Skip to content

Security+ Guide to Network Security Fundamentals

ISBN-10: 1111640130

ISBN-13: 9781111640132

Edition: 4th 2012

Authors: Dean Farwood, Paul Cretaro

List price: $84.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The Laboratory Manual is a valuable tool designed to enhance your lab experience. Lab activities, objectives, materials lists, step-by-step procedures, illustrations, and review questions are commonly found in a Lab Manual.
Customers also bought

Book details

List price: $84.95
Edition: 4th
Copyright year: 2012
Publisher: Course Technology
Publication date: 8/15/2011
Binding: Paperback
Pages: 256
Size: 7.20" wide x 8.60" long x 0.80" tall
Weight: 1.210
Language: English

Introduction
Acknowledgments
Introduction to Security
Online Research: Certification
Online Research: Information Security Careers
Online Research: Sans Reading Room
Online Research: Which is the "Safest" Operating System?
Online Research: Defending Against Attacks
Malware and Social Engineering Attacks
Eicar Anti-Virus Test File
Remote Program Execution
Checking for Unsigned Programs
Validating a Downloaded Program
Installing Active Directory Domain Services
Application and Network Attacks
Getting Started with BackTracfc 4 R2
IP Spoofing with Hping2
ARP Poisoning
Man-in-the-Middle Attack
Getting Started with Metasploit
Vulnerability Assessment and Mitigating Attacks
Footprinting
Enumeration
Vulnerability Testing with Open VAS
Exploitation and Payload Delivery
Working with Meterpreter
Host, Application, and Data Security
Windows Server 2008 Security Configuration Wizard
Creating a Security Template
Analyzing Security Configurations
Applying Security Settings from a Security Template and Verifying System Compliance
Auditing Object Access
Network Security
Verifying the Integrity of the Hosts File
Installing the FTP Server Service and Wireshark
Capturing and Analyzing FTP Traffic
Capturing and Analyzing Telnet Traffic
Data Loss Prevention
Administering a Secure Network
Configuring Windows Firewall on Server 2008
Configuring Windows Firewall on Windows 7
Installing and Configuring an SSH Server
Installing and Configuring an SSH Client
Researching IPv6
Wireless Network Security
Installing a SOHO Wireless Router/Access Point
Installing and Configuring a Wireless Adapter
Configuring an Enterprise Wireless Access Point
Configuring Wireless Security
Exploring Access Point Settings
Access Control Fundamentals
Setting NTFS Permissions
Using NTFS Permissions
Setting and Testing Share Permissions
Auditing Permissions
Authentication and Account Management
Setting a Minimum Password Length Policy
Setting Password History and Minimum Password Age Policies
Enforcing Password Complexity Requirements
Setting Policies for Account Lockouts and Log On Hours
Restricting Access to Programs
Basic Cryptography
Command Line Encryption
Demonstrating Encryption Security
Examining the Relationship Between EFS and NTFS Permissions
Using EFS Recovery Agent Certificates
Breaking the Code
Advanced Cryptography
Installing Certificate Services
Configuring Secure Sockets Layer
Using Certificate Services Web Enrollment
Configuring Certificate Auto-Enrollment
Using a Certificate to Create a Digital Signature
Business Continuity
Installing Microsoft Virtual PC
Adding Hard Drives to a Virtual Machine
Creating RAID
Creating Fault Tolerant RAID
Comparing a System's Current State to Its Baseline State
Risk Mitigation
Online Research: Ethics in Information Technology
Online Research: The Cloud
Creating a Laptop Policy
The Human Resources Department's Role in Information Security
Exploring the ISO/IEC 27002 Standard