9780071748568

Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition

by ; ; ; ;
  • ISBN13:

    9780071748568

  • ISBN10:

    0071748563

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 12/30/2010
  • Publisher: McGraw-Hill Osborne Media
  • View Upgraded Edition
  • Get Rewarded for Ordering Your Textbooks! Enroll Now

Supplemental Materials

What is included with this book?

  • The bShowEBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

Written by leading IT security educators, this fully updated Lab Manual supplementsPrinciples of Computer Security: CompTIA Security+ and Beyond, Second EditionPrinciples of Computer Security Lab Manual, Second Edition, contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence toPrinciples of Computer Security: CompTIA Security+ and Beyond, Second Edition.The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the Key Term Quiz helps to build vocabulary.Principles of Computer Security Lab Manual, Second Edition, features: New, more dynamic design and a larger trim size The real-world, hands-on practice you need to pass the certification exam and succeed on the job Lab solutions on the textbook OLC (Online Learning Center)All-inclusive coverage: Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy

Table of Contents

Part I: Networking Basics: How Do Networks Work?
Chapter 1: Workstation Network Configuration and Connectivity
Chapter 2: TCP/UDP Basics
Chapter 3: Network Applications
Part II: Vulnerabilities and Threats - How Can Systems Be Compromised?
Chapter 4: Scanning and Enumerating the Network for Targets
Chapter 5: Attacks—Web Server, E-mail, DOS, and Trojan Attacks
Chapter 6: Escalating Privilege— Sniffing, Keylogging, Password-Cracking Attacks
Part III: Prevention: How Do We Prevent Harm to Systems?
Chapter 7: Hardening the Host Computer
Chapter 8: Securing Network Communications
Part IV: Detection and Response: How Do We Detect and Respond to Attacks?
Chapter 9: Preparing for and Detecting Attacks
Chapter 10: Digital Forensics

Rewards Program

Write a Review