Network Defense and Countermeasures

(pearson-network-defense-complete) / ISBN : 978-1-61691-050-1
Lessons
Lab
TestPrep
AI Tutor (Add-on)
108 Reviews
Get A Free Trial

Skills You’ll Get

1

Preface

2

Introduction to Network Security

  • Introduction
  • The Basics of a Network
  • Basic Network Utilities
  • The OSI Model
  • What Does This Mean for Security?
  • Assessing Likely Threats to the Network
  • Classifications of Threats
  • Likely Attacks
  • Threat Assessment
  • Understanding Security Terminology
  • Choosing a Network Security Approach
  • Network Security and the Law
  • Using Security Resources
  • Summary
  • Test Your Skills
3

Types of Attacks

  • Introduction
  • Understanding Denial of Service Attacks
  • Defending Against Buffer Overflow Attacks
  • Defending Against IP Spoofing
  • Defending Against Session Hijacking
  • Blocking Virus and Trojan Horse Attacks
  • Summary
  • Test Your Skills
4

Fundamentals of Firewalls

  • Introduction
  • What Is a Firewall?
  • Implementing Firewalls
  • Selecting and Using a Firewall
  • Using Proxy Servers
  • Summary
  • Test Your Skills
5

Firewall Practical Applications

  • Introduction
  • Using Single Machine Firewalls
  • Windows 10 Firewall
  • User Account Control
  • Linux Firewalls
  • Using Small Office/Home Office Firewalls
  • Using Medium-Sized Network Firewalls
  • Using Enterprise Firewalls
  • Summary
  • Test Your Skills
6

Intrusion-Detection Systems

  • Introduction
  • Understanding IDS Concepts
  • IDS Components and Processes
  • Understanding and Implementing IDSs
  • Understanding and Implementing Honeypots
  • Summary
  • Test Your Skills
7

Encryption Fundamentals

  • Introduction
  • The History of Encryption
  • Learning About Modern Encryption Methods
  • Identifying Good Encryption
  • Understanding Digital Signatures and Certificates
  • Understanding and Using Decryption
  • Cracking Passwords
  • Steganography
  • Steganalysis
  • Quantum Computing and Quantum Cryptography
  • Summary
  • Test Your Skills
8

Virtual Private Networks

  • Introduction
  • Basic VPN Technology
  • Using VPN Protocols for VPN Encryption
  • IPSec
  • SSL/TLS
  • Implementing VPN Solutions
  • Summary
  • Test Your Skills
9

Operating System Hardening

  • Introduction
  • Configuring Windows Properly
  • Configuring Linux Properly
  • Patching the Operating System
  • Configuring Browsers
  • Summary
  • Test Your Skills
10

Defending Against Virus Attacks

  • Introduction
  • Understanding Virus Attacks
  • Virus Scanners
  • Antivirus Policies and Procedures
  • Additional Methods for Defending Your System
  • What to Do If Your System Is Infected by a Virus
  • Summary
  • Test Your Skills
11

Defending against Trojan Horses, Spyware, and Adware

  • Introduction
  • Trojan Horses
  • Spyware and Adware
  • Summary
  • Test Your Skills
12

Security Policies

  • Introduction
  • Defining User Policies
  • Defining System Administration Policies
  • Defining Access Control
  • Defining Developmental Policies
  • Summary
  • Test Your Skills
  • Projects
13

Assessing System Security

  • Introduction
  • Risk Assessment Concepts
  • Evaluating the Security Risk
  • Conducting the Initial Assessment
  • Probing the Network
  • Vulnerabilities
  • McCumber Cube
  • Security Documentation
  • Summary
  • Test Your Skills
14

Security Standards

  • Introduction
  • COBIT
  • ISO Standards
  • NIST Standards
  • U.S. DoD Standards
  • Using the Orange Book
  • Using the Rainbow Series
  • Using the Common Criteria
  • Using Security Models
  • U.S. Federal Regulations, Guidelines, and Standards
  • Summary
  • Test Your Skills
15

