Principles of Computer Security Lab Manual, 4th Edition
- Length: 432 pages
- Edition: 4
- Language: English
- Publisher: McGraw-Hill Osborne Media
- Publication Date: 2014-10-31
- ISBN-10: 0071836551
- ISBN-13: 9780071836555
- Sales Rank: #298960 (See Top 100 Books)
Description
Practice the Computer Security Skills You Need to Succeed!
- 40+ lab exercises challenge you to solve problems based on realistic case studies
- Step-by-step scenarios require you to think critically
- Lab analysis tests measure your understanding of lab results
- Lab analysis tests measure your understanding of lab results
- Key term quizzes help build your vocabulary
In this Lab Manual, you’ll practice
- Configuring workstation network connectivity
- Analyzing network communication
- Establishing secure network application communication using TCP/IP protocols
- Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools
- Defending against network application attacks, including SQL injection, web browser exploits, and email attacks
- Combatting Trojans, man-in-the-middle attacks, and steganography
- Hardening a host computer, using antivirus applications, and configuring firewalls
- Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec
- Preparing for and detecting attacks
- Backing up and restoring data
- Handling digital forensics and incident response
Table of Contents
Part I Networking Basics: How Do Networks Work?
Chapter 1 Workstation Network Configuration And Connectivity
Chapter 2 Network Transports
Chapter 3 Network Applications
Part II Vulnerabilities And Threats: How Can Systems Be Compromised?
Chapter 4 Penetration Testing
Chapter 5 Attacks Against Applications
Chapter 6 More Attacks: Trojan Attacks, Mitm, Steganography
Part III Prevention: How Do You Prevent Harm To Networks?
Chapter 7 Hardening The Host Computer
Chapter 8 Securing Network Communications
Part IV Detection And Response: How Do You Detect And Respond To Attacks?
Chapter 9 Preparing For And Detecting Attacks
Chapter 10 Digital Forensics
Appendix Objectives Map: Comptia Security+™
Free ChaptersTry Audible and Get Two Free Audiobooks »
To access the link, solve the captcha.
Recommended BooksMore Similar Books »
Ransomware Analysis: Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence
2024-11-13