Jonathan Weissman
Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)
Jonathan Weissman
Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Practice the Skills Essential for a Successful Career in Cybersecurity * 80 lab exercises give you the hands-on skills to complement your fundamental knowledge * Lab analysis tests measure your understanding of lab activities and results * Step-by-step scenarios require you to think critically * Key term quizzes help build your vocabulary Principles of Computer Security: CompTIA Security+ and Beyond Lab…mehr
Andere Kunden interessierten sich auch für
- Wm. Arthur ConklinPrinciples of Computer Security: CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601)87,99 €
- Glen ClarkeCompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601)43,99 €
- Mike MeyersMike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)36,99 €
- Wm. Arthur ConklinCompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)52,99 €
- Robert ShimonskiComptia Security+ Sy0-701 Exam Cram42,99 €
- Mike MeyersMike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs Lab Manual, Sixth Edition (Exams 220-1001 & 220-1002)46,99 €
- Lewis HeuermannComptia Security+ Sy0-701 Cert Guide63,99 €
-
-
-
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Practice the Skills Essential for a Successful Career in Cybersecurity * 80 lab exercises give you the hands-on skills to complement your fundamental knowledge * Lab analysis tests measure your understanding of lab activities and results * Step-by-step scenarios require you to think critically * Key term quizzes help build your vocabulary Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) covers: * Social engineering techniques * Type of Attack Indicators * Application Attack Indicators * Network Attack Indicators * Threat actors, vectors, and intelligence sources * Vulnerabilities * Security Assessments * Penetration Testing * Enterprise Architecture * Virtualization and Cloud Security * Secure App Development, deployment and Automation scripts * Authentication and Authorization * Cybersecurity Resilience * Embedded and Specialized systems * Physical Security Instructor resources available: * This lab manual supplements the textbook Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601), which is available separately * Solutions to the labs are not included in the book and are only available to adopting instructors
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: McGraw-Hill Education
- Seitenzahl: 672
- Erscheinungstermin: 28. September 2021
- Englisch
- Abmessung: 212mm x 274mm x 36mm
- Gewicht: 1322g
- ISBN-13: 9781260470116
- ISBN-10: 1260470113
- Artikelnr.: 60205179
- Verlag: McGraw-Hill Education
- Seitenzahl: 672
- Erscheinungstermin: 28. September 2021
- Englisch
- Abmessung: 212mm x 274mm x 36mm
- Gewicht: 1322g
- ISBN-13: 9781260470116
- ISBN-10: 1260470113
- Artikelnr.: 60205179
Jonathan S. Weissman, CompTIA A+, CompTIA Network+, CompTIA Security+, CompTIA Server+, CompTIA Linux+, CCNP, CCNA, CEH, CHFI, is a senior lecturer at Rochester Institute of Technology as well as an associate professor and Networking and Cybersecurity program coordinator at Finger Lakes Community College. He is the recipient of ten teaching awards and honors. He is the co-author of Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Fifth Edition and Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601), and is the technical editor for many other books. Weissman regularly appears on TV news and talk radio, and in articles, as a networking and cybersecurity expert. Additionally, he presents at conferences and in webinars, runs workshops, and appears in podcasts. He has a master's degree in Computer Science from Brooklyn College and holds 44 industry certifications. @CSCPROF on Twitter.
