Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title Page
Copyright Page
Dedication
Contents
Foreword
Acknowledgments
Introduction
Part I Networking Basics: How Do Networks Work?
Chapter 1 Workstation Network Configuration and Connectivity
Lab 1.1: Network Workstation Client Configuration
Lab 1.1w: Windows Client Configuration
Lab 1.1l: Linux Client Configuration
Lab 1.1 Analysis Questions
Lab 1.1 Key Terms Quiz
Lab 1.2: Computer Name Resolution
Lab 1.2w: Name Resolution in Windows
Lab 1.2 Analysis Questions
Lab 1.2 Key Terms Quiz
Lab 1.3: IPv6 Basics
Lab 1.3w: Windows IPv6 Basics (netsh/ping6)
Lab 1.3 Analysis Questions
Lab 1.3 Key Terms Quiz
Chapter 2 Network Transports
Lab 2.1: Network Communication Analysis
Lab 2.1w: Network Communication Analysis in Windows
Lab 2.1 Analysis Questions
Lab 2.1 Key Terms Quiz
Lab 2.2: Port Connection Status
Lab 2.2w: Windows-Based Port Connection Status
Lab 2.2l: Linux-Based Port Connection Status
Lab 2.2 Analysis Questions
Lab 2.2 Key Terms Quiz
Chapter 3 Network Applications
Lab 3.1: FTP Communication (FTP-HTTP)
Lab 3.1w: Windows FTP Communication (FTP-HTTP)
Lab 3.1l: Linux FTP Communication (FTP-HTTP)
Lab 3.1 Analysis Questions
Lab 3.1 Key Terms Quiz
Lab 3.2: E-mail Protocols: SMTP and POP3
Lab 3.2m: Windows E-mail: SMTP and POP3
Lab 3.2l: Linux E-mail: SMTP and POP3
Lab 3.2 Analysis Questions
Lab 3.2 Key Terms Quiz
Part II Vulnerabilities and Threats: How Can Systems Be Compromised?
Chapter 4 Penetration Testing
Lab 4.1: IP Address and Port Scanning, Service Identity Determination
Lab 4.1w: Using Nmap in Windows
Lab 4.1 Analysis Questions
Lab 4.1 Key Terms Quiz
Lab 4.2: GUI-Based Vulnerability Scanners
Lab 4.2m: Using a Vulnerability Scanner (OpenVAS)
Lab 4.2 Analysis Questions
Lab 4.2 Key Terms Quiz
Lab 4.3: Researching System Vulnerabilities
Lab 4.3i: Researching System Vulnerabilities
Lab 4.3 Analysis Questions
Lab 4.3 Key Terms Quiz
Lab 4.4: Using Metasploit
Lab 4.4l: Using the Metasploit Framework
Lab 4.4 Analysis Questions
Lab 4.4 Key Terms Quiz
Lab 4.5: Password Cracking
Lab 4.5l: Password Cracking
Lab 4.5 Analysis Questions
Lab 4.5 Key Terms Quiz
Lab 4.6: Using Cobalt Strike
Lab 4.6l: Using Cobalt Strike
Lab 4.6 Analysis Questions
Lab 4.6 Key Terms Quiz
Chapter 5 Attacks Against Applications
Lab 5.1: Web SQL Injection
Lab 5.1li: Web SQL Injection in Linux
Lab 5.1 Analysis Questions
Lab 5.1 Key Terms Quiz
Lab 5.2: Web Browser Exploits
Lab 5.2m: Web Browser Exploits
Lab 5.2 Analysis Questions
Lab 5.2 Key Terms Quiz
Lab 5.3: E-mail System Exploits
Lab 5.3m: Exploiting E-mail Vulnerabilities in Windows
Lab 5.3 Analysis Questions
Lab 5.3 Key Terms Quiz
Chapter 6 More Attacks: Trojan Attacks, Mitm, Steganography
Lab 6.1: Trojan Attacks
Lab 6.1w: Using the Dark Comet Trojan
Lab 6.1 Analysis Questions
Lab 6.1 Key Terms Quiz
Lab 6.2: Man-in-the-Middle Attack
Lab 6.2m: Man-in-the-Middle Attack
Lab 6.2 Analysis Questions
Lab 6.2 Key Terms Quiz
Lab 6.3: Steganography
Lab 6.3w: Steganography in Windows
Lab 6.3 Analysis Questions
Lab 6.3 Key Terms Quiz
Part III Prevention: How Do You Prevent Harm to Networks?
