Network Defense and Countermeasures
(pearson-network-defense-complete)
/ ISBN: 978-1-61691-050-1
This course includes
Lessons
TestPrep
LiveLab
Mentoring (Add-on)
Network Defense and Countermeasures
Learn about the concepts of computer network defense with the Network Defense and Countermeasures, 3e course and lab. The lab simulates real-world, hardware, software, and command-line interface environments and can be mapped to any text-book, course, or training. The Network security course completely covers the techniques and methodologies related to network defense and gives you the knowledge and practical applications of firewalls; intrusion detection systems, and more.
Lessons
-
18+ Lessons
-
253+ Quizzes
-
201+ Flashcards
-
202+ Glossary of terms
TestPrep
-
100+ Pre Assessment Questions
-
100+ Post Assessment Questions
LiveLab
-
64+ LiveLab
-
62+ Video tutorials
- Introduction
- The Basics of a Network
- Basic Network Utilities
- The OSI Model
- What Does This Mean for Security?
- Assessing Likely Threats to the Network
- Classifications of Threats
- Likely Attacks
- Threat Assessment
- Understanding Security Terminology
- Choosing a Network Security Approach
- Network Security and the Law
- Using Security Resources
- Summary
- Test Your Skills
- Introduction
- Understanding Denial of Service Attacks
- Defending Against Buffer Overflow Attacks
- Defending Against IP Spoofing
- Defending Against Session Hijacking
- Blocking Virus and Trojan Horse Attacks
- Summary
- Test Your Skills
- Introduction
- What Is a Firewall?
- Implementing Firewalls
- Selecting and Using a Firewall
- Using Proxy Servers
- Summary
- Test Your Skills
- Introduction
- Using Single Machine Firewalls
- Windows 10 Firewall
- User Account Control
- Linux Firewalls
- Using Small Office/Home Office Firewalls
- Using Medium-Sized Network Firewalls
- Using Enterprise Firewalls
- Summary
- Test Your Skills
- Introduction
- Understanding IDS Concepts
- IDS Components and Processes
- Understanding and Implementing IDSs
- Understanding and Implementing Honeypots
- Summary
- Test Your Skills
- Introduction
- The History of Encryption
- Learning About Modern Encryption Methods
- Identifying Good Encryption
- Understanding Digital Signatures and Certificates
- Understanding and Using Decryption
- Cracking Passwords
- Steganography
- Steganalysis
- Quantum Computing and Quantum Cryptography
- Summary
- Test Your Skills
- Introduction
- Basic VPN Technology
- Using VPN Protocols for VPN Encryption
- IPSec
- SSL/TLS
- Implementing VPN Solutions
- Summary
- Test Your Skills
- Introduction
- Configuring Windows Properly
- Configuring Linux Properly
- Patching the Operating System
- Configuring Browsers
- Summary
- Test Your Skills
- Introduction
- Understanding Virus Attacks
- Virus Scanners
- Antivirus Policies and Procedures
- Additional Methods for Defending Your System
- What to Do If Your System Is Infected by a Virus
- Summary
- Test Your Skills
- Introduction
- Trojan Horses
- Spyware and Adware
- Summary
- Test Your Skills
- Introduction
- Defining User Policies
- Defining System Administration Policies
- Defining Access Control
- Defining Developmental Policies
- Summary
- Test Your Skills
- Projects
- Introduction
- Risk Assessment Concepts
- Evaluating the Security Risk
- Conducting the Initial Assessment
- Probing the Network
- Vulnerabilities
- McCumber Cube
- Security Documentation
- Summary
- Test Your Skills
- Introduction
- COBIT
- ISO Standards
- NIST Standards
- U.S. DoD Standards
- Using the Orange Book
- Using the Rainbow Series
- Using the Common Criteria
- Using Security Models
- U.S. Federal Regulations, Guidelines, and Standards
- Summary
- Test Your Skills
- Introduction
- Physical Security
- Disaster Recovery
- Ensuring Fault Tolerance
- Summary
- Test Your Skills
- Introduction
- Preparing to Hack
- The Attack Phase
- Wi-Fi Hacking
- Summary
- Test Your Skills
- Introduction
- General Forensics Guidelines
- FBI Forensics Guidelines
- Finding Evidence on the PC
- Gathering Evidence from a Cell Phone
- Forensic Tools to Use
- Forensic Science
- To Certify or Not to Certify?
- Summary
- Test Your Skills
- Introduction
- Defending Against Computer-Based Espionage
- Defending Against Computer-Based Terrorism
- Choosing Defense Strategies
- Summary
- Test Your Skills
Hands on Activities (Live Labs)
- Assigning Different Classes of IP Addresses
- Viewing the MAC Address on Different Interfaces
- Understanding Protocols
- Tracing Route Using tracert
- Using the netstat Command
- Conducting a DoS Attack Using a SYN Flood
- Conducting a DoS Attack Using the Smurf Attack
- Defending Against a Buffer Overflow Attack
- Defending against IP Spoofing
- Performing Session Hijacking Using Burp Suite
- Installing Antivirus Software
- Scanning and Classifying Different Types of Viruses
- Creating ACL in the Router
- Using Windows Firewall
- Creating a DMZ Zone
- Configuring User Access Control Settings
- Configuring a Linux Firewall Using the Iptable
- Using the CISCO ASA Firewall
- Intercepting Packets
- Configuring Snort
- Setting Up a Honeypot
- Using a Symmetric Algorithm
- Using an Asymmetric Algorithm
- Observing a Digital Certificate
- Creating a PGP Certification
- Using the John the Ripper Tool
- Using Rainbow Tables
- Hiding Text Using Steganography
- Setting Up a VPN Server with Windows Server 2016
- Creating an L2TP VPN Using Openswan
- Configuring IPSec
- Configuring a User Account
- Setting Security Policies
- Using Registry Editor
- Configuring the Security Setting in a Popular Browser
- Using Encryption File System
- Restricting the Null Session
- Shutting Down a Service in Windows
- Creating a Remote Access Trojan (RAT)
- Performing Malware Scanning
- Using the NetBus Application
- Using eLiTeWrap
- Using an Anti-Spyware Tool
- Defining User Access Control
- Managing a User Using an Existing Security Policy
- Examining Security Policy
- Creating a Security Policy
- Filtering Ports Using Windows Firewall
- Using the Advanced IP Scanner
- Conducting Vulnerability Scanning Using Nessus
- Using MBSA
- Configuring Windows Update
- Observing the Security Event Log
- Conducting Passive Scanning Using Netcraft
- Conducting Active Scanning Using Nsauditor
- Using ShareEnum
- Performing Active Scanning Using Nmap
- Cracking Windows Password Using Ophcrack
- Performing the SQL Injection
- Observing the Windows Log
- Retrieving Deleted Files Using Disk Digger
- Performing Logical Imaging Using AccessData FTK Imager
- Using BitLocker in Windows 10
- Using EtherDetect
×