Introduction
Additional Resources for Teachers
Chapter 1 Introduction and Security Trends
Lab Exercise 1.01: Staying Current with Industry
Lab Exercise 1.02: Cyber Threat Maps
Lab Exercise 1.03: Cybersecurity Survey
Lab Exercise 1.04: Building the Virtual Lab
Lab Analysis
Key Term Quiz
Chapter 2 General Security Concepts
Lab Exercise 2.01: Verizon DBIR
Lab Exercise 2.02: Linux File System Management
Lab Exercise 2.03: Linux Systems Administration
Lab Exercise 2.04: Linux System Security
Lab Analysis
Key Term Quiz
Chapter 3 Operational and Organizational Security
Lab Exercise 3.01: Policies
Lab Exercise 3.02: Training Documentation
Lab Exercise 3.03: Interoperability Agreements
Lab Analysis
Key Term Quiz
Chapter 4 The Role of People in Security
Lab Exercise 4.01: The Social-Engineer Toolkit
Lab Exercise 4.02: Phishing Tests
Lab Exercise 4.03: Reconnaissance Through Open-Source Intelligence
Lab Analysis
Key Term Quiz
Chapter 5 Cryptography
Lab Exercise 5.01: Symmetric Key Encryption
Lab Exercise 5.02: Asymmetric Key Encryption
Lab Exercise 5.03: Hashing
Lab Exercise 5.04: Diffie-Hellman Key Exchange
Lab Analysis
Key Term Quiz
Chapter 6 Applied Cryptography
Lab Exercise 6.01: Apple vs. FBI
Lab Exercise 6.02: Australia's Assistance and Access Bill
Lab Exercise 6.03: To Serve Man
Lab Exercise 6.04: E-mail Cryptography
Lab Analysis
Key Term Quiz
Chapter 7 Public Key Infrastructure
Lab Exercise 7.01: DNSSEC for Security
Lab Exercise 7.02: DNSSEC for Exploiting
Lab Exercise 7.03: TLS in Action
Lab Analysis
Key Term Quiz
Chapter 8 Physical Security
Lab Exercise 8.01: Linux Password Recovery
Lab Exercise 8.02: Cisco Router Password Recovery
Lab Exercise 8.03: Cisco Switch Password Recovery
Lab Analysis
Key Term Quiz
Chapter 9 Network Fundamentals
Lab Exercise 9.01: Switch Configuration
Lab Exercise 9.02: Router Configuration
Lab Exercise 9.03: Passwords and SSH
Lab Analysis
Key Term Quiz
Chapter 10 Infrastructure Security
Lab Exercise 10.01: Port Security on Switches
Lab Exercise 10.02: Standard ACLs on Routers
Lab Exercise 10.03: Extended ACLs on Routers
Lab Analysis
Key Term Quiz
Chapter 11 Authentication and Remote Access
Lab Exercise 11.01: Dictionary Attacks on Linux Passwords with John the
Ripper
Lab Exercise 11.02: Brute Force Attacks on Linux Passwords with crunch
and John the Ripper
Lab Exercise 11.03: Dictionary Attacks and Brute Force Attacks on
Windows Passwords with Mimikatz, crunch, and John the Ripper
Lab Exercise 11.04: Rainbow Table Attacks on Windows Passwords with
ophcrack
Lab Analysis
Key Term Quiz
Chapter 12 Wireless Security and Mobile Devices
Lab Exercise 12.01: Wireless Network and Device Detection
Lab Exercise 12.02: Monitor Mode Sniffing
Lab Exercise 12.03: Cracking WPA2 Passwords and Deauthenticating Clients
with Wifite
Lab Analysis
Key Term Quiz
Chapter 13 Intrusion Detection Systems and Network Security
Lab Exercise 13.01: Installing Ubuntu and Snort
Lab Exercise 13.02: Snort Sniffer Mode
Lab Exercise 13.03: Snort Packet Logger Mode
Lab Exercise 13.04: Snort Network Intrusion Detection System Mode
Lab Analysis
Key Term Quiz
Chapter 14 System Hardening and Baselines
Lab Exercise 14.01: Active Directory Domain Services and Domain
Connectivity
Lab Exercise 14.02: Organizational Units and Groups
Lab Exercise 14.03: Users and Other Active Directory Objects
