CART

(0) items

Lab Manual for Security+ Guide to Networking Security Fundamentals, 2nd,9780619215361
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Lab Manual for Security+ Guide to Networking Security Fundamentals, 2nd

by
Edition:
2nd
ISBN13:

9780619215361

ISBN10:
0619215364
Format:
Paperback
Pub. Date:
8/19/2004
Publisher(s):
Cengage Learning
List Price: $85.66
More New and Used
from Private Sellers
Starting at $0.01
See Prices

Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

New Textbook

We're Sorry
Sold Out

Related Products


  • Lab Manual for Ciampa's Security+ Guide to Network Security Fundamentals, 3rd
    Lab Manual for Ciampa's Security+ Guide to Network Security Fundamentals, 3rd
  • Lab Manual for Ciampa's Security+ Guide to Network Security Fundamentals, 4th
    Lab Manual for Ciampa's Security+ Guide to Network Security Fundamentals, 4th
  • Lab Manual: Security+ Guide To Network Security Fundamntl 1
    Lab Manual: Security+ Guide To Network Security Fundamntl 1




Summary

This lab manual, when used with the main text, "Security+ Guide to Network Security Fundamentals, Second Edition" will maximize students' successes on CompTIA's Security+ certification exam.

Table of Contents

Introduction ix
Information Security Fundamentals
1(10)
Risk Analysis---Definition of Assets
2(2)
Risk Analysis---Threat Assessment
4(3)
Risk Analysis---Risk Assessment
7(2)
Risk Analysis---Recommendations
9(2)
Attackers and Their Attacks
11(14)
Using the At Command to Start System Processes
12(3)
Researching DoS and DDoS Attacks
15(2)
Researching the CPUHOG DoS Attack
17(2)
Researching the NetBus Trojan Horse
19(2)
Removing NetBus from an Infected System
21(4)
Security Basics
25(18)
Using the Windows Server 2003 Local Password Policy Settings for Length
26(3)
Using the Windows Server 2003 Password Policy Settings for Complexity
29(3)
Preventing the Display of the Last Logon Name
32(3)
Setting an Account Lockout Policy
35(4)
Using the Run As Command to Bypass Security
39(4)
Security Baselines
43(18)
Defining Security Templates in Windows Server 2003
44(4)
Managing Windows Server 2003 Security Templates
48(3)
Protecting the System Accounts Database
51(2)
Configuring Services and Processes
53(3)
Configuring Network Settings
56(5)
Securing the Network Infrastructure
61(22)
Installing Snort on Windows-based Systems
62(2)
Capturing Packets with Snort
64(4)
Creating a Snort Rule Set
68(4)
Using IDScenter as a Front End for Snort
72(6)
Creating a Simple Honeypot
78(5)
Protecting Basic Communications
83(22)
Configuring Internet Explorer Security
84(3)
Configuring Internet Explorer Privacy
87(5)
Configuring Internet Explorer Content Filtering
92(5)
Configuring Internet Explorer Advanced Security Settings
97(3)
Manually Blocking Web Sites and Pop-ups
100(5)
Protecting Advanced Communications
105(38)
Enabling Dial-in Access
106(2)
Configuring a Windows Server 2003 VPN Server
108(3)
Using PPTP to Connect to a VPN Server
111(2)
Configuring a Remote Access Policy
113(5)
Configuring a Wireless Access Point
118(7)
Installing the Cisco Aironet 350 Wireless Access Point
125(4)
Disabling Telnet Access to the Aironet WAP
129(3)
Enabling the Aironet User Manager
132(4)
Adding Administrative Users to the Aironet
136(2)
Restoring the Aironet Factory Default Settings
138(5)
Scrambling through Cryptography
143(18)
Using NTFS to Secure Local Resources
144(2)
Ensuring Data Confidentiality
146(4)
Ensuring Data Availability
150(4)
Ensuring Data Integrity
154(2)
Encrypting Data
156(5)
Using and Managing Keys
161(18)
Installing a Certificate Server
162(3)
Installing a Client Certificate
165(5)
Administering a Certificate Server
170(3)
Managing Personal Certificates
173(2)
Managing Certificate Revocation
175(4)
Operational Security
179(10)
Establishing Physical Barriers
180(2)
Using Biometrics
182(2)
Managing the Environment
184(2)
Understanding Social Engineering
186(3)
Policies and Procedures
189(12)
Creating Security Policies (Remote Access)
190(3)
Creating Security Policies (Regulations)
193(2)
Performing Risk Analysis
195(6)
Security Management
201(10)
Online Research---Awareness
202(1)
Online Research---Education
203(2)
Online Research---Standards and Guidelines
205(2)
Online Research---Classification
207(2)
Online Research---Retention and Storage
209(2)
Advanced Security and Beyond
211(14)
Transferring NTFS Encrypted Files
212(3)
Installing ZDelete and Restorer2000
215(4)
Using ZDelete Disk Wiper and Restorer2000
219(3)
Installing Microsoft Network Monitor
222(3)
Using Microsoft Network Monitor to Sniff an FTP Session
225


Please wait while the item is added to your cart...