Build Your Own Security Lab: A Field Guide for Network Testing

Paperback
from $0.00

Author: Michael Gregg

ISBN-10: 0470179864

ISBN-13: 9780470179864

Category: Security - Computer Networks

If your job is to design or implement IT security solutions or if you’re studying for any security certification, this is the how-to guide you’ve been looking for. Here’s how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.\ Note: CD-ROM/DVD and other...

Search in google:

Many books tell you what to do. This one tells you how. If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future. Collect the necessary hardware and software and assemble your own network lab Configure a bootable Linux CD Explore various methods for gathering information about existing security Identify automated attack and penetration tools Understand cryptographic systems and encryption and authentication attacks Learn to find, identify, and defeat malware Address the special protection needs of wireless systems Use Snort® to build an IDS that will help to detect and identify attacks in real time DVD includes tools for actually building and implementing security solutions Open source tools Demo software A bootable version of Linux

Ch. 1 Hardware and Gear 1Ch. 2 Building a Software Test Platform 31Ch. 3 Passive Information Gathering 63Ch. 4 Detecting Live Systems 105Ch. 5 Enumerating Systems 149Ch. 6 Automated Attack and Penetration Tools 189Ch. 7 Understanding Cryptographic Systems 225Ch. 8 Defeating Malware 259Ch. 9 Securing Wireless Systems 291Ch. 10 Intrusion Detection 325Ch. 11 Forensic Detection 365App. A About the DVD 405Index 409