Index Glossary
  • Objectives
    • 1.1 Basic Access
    • 1.2 Tokens
    • 1.3 Biometrics
    • 1.4 Authentication Protocol
    • 1.5 Kerberos
    • 1.6 Access Controls
    • 1.7 Security Tools
  • Summary
  • Exercise
  • Quiz
  • Lab 1: Event Viewer
  • Objectives
    • 2.1 Denial of Service
    • 2.2 Distributed Denial of Service
    • 2.3 Identity Theft
    • 2.4 Identity Attacks
    • 2.5 Common Attacks
    • 2.6 Malicious Code
    • 2.7 Code Injection Attacks
    • 2.8 Phishing Attacks
  • Summary
  • Exercise
  • Quiz
  • Lab 2: Security Updates
  • Objectives
    • 3.1 Wireless Communication
    • 3.2 Virtual Private Networks
    • 3.3 Authentication and Accounting
  • Summary
  • Exercise
  • Quiz
  • Lab 3: WEP Security Protocol
  • Objectives
    • 4.1 E-mail
    • 4.2 Web Traffic SSL/TLS
  • Summary
  • Exercise
  • Quiz
  • Lab 4: Internet Options Security
  • Objectives
    • 5.1 Web Attacks
    • 5.2 Scripting Languages
  • Summary
  • Exercise
  • Quiz
  • Lab 5: Deleting Cookies
  • Objectives
    • 6.1 Authentication Services
    • 6.2 LDAP in Practice
  • Summary
  • Exercise
  • Quiz
  • Objectives
    • 7.1 Authentication Services
    • 7.2 FTP Security
    • 7.3 Packet Sniffing
    • 7.4 Instant Messaging
    • 7.5 Wireless Communication
    • 7.6 Protocols
  • Summary
  • Exercise
  • Quiz
  • Objectives
    • 8.1 Designing the Infrastructure
    • 8.2 Firewalls
    • 8.3 Routers
    • 8.4 Switches
    • 8.5 Wireless Infrastructure
    • 8.6 Modems
    • 8.7 Remote Access Services (RAS)
    • 8.8 Telecom/PBX
    • 8.9 Virtual Private Network (VPN)
    • 8.10 The Physical Environmental
  • Summary
  • Exercise
  • Quiz
  • Objectives
    • 9.1 Media Vulnerabilities
    • 9.2 The Nature of the Threat
    • 9.3 Storage Media Security
  • Summary
  • Exercise
  • Quiz
  • Objectives
    • 10.1 NAT
    • 10.2 DMZ
    • 10.3 Intranets and Extranets
    • 10.4 VLANs
    • 10.5 Tunneling
    • 10.6 Virtualization
  • Summary
  • Exercise
  • Quiz
  • Objectives
    • 11.1 Intro to Intrusion Detection
    • 11.2 IDS Technologies
  • Summary
  • Exercise
  • Quiz
  • Objectives
    • 12.1 Security Documentation
    • 12.2 Network Hardening
    • 12.3 E-mail and News Servers
    • 12.4 Data Repositories
    • 12.5 Security Checklist
  • Summary
  • Exercise
  • Quiz
  • Objectives
    • 13.1 Cryptography Concepts
    • 13.2 Key Management
  • Summary
  • Exercise
  • Quiz
  • Objectives
    • 14.1 Basics of Operational Security
    • 14.2 Disaster Recovery
    • 14.3 Business Continuity Planning
    • 14.4 Redundancy & Fault Tolerance
  • Summary
  • Exercise
  • Quiz
  • Objectives
    • 15.1 Security Policy
    • 15.2 Employee Diligence
    • 15.3 Password Management
    • 15.4 Disposal/Termination
    • 15.5 Incident Response Policy
    • 15.6 Policy Implementation
  • Summary
  • Exercise
  • Quiz
  • Objectives
    • 16.1 Documentation
    • 16.2 Education
    • 16.3 Privilege Management
    • 16.4 Risk Management
    • 16.5 Forensic
  • Summary
  • Exercise
  • Quiz

Trademark Statement