Lab Exercise 14.04: Permissions and Shares
Lab Exercise 14.05: Group Policy Objects
Lab Analysis
Key Term Quiz
Chapter 15 Types of Attacks and Malicious Software
Lab Exercise 15.01: Strings
Lab Exercise 15.02: UPX
Lab Exercise 15.03: PEview and Resource Hacker
Lab Exercise 15.04: VirusTotal
Lab Exercise 15.05: Regshot
Lab Exercise 15.06: Process Monitor
Lab Exercise 15.07: ApateDNS
Lab Analysis
Key Term Quiz
Chapter 16 Security Tools and Techniques
Lab Exercise 16.01: Port Scanning with Nmap
Lab Exercise 16.02: Sockets with netcat (nc) and ncat
Lab Exercise 16.03: Packet Crafting with hping3
Lab Exercise 16.04: Packet Crafting with Scapy
Lab Analysis
Key Term Quiz
Chapter 17 Web Components, E-mail, and Instant Messaging
Lab Exercise 17.01: E-mail Headers
Lab Exercise 17.02: SPF, DKIM, and DMARC
Lab Analysis
Key Term Quiz
Chapter 18 Cloud Computing
Lab Exercise 18.01: Microsoft Azure Training
Lab Exercise 18.02: Exploring Microsoft Azure
Lab Exercise 18.03: AWS Educate and AWS Training and Certification
Lab Exercise 18.04: Exploring AWS
Lab Analysis
Key Term Quiz
Chapter 19 Secure Software Development
Lab Exercise 19.01: Configuring WampServer and DVWA
Lab Exercise 19.02: SQL Injection
Lab Analysis
Key Term Quiz
Chapter 20 Risk Management
Lab Exercise 20.01: PowerShell Script Settings
Lab Exercise 20.02: PowerShell Exploitation
Lab Analysis
Key Term Quiz
Chapter 21 Business Continuity, Disaster Recovery, and Change Management
Lab Exercise 21.01: Business Continuity
Lab Exercise 21.02: Disaster Recovery
Lab Exercise 21.03: Change Management
Lab Analysis
Key Term Quiz
Chapter 22 Incident Response
Lab Exercise 22.01: Incident Response Companies and Stories
Lab Exercise 22.02: Metasploit Framework
Lab Exercise 22.03: Metasploit's Meterpreter
Lab Exercise 22.04: Armitage
Lab Analysis
Key Term Quiz
Chapter 23 Computer Forensics
Lab Exercise 23.01: Windows Registry Forensics
Lab Exercise 23.02: Digital Evidence in RAM and on the Hard Drive
Lab Exercise 23.03: Steganography
Lab Exercise 23.04: Imaging, Recovering Deleted Files, File Signatures,
and Analyzing Images
Lab Analysis
Key Term Quiz
Chapter 24 Legal Issues and Ethics
Lab Exercise 24.01: ACM Ethics
Lab Exercise 24.02: USENIX Ethics
Lab Exercise 24.03: Ethical Scenarios
Lab Exercise 24.04: Copyright
Lab Exercise 24.05: Creative Commons
Lab Exercise 24.06: FSF and GNU
Lab Analysis
Key Term Quiz
Chapter 25 Privacy
Lab Exercise 25.01: Shodan
Lab Exercise 25.02: Insecam
Lab Exercise 25.03: Google Hacking
Lab Analysis
Key Term Quiz
Index
Additional Resources for Teachers
Chapter 1 Introduction and Security Trends
Lab Exercise 1.01: Staying Current with Industry
Lab Exercise 1.02: Cyber Threat Maps
Lab Exercise 1.03: Cybersecurity Survey
Lab Exercise 1.04: Building the Virtual Lab
Lab Analysis
Key Term Quiz
Chapter 2 General Security Concepts
Lab Exercise 2.01: Verizon DBIR
Lab Exercise 2.02: Linux File System Management
Lab Exercise 2.03: Linux Systems Administration
Lab Exercise 2.04: Linux System Security
Lab Analysis
Key Term Quiz
Chapter 3 Operational and Organizational Security
Lab Exercise 3.01: Policies
Lab Exercise 3.02: Training Documentation
Lab Exercise 3.03: Interoperability Agreements
Lab Analysis
Key Term Quiz
Chapter 4 The Role of People in Security
Lab Exercise 4.01: The Social-Engineer Toolkit
Lab Exercise 4.02: Phishing Tests
