Principles of Computer Security Lab Manual, Fourth Edition

Principles of Computer Security Lab Manual, Fourth Edition

By (author)  , By (author)  , By (author)  , By (author)  , By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 3 business days
When will my order arrive?


Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Practice the Computer Security Skills You Need to Succeed!

40+ lab exercises challenge you to solve problems based on realistic case studies
Step-by-step scenarios require you to think critically
Lab analysis tests measure your understanding of lab results
Key term quizzes help build your vocabulary
Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines

In this Lab Manual, you'll practice

Configuring workstation network connectivity
Analyzing network communication
Establishing secure network application communication using TCP/IP protocols
Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools
Defending against network application attacks, including SQL injection, web browser exploits, and email attacks
Combatting Trojans, man-in-the-middle attacks, and steganography
Hardening a host computer, using antivirus applications, and configuring firewalls
Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec
Preparing for and detecting attacks
Backing up and restoring data
Handling digital forensics and incident response

Instructor resources available:

This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately
Virtual machine files
Solutions to the labs are not included in the book and are only available to adopting instructors
show more

Product details

  • Paperback | 384 pages
  • 213 x 274 x 20mm | 894g
  • MCGRAW-HILL Professional
  • United States
  • English
  • 4th edition
  • 110 Illustrations, unspecified
  • 0071836551
  • 9780071836555

Table of contents

Part I: Networking Basics: How Do Networks Work
1. Workstation Network Configuration and Connectivity
2. Network Transports
3. Network Applications
Part II: Vulnerabilities and Threats--How Can Systems Be Compromised
4. Penetration Testing
5. Attacks--Attacks Against Applications
6. Escalating Privilege--Sniffing, Keylogging, Password-Cracking Attacks
Part III: Prevention: How Do We Prevent Harm to Systems
7. Hardening the Host Computer
8. Securing Network Communications
Part IV: Detection and Response: How Do We Detect and Respond to Attacks
9. Preparing for and Detecting Attacks
10. Digital Forensics
show more

About Vincent J. Nestler

Vince Nestler (Pocatello, ID), CompTIA Security+, is an Adjunct Professor of network security at Capitol College. Nestler is an instructional design expert with seven years of experience developing security related labs. He is the coauthor of the first editon of Principles of Computer Security: Security+ and Beyond Lab Manual.

Matthew Hirsch, M.S. Network Security, Capitol College; B.A. Physics, State University of New York (SUNY) New Paltz. Mr. Hirsch has worked in the information security operations group for a large financial firm (which prefers to remain unnamed), data distribution for firms including Deutsche Bank and Sanwa Securities, and systems / network administration for Market Arts Software. Formerly an adjunct professor at Capitol College, Katharine Gibbs school, and DeVry, Mr. Hirsch also enjoys a long term association with Dorsai, a New York City non-prot ISP/Hosting firm.

Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklins interests are information security, systems theory, and secure software design.
show more