| |
| |
Introduction | |
| |
| |
Acknowledgments | |
| |
| |
Introduction to Security | |
| |
| |
Online Research: Certification | |
| |
| |
Online Research: Information Security Careers | |
| |
| |
Online Research: Sans Reading Room | |
| |
| |
Online Research: Which is the "Safest" Operating System? | |
| |
| |
Online Research: Defending Against Attacks | |
| |
| |
Malware and Social Engineering Attacks | |
| |
| |
Eicar Anti-Virus Test File | |
| |
| |
Remote Program Execution | |
| |
| |
Checking for Unsigned Programs | |
| |
| |
Validating a Downloaded Program | |
| |
| |
Installing Active Directory Domain Services | |
| |
| |
Application and Network Attacks | |
| |
| |
Getting Started with BackTracfc 4 R2 | |
| |
| |
IP Spoofing with Hping2 | |
| |
| |
ARP Poisoning | |
| |
| |
Man-in-the-Middle Attack | |
| |
| |
Getting Started with Metasploit | |
| |
| |
Vulnerability Assessment and Mitigating Attacks | |
| |
| |
Footprinting | |
| |
| |
Enumeration | |
| |
| |
Vulnerability Testing with Open VAS | |
| |
| |
Exploitation and Payload Delivery | |
| |
| |
Working with Meterpreter | |
| |
| |
Host, Application, and Data Security | |
| |
| |
Windows Server 2008 Security Configuration Wizard | |
| |
| |
Creating a Security Template | |
| |
| |
Analyzing Security Configurations | |
| |
| |
Applying Security Settings from a Security Template and Verifying System Compliance | |
| |
| |
Auditing Object Access | |
| |
| |
Network Security | |
| |
| |
Verifying the Integrity of the Hosts File | |
| |
| |
Installing the FTP Server Service and Wireshark | |
| |
| |
Capturing and Analyzing FTP Traffic | |
| |
| |
Capturing and Analyzing Telnet Traffic | |
| |
| |
Data Loss Prevention | |
| |
| |
Administering a Secure Network | |
| |
| |
Configuring Windows Firewall on Server 2008 | |
| |
| |
Configuring Windows Firewall on Windows 7 | |
| |
| |
Installing and Configuring an SSH Server | |
| |
| |
Installing and Configuring an SSH Client | |
| |
| |
Researching IPv6 | |
| |
| |
Wireless Network Security | |
| |
| |
Installing a SOHO Wireless Router/Access Point | |
| |
| |
Installing and Configuring a Wireless Adapter | |
| |
| |
Configuring an Enterprise Wireless Access Point | |
| |
| |
Configuring Wireless Security | |
| |
| |
Exploring Access Point Settings | |
| |
| |
Access Control Fundamentals | |
| |
| |
Setting NTFS Permissions | |
| |
| |
Using NTFS Permissions | |
| |
| |
Setting and Testing Share Permissions | |
| |
| |
Auditing Permissions | |
| |
| |
Authentication and Account Management | |
| |
| |
Setting a Minimum Password Length Policy | |
| |
| |
Setting Password History and Minimum Password Age Policies | |
| |
| |
Enforcing Password Complexity Requirements | |
| |
| |
Setting Policies for Account Lockouts and Log On Hours | |
| |
| |
Restricting Access to Programs | |
| |
| |
Basic Cryptography | |
| |
| |
Command Line Encryption | |
| |
| |
Demonstrating Encryption Security | |
| |
| |
Examining the Relationship Between EFS and NTFS Permissions | |
| |
| |
Using EFS Recovery Agent Certificates | |
| |
| |
Breaking the Code | |
| |
| |
Advanced Cryptography | |
| |
| |
Installing Certificate Services | |
| |
| |
Configuring Secure Sockets Layer | |
| |
| |
Using Certificate Services Web Enrollment | |
| |
| |
Configuring Certificate Auto-Enrollment | |
| |
| |
Using a Certificate to Create a Digital Signature | |
| |
| |
Business Continuity | |
| |
| |
Installing Microsoft Virtual PC | |
| |
| |
Adding Hard Drives to a Virtual Machine | |
| |
| |
Creating RAID | |
| |
| |
Creating Fault Tolerant RAID | |
| |
| |
Comparing a System's Current State to Its Baseline State | |
| |
| |
Risk Mitigation | |
| |
| |
Online Research: Ethics in Information Technology | |
| |
| |
Online Research: The Cloud | |
| |
| |
Creating a Laptop Policy | |
| |
| |
The Human Resources Department's Role in Information Security | |
| |
| |
Exploring the ISO/IEC 27002 Standard | |