Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab analysis tests measure your understanding of lab results Lab analysis tests measure your understanding of lab results Key term quizzes help build your vocabulary In this Lab Manual, you'll practice Configuring workstation network connectivity Analyzing network communication Establishing secure network application communication using TCP/IP protocols Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools Defending against network application attacks, including SQL injection, web browser exploits, and email attacks Combatting Trojans, man-in-the-middle attacks, and steganography Hardening a host computer, using antivirus applications, and configuring firewalls Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec Preparing for and detecting attacks Backing up and restoring data Handling digital forensics and incident responseAttackers who know how the e-mail process works and how people think can use that knowledge to get people to do things they shouldna#39;t do. One thing attackers do is spoof e-mail addresses. Spoofing means sending e-mails that look as ifanbsp;...
|Title||:||Principles of Computer Security Lab Manual, Fourth Edition|
|Author||:||Vincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Arthur Conklin|
|Publisher||:||McGraw Hill Professional - 2014-10-31|