- Shopping Bag ( 0 items )
Guide to Hardening a Network Infrastructure is the first of two books that are required for Level One of the Security Certified Program (SCP). This book maps clearly to the exam objectives for the current Security Certified Network Professional (SCNP) exam. Designed to help students develop beyond the Security+ certification, this book provides a solid foundation in network security fundamentals but assumes familiarity with basic concepts. This book focuses on how to protect a range of different operating systems against attacks, how to develop more effective security strategies, and how to handle emergencies. Case Projects and Hands-On Projects help readers practice their new skills, and expose them to the day-to-day duties of a security professional. Benefits:
• Maps completely to objectives for the Security Certified Network Professional (SCNP) SCO-411 certification exam.
• Provides in-chapter activities to help students immediately apply what they've learned about techniques and concepts.
• Includes a running case project about a hypothetical company that builds throughout the book to create a cumulative network defense strategy.
• Offers a mapping grid for the certification exam.
• Features extensive learning tools, including Chapter Summaries, Key Terms and Definitions, Review Questions, Hands-On Projects, and Case Projects, which allow students to practice skills as they are learned.
Chapter 1: Business Continuity and Contingency Planning Chapter 2: TCP/IP Concepts Chapter 3: Attack Tools and Techniques Chapter 4: Cisco Router Fundamentals Chapter 5: Cisco Router Security Fundamentals Chapter 6: Windows 2000 Security Fundamentals Chapter 7: Windows 2000 Security Configuration Tools Chapter 8: Windows 2000 Network and Resource Security Chapter 9: Fundamental Linux Security Chapter 10: Securing the Infrastructure Chapter 11:Upgrading Your Windows 2000 Network to Windows Server 2003 Appendix A: SC0-411 Exam Objectives cross referenced to chapter coverage Appendix B: Common Cisco Router command summary Appendix C: Additional Resources