Physical Security and Disaster Recovery

  • Introduction
  • Physical Security
  • Disaster Recovery
  • Ensuring Fault Tolerance
  • Summary
  • Test Your Skills
16

Techniques Used by Attackers

  • Introduction
  • Preparing to Hack
  • The Attack Phase
  • Wi-Fi Hacking
  • Summary
  • Test Your Skills
17

Introduction to Forensics

  • Introduction
  • General Forensics Guidelines
  • FBI Forensics Guidelines
  • Finding Evidence on the PC
  • Gathering Evidence from a Cell Phone
  • Forensic Tools to Use
  • Forensic Science
  • To Certify or Not to Certify?
  • Summary
  • Test Your Skills
18

Cyber Terrorism

  • Introduction
  • Defending Against Computer-Based Espionage
  • Defending Against Computer-Based Terrorism
  • Choosing Defense Strategies
  • Summary
  • Test Your Skills

1

Introduction to Network Security

  • Assigning Different Classes of IP Addresses
  • Viewing the MAC Address on Different Interfaces
  • Understanding Protocols
  • Tracing Route Using tracert
  • Using the netstat Command
2

Types of Attacks

  • Conducting a DoS Attack Using a SYN Flood
  • Conducting a DoS Attack Using the Smurf Attack
  • Defending Against a Buffer Overflow Attack
  • Defending against IP Spoofing
  • Performing Session Hijacking Using Burp Suite
  • Installing Antivirus Software
  • Scanning and Classifying Different Types of Viruses
3

Fundamentals of Firewalls

  • Creating ACL in the Router
  • Using Windows Firewall
  • Creating a DMZ Zone
4

Firewall Practical Applications

  • Configuring User Access Control Settings
  • Configuring a Linux Firewall Using the Iptable
  • Using the Cisco ASA Firewall
5

Intrusion-Detection Systems

  • Intercepting Packets
  • Configuring Snort
  • Setting Up a Honeypot
6

Encryption Fundamentals

  • Using a Symmetric Algorithm
  • Using an Asymmetric Algorithm
  • Observing a Digital Certificate
  • Creating a PGP Certification
  • Using the John the Ripper Tool
  • Using Rainbow Tables
  • Hiding Text Using Steganography
7

Virtual Private Networks

  • Setting Up a VPN Server with Windows Server 2016
  • Creating an L2TP VPN Using Openswan
  • Configuring IPSec
8

Operating System Hardening

  • Configuring a User Account
  • Setting Security Policies
  • Using Registry Editor
  • Configuring the Security Setting in a Popular Browser
  • Using Encryption File System
  • Restricting the Null Session
  • Shutting Down a Service in Windows
9

Defending Against Virus Attacks

  • Creating a Remote Access Trojan (RAT)
  • Performing Malware Scanning
10

Defending against Trojan Horses, Spyware, and Adware

  • Using the NetBus Application
  • Using eLiTeWrap
  • Using an Anti-Spyware Tool
11

Security Policies

  • Defining User Access Control
  • Managing a User Using an Existing Security Policy
  • Examining Security Policy
  • Creating a Security Policy
12

Assessing System Security

  • Filtering Ports Using Windows Firewall
  • Using the Advanced IP Scanner
  • Conducting Vulnerability Scanning Using Nessus
  • Using MBSA
  • Configuring Windows Update
13

Security Standards

  • Observing the Security Event Log
14

Techniques Used by Attackers

  • Conducting Passive Scanning Using Netcraft
  • Conducting Active Scanning Using Nsauditor
  • Using ShareEnum
  • Performing Active Scanning Using Nmap
  • Cracking Windows Password Using Ophcrack
  • Performing the SQL Injection
15

Introduction to Forensics

  • Observing the Windows Log
  • Retrieving Deleted Files Using Disk Digger
  • Performing Logical Imaging Using AccessData FTK Imager
16

Cyber Terrorism

  • Using BitLocker in Windows 10
  • Using EtherDetect

Why Do Learners Love This Course?

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top