Lab Exercise 4.03: Reconnaissance Through Open-Source Intelligence
Lab Analysis
Key Term Quiz
Chapter 5 Cryptography
Lab Exercise 5.01: Symmetric Key Encryption
Lab Exercise 5.02: Asymmetric Key Encryption
Lab Exercise 5.03: Hashing
Lab Exercise 5.04: Diffie-Hellman Key Exchange
Lab Analysis
Key Term Quiz
Chapter 6 Applied Cryptography
Lab Exercise 6.01: Apple vs. FBI
Lab Exercise 6.02: Australia's Assistance and Access Bill
Lab Exercise 6.03: To Serve Man
Lab Exercise 6.04: E-mail Cryptography
Lab Analysis
Key Term Quiz
Chapter 7 Public Key Infrastructure
Lab Exercise 7.01: DNSSEC for Security
Lab Exercise 7.02: DNSSEC for Exploiting
Lab Exercise 7.03: TLS in Action
Lab Analysis
Key Term Quiz
Chapter 8 Physical Security
Lab Exercise 8.01: Linux Password Recovery
Lab Exercise 8.02: Cisco Router Password Recovery
Lab Exercise 8.03: Cisco Switch Password Recovery
Lab Analysis
Key Term Quiz
Chapter 9 Network Fundamentals
Lab Exercise 9.01: Switch Configuration
Lab Exercise 9.02: Router Configuration
Lab Exercise 9.03: Passwords and SSH
Lab Analysis
Key Term Quiz
Chapter 10 Infrastructure Security
Lab Exercise 10.01: Port Security on Switches
Lab Exercise 10.02: Standard ACLs on Routers
Lab Exercise 10.03: Extended ACLs on Routers
Lab Analysis
Key Term Quiz
Chapter 11 Authentication and Remote Access
Lab Exercise 11.01: Dictionary Attacks on Linux Passwords with John the
Ripper
Lab Exercise 11.02: Brute Force Attacks on Linux Passwords with crunch
and John the Ripper
Lab Exercise 11.03: Dictionary Attacks and Brute Force Attacks on
Windows Passwords with Mimikatz, crunch, and John the Ripper
Lab Exercise 11.04: Rainbow Table Attacks on Windows Passwords with
ophcrack
Lab Analysis
Key Term Quiz
Chapter 12 Wireless Security and Mobile Devices
Lab Exercise 12.01: Wireless Network and Device Detection
Lab Exercise 12.02: Monitor Mode Sniffing
Lab Exercise 12.03: Cracking WPA2 Passwords and Deauthenticating Clients
with Wifite
Lab Analysis
Key Term Quiz
Chapter 13 Intrusion Detection Systems and Network Security
Lab Exercise 13.01: Installing Ubuntu and Snort
Lab Exercise 13.02: Snort Sniffer Mode
Lab Exercise 13.03: Snort Packet Logger Mode
Lab Exercise 13.04: Snort Network Intrusion Detection System Mode
Lab Analysis
Key Term Quiz
Chapter 14 System Hardening and Baselines
Lab Exercise 14.01: Active Directory Domain Services and Domain
Connectivity
Lab Exercise 14.02: Organizational Units and Groups
Lab Exercise 14.03: Users and Other Active Directory Objects
Lab Exercise 14.04: Permissions and Shares
Lab Exercise 14.05: Group Policy Objects
Lab Analysis
Key Term Quiz
Chapter 15 Types of Attacks and Malicious Software
Lab Exercise 15.01: Strings
Lab Exercise 15.02: UPX
Lab Exercise 15.03: PEview and Resource Hacker
Lab Exercise 15.04: VirusTotal
Lab Exercise 15.05: Regshot
Lab Exercise 15.06: Process Monitor
Lab Exercise 15.07: ApateDNS
Lab Analysis
Key Term Quiz
Chapter 16 Security Tools and Techniques
Lab Exercise 16.01: Port Scanning with Nmap
Lab Exercise 16.02: Sockets with netcat (nc) and ncat
Lab Exercise 16.03: Packet Crafting with hping3
Lab Exercise 16.04: Packet Crafting with Scapy
Lab Analysis
Key Term Quiz
Chapter 17 Web Components, E-mail, and Instant Messaging
Lab Exercise 17.01: E-mail Headers
Lab Exercise 17.02: SPF, DKIM, and DMARC
Lab Analysis
Key Term Quiz
Chapter 18 Cloud Computing
