Home > Principles of Computer Security CompTIA Security+ and Beyond...
0 items -
eStore Cart
Shopping Cart
Now Loading
Total Saving
close X
our categories
view larger cover

Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition

© 2011
by Vincent Nestler Gregory White Wm. Arthur Conklin Matthew Hirsch Corey Schou

2nd Edition Active, In-Print 352 Pages Softcover
9780071748568 0071748563


buy now

Written by leading IT security educators, this fully updated Lab Manual supplements Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition

Principles of Computer Security Lab Manual, Second Edition, contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence to Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition.

The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the Key Term Quiz helps to build vocabulary.

Principles of Computer Security Lab Manual, Second Edition, features:

  • New, more dynamic design and a larger trim size
  • The real-world, hands-on practice you need to pass the certification exam and succeed on the job
  • Lab solutions on the textbook OLC (Online Learning Center)

All-inclusive coverage:

Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy

Part I: Networking Basics: How Do Networks Work?

Chapter 1: Workstation Network Con?guration and Connectivity

Chapter 2: TCP/UDP Basics

Chapter 3: Network Applications

Part II: Vulnerabilities and Threats - How Can Systems Be Compromised?

Chapter 4: Scanning and Enumerating the Network for Targets

Chapter 5: Attacks?Web Server, E-mail, DOS, and Trojan Attacks

Chapter 6: Escalating Privilege? Sniffing, Keylogging, Password-Cracking Attacks

Part III: Prevention: How Do We Prevent Harm to Systems?

Chapter 7: Hardening the Host Computer

Chapter 8: Securing Network Communications

Part IV: Detection and Response: How Do We Detect and Respond to Attacks?

Chapter 9: Preparing for and Detecting Attacks

Chapter 10: Digital Forensics

All requests will be pre-qualified by a McGraw-Hill representative before forwarding shipment to your university or college campus address.

Click here to request an Academic review copy.