Forensics......Page 322
Lab 10.1: Live Analysis: Incident Determination......Page 324
Lab 10.2: Acquiring the Data......Page 330
Lab 10.3: Forensic Analysis......Page 335
B......Page 342
C......Page 343
E......Page 344
G......Page 345
I......Page 346
M......Page 347
N......Page 348
P......Page 349
S......Page 350
W......Page 352
X......Page 353
๐ SIMILAR VOLUMES
<h4>Written by leading IT security educators, this fully updated Lab Manual supplements Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition </h4> <p> Principles of Computer Security Lab Manual, Second Edition , contains more than 30 labs that challenge you to solve real
<p><strong>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.</strong><br><br><strong>Practice the Skills Essential for a Successful Career in Cybersecurity</stro
Practice the Skills Essential for a Successful Career in Cybersecurity! This hands-on guide contains more than 90 labs that challenge you to solve real-world problems and help you to master key cybersecurity concepts. Clear, measurable lab results map to exam objectives, offering direct correlation
<span><p><strong>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.</strong><br> <br> <strong>Practice the Skills Essential for a Successful Career in Cybersecuri