Lab Exercise 18.01: Microsoft Azure Training
Lab Exercise 18.02: Exploring Microsoft Azure
Lab Exercise 18.03: AWS Educate and AWS Training and Certification
Lab Exercise 18.04: Exploring AWS
Lab Analysis
Key Term Quiz
Chapter 19 Secure Software Development
Lab Exercise 19.01: Configuring WampServer and DVWA
Lab Exercise 19.02: SQL Injection
Lab Analysis
Key Term Quiz
Chapter 20 Risk Management
Lab Exercise 20.01: PowerShell Script Settings
Lab Exercise 20.02: PowerShell Exploitation
Lab Analysis
Key Term Quiz
Chapter 21 Business Continuity, Disaster Recovery, and Change Management
Lab Exercise 21.01: Business Continuity
Lab Exercise 21.02: Disaster Recovery
Lab Exercise 21.03: Change Management
Lab Analysis
Key Term Quiz
Chapter 22 Incident Response
Lab Exercise 22.01: Incident Response Companies and Stories
Lab Exercise 22.02: Metasploit Framework
Lab Exercise 22.03: Metasploit's Meterpreter
Lab Exercise 22.04: Armitage
Lab Analysis
Key Term Quiz
Chapter 23 Computer Forensics
Lab Exercise 23.01: Windows Registry Forensics
Lab Exercise 23.02: Digital Evidence in RAM and on the Hard Drive
Lab Exercise 23.03: Steganography
Lab Exercise 23.04: Imaging, Recovering Deleted Files, File Signatures,
and Analyzing Images
Lab Analysis
Key Term Quiz
Chapter 24 Legal Issues and Ethics
Lab Exercise 24.01: ACM Ethics
Lab Exercise 24.02: USENIX Ethics
Lab Exercise 24.03: Ethical Scenarios
Lab Exercise 24.04: Copyright
Lab Exercise 24.05: Creative Commons
Lab Exercise 24.06: FSF and GNU
Lab Analysis
Key Term Quiz
Chapter 25 Privacy
Lab Exercise 25.01: Shodan
Lab Exercise 25.02: Insecam
Lab Exercise 25.03: Google Hacking
Lab Analysis
Key Term Quiz
Index
Introduction
Additional Resources for Teachers
Chapter 1 Introduction and Security Trends
Lab Exercise 1.01: Staying Current with Industry
Lab Exercise 1.02: Cyber Threat Maps
Lab Exercise 1.03: Cybersecurity Survey
Lab Exercise 1.04: Building the Virtual Lab
Lab Analysis
Key Term Quiz
Chapter 2 General Security Concepts
Lab Exercise 2.01: Verizon DBIR
Lab Exercise 2.02: Linux File System Management
Lab Exercise 2.03: Linux Systems Administration
Lab Exercise 2.04: Linux System Security
Lab Analysis
Key Term Quiz
Chapter 3 Operational and Organizational Security
Lab Exercise 3.01: Policies
Lab Exercise 3.02: Training Documentation
Lab Exercise 3.03: Interoperability Agreements
Lab Analysis
Key Term Quiz
Chapter 4 The Role of People in Security
Lab Exercise 4.01: The Social-Engineer Toolkit
Lab Exercise 4.02: Phishing Tests
Lab Exercise 4.03: Reconnaissance Through Open-Source Intelligence
Lab Analysis
Key Term Quiz
Chapter 5 Cryptography
Lab Exercise 5.01: Symmetric Key Encryption
Lab Exercise 5.02: Asymmetric Key Encryption
Lab Exercise 5.03: Hashing
Lab Exercise 5.04: Diffie-Hellman Key Exchange
Lab Analysis
Key Term Quiz
Chapter 6 Applied Cryptography
Lab Exercise 6.01: Apple vs. FBI
Lab Exercise 6.02: Australia's Assistance and Access Bill
Lab Exercise 6.03: To Serve Man
Lab Exercise 6.04: E-mail Cryptography
Lab Analysis
Key Term Quiz
Chapter 7 Public Key Infrastructure
Lab Exercise 7.01: DNSSEC for Security
Lab Exercise 7.02: DNSSEC for Exploiting
Lab Exercise 7.03: TLS in Action
Lab Analysis
Key Term Quiz
Chapter 8 Physical Security
Lab Exercise 8.01: Linux Password Recovery
Lab Exercise 8.02: Cisco Router Password Recovery
