Scroll to top button
Network Defense and Countermeasures
(pearson-network-defense-complete)
/ ISBN: 9781616910501
This course includes
Lessons
TestPrep
LiveLab
Network Defense and Countermeasures
Learn about the concepts of computer network defense with the Network Defense and Countermeasures, 3e course and lab. The lab simulates real-world, hardware, software, and command-line interface environments and can be mapped to any text-book, course, or training. The Network security course completely covers the techniques and methodologies related to network defense and gives you the knowledge and practical applications of firewalls; intrusion detection systems, and more.
Lessons
-
18+ Lessons
-
253+ Quizzes
-
201+ Flashcards
-
202+ Glossary of terms
TestPrep
-
100+ Pre Assessment Questions
-
100+ Post Assessment Questions
LiveLab
-
64+ LiveLab
-
62+ Video tutorials
- Introduction
- The Basics of a Network
- Basic Network Utilities
- The OSI Model
- What Does This Mean for Security?
- Assessing Likely Threats to the Network
- Classifications of Threats
- Likely Attacks
- Threat Assessment
- Understanding Security Terminology
- Choosing a Network Security Approach
- Network Security and the Law
- Using Security Resources
- Summary
- Test Your Skills
- Introduction
- Understanding Denial of Service Attacks
- Defending Against Buffer Overflow Attacks
- Defending Against IP Spoofing
- Defending Against Session Hijacking
- Blocking Virus and Trojan Horse Attacks
- Summary
- Test Your Skills
- Introduction
- What Is a Firewall?
- Implementing Firewalls
- Selecting and Using a Firewall
- Using Proxy Servers
- Summary
- Test Your Skills
- Introduction
- Using Single Machine Firewalls
- Windows 10 Firewall
- User Account Control
- Linux Firewalls
- Using Small Office/Home Office Firewalls
- Using Medium-Sized Network Firewalls
- Using Enterprise Firewalls
- Summary
- Test Your Skills
- Introduction
- Understanding IDS Concepts
- IDS Components and Processes
- Understanding and Implementing IDSs
- Understanding and Implementing Honeypots
- Summary
- Test Your Skills
- Introduction
- The History of Encryption
- Learning About Modern Encryption Methods
- Identifying Good Encryption
- Understanding Digital Signatures and Certificates
- Understanding and Using Decryption
- Cracking Passwords
- Steganography
- Steganalysis
- Quantum Computing and Quantum Cryptography
- Summary
- Test Your Skills
- Introduction
- Basic VPN Technology
- Using VPN Protocols for VPN Encryption
- IPSec
- SSL/TLS
- Implementing VPN Solutions
- Summary
- Test Your Skills
- Introduction
- Configuring Windows Properly
- Configuring Linux Properly
- Patching the Operating System
- Configuring Browsers
- Summary
- Test Your Skills
- Introduction
- Understanding Virus Attacks
- Virus Scanners
- Antivirus Policies and Procedures
- Additional Methods for Defending Your System
- What to Do If Your System Is Infected by a Virus
- Summary
- Test Your Skills
- Introduction
- Trojan Horses
- Spyware and Adware
- Summary
- Test Your Skills
- Introduction
- Defining User Policies
- Defining System Administration Policies
- Defining Access Control
- Defining Developmental Policies
- Summary
- Test Your Skills
- Projects
- Introduction
- Risk Assessment Concepts
- Evaluating the Security Risk
- Conducting the Initial Assessment
- Probing the Network
- Vulnerabilities
- McCumber Cube
- Security Documentation
- Summary
- Test Your Skills
- Introduction
- COBIT
- ISO Standards
- NIST Standards
- U.S. DoD Standards
- Using the Orange Book
- Using the Rainbow Series
- Using the Common Criteria
- Using Security Models
- U.S. Federal Regulations, Guidelines, and Standards
- Summary
- Test Your Skills
- Introduction
- Physical Security
- Disaster Recovery
- Ensuring Fault Tolerance
- Summary
- Test Your Skills
- Introduction
- Preparing to Hack
- The Attack Phase
- Wi-Fi Hacking
- Summary
- Test Your Skills
- Introduction
- General Forensics Guidelines
- FBI Forensics Guidelines
- Finding Evidence on the PC
- Gathering Evidence from a Cell Phone
- Forensic Tools to Use
- Forensic Science
- To Certify or Not to Certify?
- Summary
- Test Your Skills
- Introduction
- Defending Against Computer-Based Espionage
- Defending Against Computer-Based Terrorism
- Choosing Defense Strategies
- Summary
- Test Your Skills
Hands on Activities (Live Labs)
- Assigning Different Classes of IP Addresses
- Viewing the MAC Address on Different Interfaces
- Understanding Protocols
- Tracing Route Using tracert
- Using the netstat Command
- Conducting a DoS Attack Using a SYN Flood
- Conducting a DoS Attack Using the Smurf Attack
- Defending Against a Buffer Overflow Attack
- Defending against IP Spoofing
- Performing Session Hijacking Using Burp Suite
- Installing Antivirus Software
- Scanning and Classifying Different Types of Viruses
- Creating ACL in the Router
- Using Windows Firewall
- Creating a DMZ Zone
- Configuring User Access Control Setting
- Configuring a Linux Firewall Using the Iptable
- Using the CISCO ASA Firewall
- Intercepting Packets
- Configuring Snort
- Setting Up a Honeypot
- Using a Symmetric Algorithm
- Using an Asymmetric Algorithm
- Observing a Digital Certificate
- Creating a PGP Certification
- Using the John the Ripper Tool
- Using Rainbow Tables
- Hiding Text Using Steganography
- Setting Up a VPN Server with Windows Server 2016
- Creating an L2TP VPN Using Openswan
- Configuring IPSec
- Configuring a User Account
- Setting Security Policies
- Using Registry Editor
- Configuring the Security Setting in a Popular Browser
- Using Encryption File System
- Restricting the Null Session
- Shutting Down a Service in Windows
- Creating a Remote Access Trojan (RAT)
- Performing Malware Scanning
- Using the NetBus Application
- Using eLiTeWrap
- Using an Anti-Spyware Tool
- Defining User Access Control
- Managing a User Using an Existing Security Policy
- Examining Security Policy
- Creating a Security Policy
- Filtering Ports Using Windows Firewall
- Using the Advanced IP Scanner
- Conducting Vulnerability Scanning Using Nessus
- Using MBSA
- Configuring Windows Update
- Observing the Security Event Log
- Conducting Passive Scanning Using Netcraft
- Conducting Active Scanning Using Nsauditor
- Using ShareEnum
- Performing Active Scanning Using Nmap
- Cracking Windows Password Using Ophcrack
- Performing the SQL Injection
- Observing the Windows Log
- Retrieving Deleted Files Using Disk Digger
- Performing Logical Imaging Using AccessData FTK Imager
- Using BitLocker in Windows 10
- Using EtherDetect
×
Share with your friends and colleagues
We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies.
More information
Accept