Computer security lab manual /
Vincent J. Nestler ... [et al.].
- Boston : McGraw-Hill Irwin, c2006.
- xix, 759 p. : ill. ; 24 cm.
- Information assurance & security series .
Table of Content SECTION 1 NETWORKING BASICS: HOW DO NETWORKS WORK? Chapter 1 WORKSTATION NETWORK CONFIGURATION AND CONNECTIVITY Lab1: Network workstation client configuration Lab2: Computer name resolution Lab3: Network routing basics Lab4: Network communication analysis
Chapter 3 NETWORK APPLICATIONS Lab7: FTP communication Lab8: Port connection status Lab9: E-mail protocols_SMTP and POP Lab10: E-mail client software
SECTION 2 VULNERABILITIES AND THREATS _ HOW CAN NETWORKS BE COMPROMISED? Chapter 4 SCANNING AND ENUMERATING THE NETWORK FOR TARGETS Lab12: IP address and port scanning, service identity determination Lab14: GUI-Based vulnerability scanners
Chapter 5 ATTACKS - WEB SERVER, E-MAIL,DOS, AND TROJAN ATTACKS Lab15: Web server exploits Lab16: E-mail system exploits Lab17: Denial of service exploits Lab18: Trojan attacks
SECTION 3 REVENTION-HOW DO WE PREVENT HARM TO NETWORKS? Chapter 7 HARDENING THE HOST COMPUTER Lab24: Hardening the operating system Lab25: Windows XP service pack 2 Lab26: Using anti-virus applications Lab27: Using firewalls
Chapter 8 SECURING NETWORK COMMUNICATIONS Lab28: Using GPG to encrypt and sign e-mail Lab29: using secure shell Lab30: using secure copy Lab31: Using certificates and SSL etc.
SECTION 4 DETECTION AND RESPONSE-HOW DO WE DETECT AND RESPOND TO ATTACKS? Chapter 9 PREPARING FOR AND DETECTING ATTACKS Lab33: System log file analysis Lab34: Intrusion detection systems Lab35: Using honeypots Lab36: Detecting spyware
Chapter 10 DIGITAL FORENSICS Lab 38: Initial Response--Incident Determination Lab 39: Acquiring the Data Lab 40: Forensic Analysis