Lab Exercise 8.03: Cisco Switch Password Recovery
Lab Analysis
Key Term Quiz
Chapter 9 Network Fundamentals
Lab Exercise 9.01: Switch Configuration
Lab Exercise 9.02: Router Configuration
Lab Exercise 9.03: Passwords and SSH
Lab Analysis
Key Term Quiz
Chapter 10 Infrastructure Security
Lab Exercise 10.01: Port Security on Switches
Lab Exercise 10.02: Standard ACLs on Routers
Lab Exercise 10.03: Extended ACLs on Routers
Lab Analysis
Key Term Quiz
Chapter 11 Authentication and Remote Access
Lab Exercise 11.01: Dictionary Attacks on Linux Passwords with John the
Ripper
Lab Exercise 11.02: Brute Force Attacks on Linux Passwords with crunch
and John the Ripper
Lab Exercise 11.03: Dictionary Attacks and Brute Force Attacks on
Windows Passwords with Mimikatz, crunch, and John the Ripper
Lab Exercise 11.04: Rainbow Table Attacks on Windows Passwords with
ophcrack
Lab Analysis
Key Term Quiz
Chapter 12 Wireless Security and Mobile Devices
Lab Exercise 12.01: Wireless Network and Device Detection
Lab Exercise 12.02: Monitor Mode Sniffing
Lab Exercise 12.03: Cracking WPA2 Passwords and Deauthenticating Clients
with Wifite
Lab Analysis
Key Term Quiz
Chapter 13 Intrusion Detection Systems and Network Security
Lab Exercise 13.01: Installing Ubuntu and Snort
Lab Exercise 13.02: Snort Sniffer Mode
Lab Exercise 13.03: Snort Packet Logger Mode
Lab Exercise 13.04: Snort Network Intrusion Detection System Mode
Lab Analysis
Key Term Quiz
Chapter 14 System Hardening and Baselines
Lab Exercise 14.01: Active Directory Domain Services and Domain
Connectivity
Lab Exercise 14.02: Organizational Units and Groups
Lab Exercise 14.03: Users and Other Active Directory Objects
Lab Exercise 14.04: Permissions and Shares
Lab Exercise 14.05: Group Policy Objects
Lab Analysis
Key Term Quiz
Chapter 15 Types of Attacks and Malicious Software
Lab Exercise 15.01: Strings
Lab Exercise 15.02: UPX
Lab Exercise 15.03: PEview and Resource Hacker
Lab Exercise 15.04: VirusTotal
Lab Exercise 15.05: Regshot
Lab Exercise 15.06: Process Monitor
Lab Exercise 15.07: ApateDNS
Lab Analysis
Key Term Quiz
Chapter 16 Security Tools and Techniques
Lab Exercise 16.01: Port Scanning with Nmap
Lab Exercise 16.02: Sockets with netcat (nc) and ncat
Lab Exercise 16.03: Packet Crafting with hping3
Lab Exercise 16.04: Packet Crafting with Scapy
Lab Analysis
Key Term Quiz
Chapter 17 Web Components, E-mail, and Instant Messaging
Lab Exercise 17.01: E-mail Headers
Lab Exercise 17.02: SPF, DKIM, and DMARC
Lab Analysis
Key Term Quiz
Chapter 18 Cloud Computing
Lab Exercise 18.01: Microsoft Azure Training
Lab Exercise 18.02: Exploring Microsoft Azure
Lab Exercise 18.03: AWS Educate and AWS Training and Certification
Lab Exercise 18.04: Exploring AWS
Lab Analysis
Key Term Quiz
Chapter 19 Secure Software Development
Lab Exercise 19.01: Configuring WampServer and DVWA
Lab Exercise 19.02: SQL Injection
Lab Analysis
Key Term Quiz
Chapter 20 Risk Management
Lab Exercise 20.01: PowerShell Script Settings
Lab Exercise 20.02: PowerShell Exploitation
Lab Analysis
Key Term Quiz
Chapter 21 Business Continuity, Disaster Recovery, and Change Management
Lab Exercise 21.01: Business Continuity
Lab Exercise 21.02: Disaster Recovery
Lab Exercise 21.03: Change Management
Lab Analysis
Key Term Quiz
Chapter 22 Incident Response
Lab Exercise 22.01: Incident Response Companies and Stories
