๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Principles of Computer Security Comptia Security+ and Beyondprinciples of Computer Security Comptia Security+ and Beyond Lab Manual Lab Manual

โœ Scribed by Nestler, Vincent;White, Gregory B;Conklin, William Arthur;Hirsch, Matthew


Publisher
McGraw-Hill/Osborne Media
Year
2011
Tongue
English
Leaves
353
Edition
2
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Written by leading IT security educators, this fully updated Lab Manual supplements "Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition" "Principles of Computer Security Lab Manual, Second Edition," contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence to "Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition."

The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the Key Term Quiz helps to build vocabulary.

"Principles of Computer Security Lab Manual, Second Edition," features: New, more dynamic design and a larger trim size The real-world, hands-on practice you need to pass the certification exam and succeed on the job Lab solutions on the textbook OLC (Online Learning Center)

All-inclusive coverage:
Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy

โœฆ Table of Contents


Cover......Page 1
Principles of Computer Security: CompTIA Security+โ„ข and Beyond Lab Manual......Page 2
ยฉ......Page 3
About the Authors......Page 5
About the Technical Editor......Page 6
Contents at a Glance......Page 8
Contents......Page 10
Acknowledgments......Page 16
Introduction......Page 17
Additional Resources for Teachers......Page 21
Part I: Networking Basics: How Do Networks Work?......Page 22
Chapter 1 Workstation Network Configuration and Connectivity......Page 24
Lab 1.1: Network Workstation Client Configuration......Page 26
Lab 1.2: Computer Name Resolution......Page 40
Lab 1.3: IPv6 Basics......Page 47
Chapter 2 Network Transports......Page 56
Lab 2.1: Network Communication Analysis......Page 57
Lab 2.2: Port Connection Status......Page 70
Chapter 3 Network Applications......Page 80
Lab 3.1: FTP Communication (FTP-HTTP)......Page 81
Lab 3.2: E-Mail Protocols: SMTP and POP3......Page 92
Part II: Vulnerabilities and Threats: How Can Systems Be Compromised?......Page 104
Chapter 4 Penetration Testing......Page 106
Lab 4.1: IP Address and Port Scanning, Service Identity Determination......Page 107
Lab 4.2: GUI-Based Vulnerability Scanners......Page 117
Lab 4.3: Researching System Vulnerabilities......Page 124
Lab 4.4: Using Metasploit......Page 128
Lab 4.5: Password Cracking......Page 134
Chapter 5 Attacks Against Applications......Page 142
Lab 5.1: Web SQL Injection......Page 143
Lab 5.2: Web Browser Exploits......Page 148
Lab 5.3: E-Mail System Exploits......Page 153
Chapter 6 More Attacks: Trojan Attacks, MITM, Steganography......Page 162
Lab 6.1: Trojan Attacks......Page 163
Lab 6.2: Man-in-the-Middle Attack......Page 171
Lab 6.3: Steganography......Page 179
Part III: Prevention: How Do We Prevent Harm To Networks?......Page 186
Chapter 7 Hardening The Host Computer......Page 188
Lab 7.1: Hardening the Operating System......Page 189
Lab 7.2: Using Antivirus Applications......Page 201
Lab 7.3: Using Firewalls......Page 207
Chapter 8 Securing Network Communications......Page 212
Lab 8.1: Using GPG to Encrypt and Sign E-Mail......Page 213
Lab 8.2: Using Secure Shell (SSH)......Page 229
Lab 8.3: Using Secure Copy (SCP)......Page 241
Lab 8.4: Using Certificates and SSL......Page 253
Lab 8.5: Using IPsec......Page 263
Part IV: Detection and Response: How Do We Detect and Respond to Attacks?......Page 274
Chapter 9 Preparing for and Detecting Attacks......Page 276
Lab 9.1: System Log Analysis......Page 277
Lab 9.2: Intrusion Detection Systems......Page 290
Lab 9.3: Backing Up and Restoring Data......Page 303
Chapter 10 Digital Forensics......Page 322
Lab 10.1: Live Analysis: Incident Determination......Page 324
Lab 10.2: Acquiring the Data......Page 330
Lab 10.3: Forensic Analysis......Page 335
B......Page 342
C......Page 343
E......Page 344
G......Page 345
I......Page 346
M......Page 347
N......Page 348
P......Page 349
S......Page 350
W......Page 352
X......Page 353


๐Ÿ“œ SIMILAR VOLUMES


Principles of Computer Security CompTIA
โœ Vincent J. Nestler, Gregory B. White, W. Arthur Conklin ๐Ÿ“‚ Library ๐Ÿ“… 2000 ๐Ÿ› Mcgraw-Hill Publ.Comp. ๐ŸŒ English

Written by leading IT security educators, this fully updated Lab Manual supplements Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition Principles of Computer Security Lab Manual, Second Edition, contains more than 30 labs that challenge you to solve real-world problems wit

Principles of Computer Security CompTIA
โœ Vincent Nestler, Gregory White, Wm. Arthur Conklin, Matthew Hirsch, Corey Schou ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› McGraw-Hill Osborne Media ๐ŸŒ English

<h4>Written by leading IT security educators, this fully updated Lab Manual supplements Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition </h4> <p> Principles of Computer Security Lab Manual, Second Edition , contains more than 30 labs that challenge you to solve real

Principles of Computer Security: CompTIA
โœ Jonathan Weissman ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› McGraw-Hill Education ๐ŸŒ English

<p><strong>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.</strong><br><br><strong>Practice the Skills Essential for a Successful Career in Cybersecurity</stro

Principles of Computer Security: CompTIA
โœ Jonathan S. Weissman ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› McGraw Hill Professional ๐ŸŒ English

Practice the Skills Essential for a Successful Career in Cybersecurity! This hands-on guide contains more than 90 labs that challenge you to solve real-world problems and help you to master key cybersecurity concepts. Clear, measurable lab results map to exam objectives, offering direct correlation

Principles of Computer Security: CompTIA
โœ Jonathan Weissman ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› McGraw Hill ๐ŸŒ English

<span><p><strong>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.</strong><br> <br> <strong>Practice the Skills Essential for a Successful Career in Cybersecuri