Chapter 7 Hardening the Host Computer
Lab 7.1: Hardening the Operating System
Lab 7.1w: Hardening Windows 7
Lab 7.1 Analysis Questions
Lab 7.1 Key Terms Quiz
Lab 7.2: Using Antivirus Applications
Lab 7.2w: Antivirus in Windows
Lab 7.2 Analysis Questions
Lab 7.2 Key Terms Quiz
Lab 7.3: Using Firewalls
Lab 7.3l: Configuring a Personal Firewall in Linux
Lab 7.3 Analysis Questions
Lab 7.3 Key Terms Quiz
Chapter 8 Securing Network Communications
Lab 8.1: Using GPG to Encrypt and Sign E-mail
Lab 8.1m: Using GPG in Windows
Lab 8.1 Analysis Questions
Lab 8.1 Key Terms Quiz
Lab 8.2: Using Secure Shell (SSH)
Lab 8.2l: Using Secure Shell in Linux
Lab 8.2m: Using Secure Shell in Windows
Lab 8.2 Analysis Questions
Lab 8.2 Key Terms Quiz
Lab 8.3: Using Secure Copy (SCP)
Lab 8.3l: Using Secure Copy in Linux
Lab 8.3m: Using Secure Copy in Windows
Lab 8.3 Analysis Questions
Lab 8.3 Key Terms Quiz
Lab 8.4: Using Certificates and SSL
Lab 8.4l: Using Certificates and SSL in Linux
Lab 8.4 Analysis Questions
Lab 8.4 Key Terms Quiz
Lab 8.5: Using IPsec
Lab 8.5w: Using IPsec in Windows
Lab 8.5 Analysis Questions
Lab 8.5 Key Terms Quiz
Part IV Detection and Response: How Do You Detect and Respond to Attacks?
Chapter 9 Preparing for and Detecting Attacks
Lab 9.1: System Log Analysis
Lab 9.1w: Log Analysis in Windows
Lab 9.1l: Log Analysis in Linux
Lab 9.1 Analysis Questions
Lab 9.1 Key Terms Quiz
Lab 9.2: Intrusion Detection Systems
Lab 9.2l: Using a Network Intrusion Detection System (Snort) in Linux
Lab 9.2 Analysis Questions
Lab 9.2 Key Terms Quiz
Lab 9.3: Backing Up and Restoring Data
Lab 9.3w: Backing Up and Restoring Data in Windows
Lab 9.3l: Backing Up and Restoring Data in Linux
Lab 9.3 Analysis Questions
Lab 9.3 Key Terms Quiz
Lab 9.4: Using Honeypots
Lab 9.4w: Using Honeypots in Windows
Lab 9.4 Analysis Questions
Lab 9.4 Key Terms Quiz
Chapter 10 Digital Forensics
Lab 10.1: Live Analysis: Incident Determination
Lab 10.1w: Live Analysis: Incident Determination in Windows
Lab 10.1 Analysis Questions
Lab 10.1 Key Terms Quiz
Lab 10.2: Acquiring the Data
Lab 10.2w: Acquiring the Data in Windows
Lab 10.2 Analysis Questions
Lab 10.2 Key Terms Quiz
Lab 10.3: Forensic Analysis
Lab 10.3l: Forensic Analysis in CAINE
Lab 10.3 Analysis Questions
Lab 10.3 Key Terms Quiz
Lab 10.4: Remote Image Capture
Lab 10.4l: Remote Forensic Image Capture Over a Network
Lab 10.4 Analysis Questions
Lab 10.4 Key Terms Quiz
Appendix Objectives Map: compTIA Security+™
Index
← Prev
Back
Next →
← Prev
Back
Next →