Lab Exercise 22.02: Metasploit Framework
Lab Exercise 22.03: Metasploit's Meterpreter
Lab Exercise 22.04: Armitage
Lab Analysis
Key Term Quiz
Chapter 23 Computer Forensics
Lab Exercise 23.01: Windows Registry Forensics
Lab Exercise 23.02: Digital Evidence in RAM and on the Hard Drive
Lab Exercise 23.03: Steganography
Lab Exercise 23.04: Imaging, Recovering Deleted Files, File Signatures,
and Analyzing Images
Lab Analysis
Key Term Quiz
Chapter 24 Legal Issues and Ethics
Lab Exercise 24.01: ACM Ethics
Lab Exercise 24.02: USENIX Ethics
Lab Exercise 24.03: Ethical Scenarios
Lab Exercise 24.04: Copyright
Lab Exercise 24.05: Creative Commons
Lab Exercise 24.06: FSF and GNU
Lab Analysis
Key Term Quiz
Chapter 25 Privacy
Lab Exercise 25.01: Shodan
Lab Exercise 25.02: Insecam
Lab Exercise 25.03: Google Hacking
Lab Analysis
Key Term Quiz
Index
Additional Resources for Teachers
Chapter 1 Introduction and Security Trends
Lab Exercise 1.01: Staying Current with Industry
Lab Exercise 1.02: Cyber Threat Maps
Lab Exercise 1.03: Cybersecurity Survey
Lab Exercise 1.04: Building the Virtual Lab
Lab Analysis
Key Term Quiz
Chapter 2 General Security Concepts
Lab Exercise 2.01: Verizon DBIR
Lab Exercise 2.02: Linux File System Management
Lab Exercise 2.03: Linux Systems Administration
Lab Exercise 2.04: Linux System Security
Lab Analysis
Key Term Quiz
Chapter 3 Operational and Organizational Security
Lab Exercise 3.01: Policies
Lab Exercise 3.02: Training Documentation
Lab Exercise 3.03: Interoperability Agreements
Lab Analysis
Key Term Quiz
Chapter 4 The Role of People in Security
Lab Exercise 4.01: The Social-Engineer Toolkit
Lab Exercise 4.02: Phishing Tests
Lab Exercise 4.03: Reconnaissance Through Open-Source Intelligence
Lab Analysis
Key Term Quiz
Chapter 5 Cryptography
Lab Exercise 5.01: Symmetric Key Encryption
Lab Exercise 5.02: Asymmetric Key Encryption
Lab Exercise 5.03: Hashing
Lab Exercise 5.04: Diffie-Hellman Key Exchange
Lab Analysis
Key Term Quiz
Chapter 6 Applied Cryptography
Lab Exercise 6.01: Apple vs. FBI
Lab Exercise 6.02: Australia's Assistance and Access Bill
Lab Exercise 6.03: To Serve Man
Lab Exercise 6.04: E-mail Cryptography
Lab Analysis
Key Term Quiz
Chapter 7 Public Key Infrastructure
Lab Exercise 7.01: DNSSEC for Security
Lab Exercise 7.02: DNSSEC for Exploiting
Lab Exercise 7.03: TLS in Action
Lab Analysis
Key Term Quiz
Chapter 8 Physical Security
Lab Exercise 8.01: Linux Password Recovery
Lab Exercise 8.02: Cisco Router Password Recovery
Lab Exercise 8.03: Cisco Switch Password Recovery
Lab Analysis
Key Term Quiz
Chapter 9 Network Fundamentals
Lab Exercise 9.01: Switch Configuration
Lab Exercise 9.02: Router Configuration
Lab Exercise 9.03: Passwords and SSH
Lab Analysis
Key Term Quiz
Chapter 10 Infrastructure Security
Lab Exercise 10.01: Port Security on Switches
Lab Exercise 10.02: Standard ACLs on Routers
Lab Exercise 10.03: Extended ACLs on Routers
Lab Analysis
Key Term Quiz
Chapter 11 Authentication and Remote Access
Lab Exercise 11.01: Dictionary Attacks on Linux Passwords with John the
Ripper
Lab Exercise 11.02: Brute Force Attacks on Linux Passwords with crunch
and John the Ripper
Lab Exercise 11.03: Dictionary Attacks and Brute Force Attacks on
Windows Passwords with Mimikatz, crunch, and John the Ripper
Lab Exercise 11.04: Rainbow Table Attacks on Windows Passwords with
