Scroll to top button

Network Defense and Countermeasures, 3e

Understand the concepts of network security defense with the Network Defense and Countermeasures: Principles and Practices course and performance-based labs. Performance-based labs simulate real-world, hardware, software and command line interface environments and can be mapped to any text-book, course and training. The Network Defense and Countermeasures complete study guide offers coverage of all the techniques and methodologies related to network defense and gives you knowledge about firewalls, practical application applications of firewalls, intrusion detection systems, and many more.

Here's what you will get

Lessons
Lessons
18+
Quizzes
253+
Flashcards
203+
Glossary of terms
204+
Test prep
Pre-assessment Questions
100+
Post-Assessment Questions
100+
Lab
Performance lab
Learn the real world skills using Live Labs.
66+

Here's what you will learn

  • Introduction
  • The Basics of a Network
  • Basic Network Utilities
  • The OSI Model
  • What Does This Mean for Security?
  • Assessing Likely Threats to the Network
  • Classifications of Threats
  • Likely Attacks
  • Threat Assessment
  • Understanding Security Terminology
  • Choosing a Network Security Approach
  • Network Security and the Law
  • Using Security Resources
  • Summary
  • Test Your Skills
  • Introduction
  • Understanding Denial of Service Attacks
  • Defending Against Buffer Overflow Attacks
  • Defending Against IP Spoofing
  • Defending Against Session Hijacking
  • Blocking Virus and Trojan Horse Attacks
  • Summary
  • Test Your Skills
  • Introduction
  • What Is a Firewall?
  • Implementing Firewalls
  • Selecting and Using a Firewall
  • Using Proxy Servers
  • Summary
  • Test Your Skills
  • Introduction
  • Using Single Machine Firewalls
  • Windows 10 Firewall
  • User Account Control
  • Linux Firewalls
  • Using Small Office/Home Office Firewalls
  • Using Medium-Sized Network Firewalls
  • Using Enterprise Firewalls
  • Summary
  • Test Your Skills
  • Introduction
  • Understanding IDS Concepts
  • IDS Components and Processes
  • Understanding and Implementing IDSs
  • Understanding and Implementing Honeypots
  • Summary
  • Test Your Skills
  • Introduction
  • The History of Encryption
  • Learning About Modern Encryption Methods
  • Identifying Good Encryption
  • Understanding Digital Signatures and Certificates
  • Understanding and Using Decryption
  • Cracking Passwords
  • Steganography
  • Steganalysis
  • Quantum Computing and Quantum Cryptography
  • Summary
  • Test Your Skills
  • Introduction
  • Basic VPN Technology
  • Using VPN Protocols for VPN Encryption
  • IPSec
  • SSL/TLS
  • Implementing VPN Solutions
  • Summary
  • Test Your Skills
  • Introduction
  • Configuring Windows Properly
  • Configuring Linux Properly
  • Patching the Operating System
  • Configuring Browsers
  • Summary
  • Test Your Skills
  • Introduction
  • Understanding Virus Attacks
  • Virus Scanners
  • Antivirus Policies and Procedures
  • Additional Methods for Defending Your System
  • What to Do If Your System Is Infected by a Virus
  • Summary
  • Test Your Skills
  • Introduction
  • Trojan Horses
  • Spyware and Adware
  • Summary
  • Test Your Skills
  • Introduction
  • Defining User Policies
  • Defining System Administration Policies
  • Defining Access Control
  • Defining Developmental Policies
  • Summary
  • Test Your Skills
  • Projects
  • Introduction
  • Risk Assessment Concepts
  • Evaluating the Security Risk
  • Conducting the Initial Assessment
  • Probing the Network
  • Vulnerabilities
  • McCumber Cube
  • Security Documentation
  • Summary
  • Test Your Skills
  • Introduction
  • COBIT
  • ISO Standards
  • NIST Standards
  • U.S. DoD Standards
  • Using the Orange Book
  • Using the Rainbow Series
  • Using the Common Criteria
  • Using Security Models
  • U.S. Federal Regulations, Guidelines, and Standards
  • Summary
  • Test Your Skills
  • Introduction
  • Physical Security
  • Disaster Recovery
  • Ensuring Fault Tolerance
  • Summary
  • Test Your Skills
  • Introduction
  • Preparing to Hack
  • The Attack Phase
  • Wi-Fi Hacking
  • Summary
  • Test Your Skills
  • Introduction
  • General Forensics Guidelines
  • FBI Forensics Guidelines
  • Finding Evidence on the PC
  • Gathering Evidence from a Cell Phone
  • Forensic Tools to Use
  • Forensic Science
  • To Certify or Not to Certify?
  • Summary
  • Test Your Skills
  • Introduction
  • Defending Against Computer-Based Espionage
  • Defending Against Computer-Based Terrorism
  • Choosing Defense Strategies
  • Summary
  • Test Your Skills

Hands on Activities (Labs)

  • Assigning different classes of IP Addresses
  • Viewing MAC Address on Different Interfaces
  • Understanding Protocols
  • Tracing Route using tracert
  • Using netstat
  • Reviewing Threat Assessment Report
  • Conducting a Dos Attack using SYN Flood
  • Conducting a Dos Attack using Smurf Attack
  • Defending against a Buffer Overflow Attack
  • Conducting IP Spoofing
  • Defending against Session Hijacking
  • Installing an Antivirus Software
  • Scanning & Classifying different types of Viruses
  • Configuring the Router Access List
  • Using the Windows Firewall
  • Creating a DMZ Zone
  • Configuring User Access Control Setting
  • Configuring Linux Firewall using Iptables
  • Using CISCO ASA Firewall
  • Intercepting Packets
  • Configuring Snort
  • Setting up Honeypot on Kali Linux
  • Using a Symmetric Algorithm
  • Using an Asymmetric Algorithm
  • Observing Digital Certification
  • Creating PGP Certification
  • Using John the Ripper
  • Using Rainbow Table
  • Hiding text using Steganography
  • Setting Up a VPN Server with Windows Server 2016
  • Creating L2TP VPN using Openswan
  • Configuring IPSec
  • Configuring a User Account
  • Setting Security Policies
  • Using Registry Editor
  • Configuring Security Setting in a Popular Browser
  • Using Encryption File System
  • Restricting Null Session
  • Shutting Down a Service in Windows
  • Creating a Remote Access Trojan (RAT)
  • Using Different Virus Scanning Technique
  • Performing Malware Scanning
  • Using the NetBus Application
  • Using eLiTeWrap
  • Using Anti-Spyware Tool
  • Defining User Access Control
  • Managing User using Existing Security Policy
  • Examining Security Policy
  • Creating Security Policy
  • Port Filtering using Windows Firewall
  • Using the Advanced IP Scanner
  • Network Scanning using Nessus
  • Using MBSA
  • Configuring Windows Update
  • Observing Security Event log
  • Conducting Passive Scanning using Netcraft
  • Conducting Active Scanning using Nsauditor
  • Using ShareEnum
  • Performing Active Scanning using Nmap  
  • Windows Password Cracking using ophcrack
  • Performing SQLi Injection
  • Observing Windows Log
  • Retrieving Deleted File using Disk Digger
  • Logical Imaging using AccessData FTK Imager
  • Using Bitlocker
  • Using EtherDetect
pearson-network-defense-complete pearson-network-defense-complete
pearson-network-defense-complete
Network Defense and Countermeasures, 3e
ISBN : 9781616910501
Rating :
(16)