Computer Security Lab Manual / Edition 1by Vincent Nestler, Wm. Arthur Conklin, Gregory White, Matthew Hirsch
Pub. Date: 06/22/2005
Publisher: McGraw-Hill Higher Education
This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and detection and incident response. This book reinforces Security+ certification objectives and prepares students to work… See more details below
This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and detection and incident response. This book reinforces Security+ certification objectives and prepares students to work in the real world by applying networking concepts to solve real business problems.
This lab manual is suitable to accompany any security textbook, but an appendix maps the labs specifically for easy use with McGraw-Hill textbooks, Principles of Computer Security: Security+ and Beyond and Fundamentals of Network Security.
Table of Contents
Section 1 Networking Basics – How do networks work? Chapter 1 Workstation Network Configuration and ConnectivityChapter 2 TCP/UDP BasicsChapter 3 Network ApplicationsSection 2 – Vulnerabilities and Threats – How can networks be compromised? Chapter 4 Scanning and Enumerating the Network for TargetsChapter 5 Attacks-Web Server, Email, DOS and Trojan AttacksChapter 6 Escalating Privilege-Sniffing, Keylogging, Password Cracking AttacksSection 3 – Prevention – How do we prevent Harm to Networks? Chapter 7 Hardening the Host ComputerChapter 8 Securing Network CommunicationsSection 4 – Detection and Response – How do we detect and respond to attacks? Chapter 9 Preparing for and Detecting AttacksChapter 10 – Digital ForensicsAppendix - Lab Setup Instructions
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >
This book is an excellent resource for anyone interested in the information security field. Not only do the authors walk you through each lab step by step, they also explain what you are doing and why it is important. Additionally, they provide you with information on how to obtain the tools required for each lab, which can be done in both Linux and Windows environments. The book also provides additional projects to try for yourself if any of the topics arouse your interest. Kudos to Mr. Hirsch and Mr. Nestler for their input in this excellent book. As a former student of theirs, I can say that they are great Network Security instructors and I've learned a great deal from their classes and now, this book.