Computer Security Lab Manual

Paperback
from $0.00

Author: Vincent J. Nestler

ISBN-10: 0072255080

ISBN-13: 9780072255089

Category: Databases Security

This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and detection and incident response. This book reinforces Security+ certification objectives and prepares students to work in the real world by applying networking concepts to solve real business problems.\ This lab manual is suitable to accompany...

Search in google:

This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and detection and incident response. This book reinforces Security+ certification objectives and prepares students to work in the real world by applying networking concepts to solve real business problems.This lab manual is suitable to accompany any security textbook, but an appendix maps the labs specifically for easy use with McGraw-Hill textbooks, Principles of Computer Security: Security+ and Beyond and Fundamentals of Network Security.

Section 1 Networking Basics – How do networks work?Chapter 1 Workstation Network Configuration and ConnectivityChapter 2 TCP/UDP BasicsChapter 3 Network ApplicationsSection 2 – Vulnerabilities and Threats – How can networks be compromised? Chapter 4 Scanning and Enumerating the Network for TargetsChapter 5 Attacks-Web Server, Email, DOS and Trojan AttacksChapter 6 Escalating Privilege-Sniffing, Keylogging, Password Cracking AttacksSection 3 – Prevention – How do we prevent Harm to Networks? Chapter 7 Hardening the Host ComputerChapter 8 Securing Network CommunicationsSection 4 – Detection and Response – How do we detect and respond to attacks? Chapter 9 Preparing for and Detecting AttacksChapter 10 – Digital ForensicsAppendix - Lab Setup Instructions