ophcrack
Lab Analysis
Key Term Quiz
Chapter 12 Wireless Security and Mobile Devices
Lab Exercise 12.01: Wireless Network and Device Detection
Lab Exercise 12.02: Monitor Mode Sniffing
Lab Exercise 12.03: Cracking WPA2 Passwords and Deauthenticating Clients
with Wifite
Lab Analysis
Key Term Quiz
Chapter 13 Intrusion Detection Systems and Network Security
Lab Exercise 13.01: Installing Ubuntu and Snort
Lab Exercise 13.02: Snort Sniffer Mode
Lab Exercise 13.03: Snort Packet Logger Mode
Lab Exercise 13.04: Snort Network Intrusion Detection System Mode
Lab Analysis
Key Term Quiz
Chapter 14 System Hardening and Baselines
Lab Exercise 14.01: Active Directory Domain Services and Domain
Connectivity
Lab Exercise 14.02: Organizational Units and Groups
Lab Exercise 14.03: Users and Other Active Directory Objects
Lab Exercise 14.04: Permissions and Shares
Lab Exercise 14.05: Group Policy Objects
Lab Analysis
Key Term Quiz
Chapter 15 Types of Attacks and Malicious Software
Lab Exercise 15.01: Strings
Lab Exercise 15.02: UPX
Lab Exercise 15.03: PEview and Resource Hacker
Lab Exercise 15.04: VirusTotal
Lab Exercise 15.05: Regshot
Lab Exercise 15.06: Process Monitor
Lab Exercise 15.07: ApateDNS
Lab Analysis
Key Term Quiz
Chapter 16 Security Tools and Techniques
Lab Exercise 16.01: Port Scanning with Nmap
Lab Exercise 16.02: Sockets with netcat (nc) and ncat
Lab Exercise 16.03: Packet Crafting with hping3
Lab Exercise 16.04: Packet Crafting with Scapy
Lab Analysis
Key Term Quiz
Chapter 17 Web Components, E-mail, and Instant Messaging
Lab Exercise 17.01: E-mail Headers
Lab Exercise 17.02: SPF, DKIM, and DMARC
Lab Analysis
Key Term Quiz
Chapter 18 Cloud Computing
Lab Exercise 18.01: Microsoft Azure Training
Lab Exercise 18.02: Exploring Microsoft Azure
Lab Exercise 18.03: AWS Educate and AWS Training and Certification
Lab Exercise 18.04: Exploring AWS
Lab Analysis
Key Term Quiz
Chapter 19 Secure Software Development
Lab Exercise 19.01: Configuring WampServer and DVWA
Lab Exercise 19.02: SQL Injection
Lab Analysis
Key Term Quiz
Chapter 20 Risk Management
Lab Exercise 20.01: PowerShell Script Settings
Lab Exercise 20.02: PowerShell Exploitation
Lab Analysis
Key Term Quiz
Chapter 21 Business Continuity, Disaster Recovery, and Change Management
Lab Exercise 21.01: Business Continuity
Lab Exercise 21.02: Disaster Recovery
Lab Exercise 21.03: Change Management
Lab Analysis
Key Term Quiz
Chapter 22 Incident Response
Lab Exercise 22.01: Incident Response Companies and Stories
Lab Exercise 22.02: Metasploit Framework
Lab Exercise 22.03: Metasploit's Meterpreter
Lab Exercise 22.04: Armitage
Lab Analysis
Key Term Quiz
Chapter 23 Computer Forensics
Lab Exercise 23.01: Windows Registry Forensics
Lab Exercise 23.02: Digital Evidence in RAM and on the Hard Drive
Lab Exercise 23.03: Steganography
Lab Exercise 23.04: Imaging, Recovering Deleted Files, File Signatures,
and Analyzing Images
Lab Analysis
Key Term Quiz
Chapter 24 Legal Issues and Ethics
Lab Exercise 24.01: ACM Ethics
Lab Exercise 24.02: USENIX Ethics
Lab Exercise 24.03: Ethical Scenarios
Lab Exercise 24.04: Copyright
Lab Exercise 24.05: Creative Commons
Lab Exercise 24.06: FSF and GNU
Lab Analysis
Key Term Quiz
Chapter 25 Privacy
Lab Exercise 25.01: Shodan
Lab Exercise 25.02: Insecam
Lab Exercise 25.03: Google Hacking
Lab Analysis
Key Term Quiz
Index