did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780619215361

Lab Manual for Security+ Guide to Networking Security Fundamentals, 2nd

by
  • ISBN13:

    9780619215361

  • ISBN10:

    0619215364

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2004-08-19
  • Publisher: Course Technology
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $99.00

Summary

This lab manual, when used with the main text, "Security+ Guide to Network Security Fundamentals, Second Edition" will maximize students' successes on CompTIA's Security+ certification exam.

Table of Contents

Introduction ix
Information Security Fundamentals
1(10)
Risk Analysis---Definition of Assets
2(2)
Risk Analysis---Threat Assessment
4(3)
Risk Analysis---Risk Assessment
7(2)
Risk Analysis---Recommendations
9(2)
Attackers and Their Attacks
11(14)
Using the At Command to Start System Processes
12(3)
Researching DoS and DDoS Attacks
15(2)
Researching the CPUHOG DoS Attack
17(2)
Researching the NetBus Trojan Horse
19(2)
Removing NetBus from an Infected System
21(4)
Security Basics
25(18)
Using the Windows Server 2003 Local Password Policy Settings for Length
26(3)
Using the Windows Server 2003 Password Policy Settings for Complexity
29(3)
Preventing the Display of the Last Logon Name
32(3)
Setting an Account Lockout Policy
35(4)
Using the Run As Command to Bypass Security
39(4)
Security Baselines
43(18)
Defining Security Templates in Windows Server 2003
44(4)
Managing Windows Server 2003 Security Templates
48(3)
Protecting the System Accounts Database
51(2)
Configuring Services and Processes
53(3)
Configuring Network Settings
56(5)
Securing the Network Infrastructure
61(22)
Installing Snort on Windows-based Systems
62(2)
Capturing Packets with Snort
64(4)
Creating a Snort Rule Set
68(4)
Using IDScenter as a Front End for Snort
72(6)
Creating a Simple Honeypot
78(5)
Protecting Basic Communications
83(22)
Configuring Internet Explorer Security
84(3)
Configuring Internet Explorer Privacy
87(5)
Configuring Internet Explorer Content Filtering
92(5)
Configuring Internet Explorer Advanced Security Settings
97(3)
Manually Blocking Web Sites and Pop-ups
100(5)
Protecting Advanced Communications
105(38)
Enabling Dial-in Access
106(2)
Configuring a Windows Server 2003 VPN Server
108(3)
Using PPTP to Connect to a VPN Server
111(2)
Configuring a Remote Access Policy
113(5)
Configuring a Wireless Access Point
118(7)
Installing the Cisco Aironet 350 Wireless Access Point
125(4)
Disabling Telnet Access to the Aironet WAP
129(3)
Enabling the Aironet User Manager
132(4)
Adding Administrative Users to the Aironet
136(2)
Restoring the Aironet Factory Default Settings
138(5)
Scrambling through Cryptography
143(18)
Using NTFS to Secure Local Resources
144(2)
Ensuring Data Confidentiality
146(4)
Ensuring Data Availability
150(4)
Ensuring Data Integrity
154(2)
Encrypting Data
156(5)
Using and Managing Keys
161(18)
Installing a Certificate Server
162(3)
Installing a Client Certificate
165(5)
Administering a Certificate Server
170(3)
Managing Personal Certificates
173(2)
Managing Certificate Revocation
175(4)
Operational Security
179(10)
Establishing Physical Barriers
180(2)
Using Biometrics
182(2)
Managing the Environment
184(2)
Understanding Social Engineering
186(3)
Policies and Procedures
189(12)
Creating Security Policies (Remote Access)
190(3)
Creating Security Policies (Regulations)
193(2)
Performing Risk Analysis
195(6)
Security Management
201(10)
Online Research---Awareness
202(1)
Online Research---Education
203(2)
Online Research---Standards and Guidelines
205(2)
Online Research---Classification
207(2)
Online Research---Retention and Storage
209(2)
Advanced Security and Beyond
211(14)
Transferring NTFS Encrypted Files
212(3)
Installing ZDelete and Restorer2000
215(4)
Using ZDelete Disk Wiper and Restorer2000
219(3)
Installing Microsoft Network Monitor
222(3)
Using Microsoft Network Monitor to Sniff an FTP Session
225

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program