Principles of Computer Security Lab Manual, 4th Edition
- Length: 432 pages
- Edition: 4
- Language: English
- Publisher: McGraw-Hill Osborne Media
- Publication Date: 2014-10-31
- ISBN-10: 0071836551
- ISBN-13: 9780071836555
- Sales Rank: #298960 (See Top 100 Books)
Practice the Computer Security Skills You Need to Succeed!
- 40+ lab exercises challenge you to solve problems based on realistic case studies
- Step-by-step scenarios require you to think critically
- Lab analysis tests measure your understanding of lab results
- Lab analysis tests measure your understanding of lab results
- Key term quizzes help build your vocabulary
In this Lab Manual, you’ll practice
- Configuring workstation network connectivity
- Analyzing network communication
- Establishing secure network application communication using TCP/IP protocols
- Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools
- Defending against network application attacks, including SQL injection, web browser exploits, and email attacks
- Combatting Trojans, man-in-the-middle attacks, and steganography
- Hardening a host computer, using antivirus applications, and configuring firewalls
- Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec
- Preparing for and detecting attacks
- Backing up and restoring data
- Handling digital forensics and incident response
Table of Contents
Part I Networking Basics: How Do Networks Work?
Chapter 1 Workstation Network Configuration And Connectivity
Chapter 2 Network Transports
Chapter 3 Network Applications
Part II Vulnerabilities And Threats: How Can Systems Be Compromised?
Chapter 4 Penetration Testing
Chapter 5 Attacks Against Applications
Chapter 6 More Attacks: Trojan Attacks, Mitm, Steganography
Part III Prevention: How Do You Prevent Harm To Networks?
Chapter 7 Hardening The Host Computer
Chapter 8 Securing Network Communications
Part IV Detection And Response: How Do You Detect And Respond To Attacks?
Chapter 9 Preparing For And Detecting Attacks
Chapter 10 Digital Forensics
Appendix Objectives Map: Comptia Security+™
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.