About the Author
Vince Nestler, CompTIA Security+, CCNA, MCSE, RHCE (Pocatello, ID) is an Adjunct Professor of network security at Capitol College. Nestler is an instructional design expert with seven years of experience developing security related labs. He is the coauthor of the first editon of Principles of Computer Security: Security+ and Beyond Lab Manual.Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklins interests are information security, systems theory, and secure software design.Greg White (San Antonio, TX), Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA, and was the author of the first edition of the Security+ All-in-One Exam Guide from McGraw-Hill.
Table of Contents
Section 1 Networking Basics – How do networks work?
Chapter 1 Workstation Network Configuration and Connectivity
Chapter 2 TCP/UDP Basics
Chapter 3 Network Applications
Section 2 – Vulnerabilities and Threats – How can networks be compromised?
Chapter 4 Scanning and Enumerating the Network for Targets
Chapter 5 Attacks-Web Server, Email, DOS and Trojan Attacks
Chapter 6 Escalating Privilege-Sniffing, Keylogging, Password Cracking Attacks
Section 3 – Prevention – How do we prevent Harm to Networks?
Chapter 7 Hardening the Host Computer
Chapter 8 Securing Network Communications
Section 4 – Detection and Response – How do we detect and respond to attacks?
Chapter 9 Preparing for and Detecting Attacks
Chapter 10 – Digital Forensics
Appendix - Lab Setup Instructions