Fr. 86.00

Principles of Computer Security - Lab Manual

Inglese · Tascabile

Spedizione di solito entro 3 a 5 settimane

Descrizione

Ulteriori informazioni










Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Practice the Computer Security Skills You Need to Succeed!

40+ lab exercises challenge you to solve problems based on realistic case studies

Step-by-step scenarios require you to think critically

Lab analysis tests measure your understanding of lab results

Key term quizzes help build your vocabulary

Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines

In this Lab Manual, you'll practice

Configuring workstation network connectivity

Analyzing network communication

Establishing secure network application communication using TCP/IP protocols

Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools

Defending against network application attacks, including SQL injection, web browser exploits, and email attacks

Combatting Trojans, man-in-the-middle attacks, and steganography

Hardening a host computer, using antivirus applications, and configuring firewalls

Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec

Preparing for and detecting attacks

Backing up and restoring data

Handling digital forensics and incident response

Instructor resources available:

This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately

Virtual machine files

Solutions to the labs are not included in the book and are only available to adopting instructors

Sommario










Part I: Networking Basics: How Do Networks Work
1. Workstation Network Con¿guration and Connectivity
2. Network Transports
3. Network Applications
Part II: Vulnerabilities and Threats--How Can Systems Be Compromised
4. Penetration Testing
5. Attacks--Attacks Against Applications
6. Escalating Privilege--Sniffing, Keylogging, Password-Cracking Attacks
Part III: Prevention: How Do We Prevent Harm to Systems
7. Hardening the Host Computer
8. Securing Network Communications
Part IV: Detection and Response: How Do We Detect and Respond to Attacks
9. Preparing for and Detecting Attacks
10. Digital Forensics

Info autore

Vince Nestler (Pocatello, ID), CompTIA Security+, is an Adjunct Professor of network security at Capitol College. Nestler is an instructional design expert with seven years of experience developing security related labs. He is the coauthor of the first editon of Principles of Computer Security: Security+ and Beyond Lab Manual.

Matthew Hirsch, M.S. Network Security, Capitol College; B.A. Physics, State University of New York (SUNY) New Paltz. Mr. Hirsch has worked in the information security operations group for a large financial firm (which prefers to remain unnamed), data distribution for firms including Deutsche Bank and Sanwa Securities, and systems / network administration for Market Arts Software. Formerly an adjunct professor at Capitol College, Katharine Gibbs school, and DeVry, Mr. Hirsch also enjoys a long term association with Dorsai, a New York City non-profit ISP/Hosting firm.

Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklin’s interests are information security, systems theory, and secure software design.

Riassunto

Written by leading IT security educators and featuring 40 challenging labs, this fully updated lab manual supplements Principles of Computer Security, Fourth Edition.

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.