Items related to Hands-On Information Security Lab Manual

Hands-On Information Security Lab Manual - Softcover

  • 4.18 out of 5 stars
    11 ratings by Goodreads
 
9780619216313: Hands-On Information Security Lab Manual

Synopsis

The Hands-On Information Security Lab Manual, Second Edition allows students to apply the basics of their introductory security knowledge in a hands-on environment with detailed exercises using Windows 2000, XP and Linux. This non-certification based lab manual includes coverage of scanning, OS vulnerability analysis and resolution firewalls, security maintenance, forensics, and more. A full version of the software needed to complete these projects is included on a CD with every text, so instructors can effortlessly set up and run labs to correspond with their classes. The Hands-On Information Security Lab Manual, Second Edition is a suitable resource for introductory, technical and managerial courses, and is the perfect accompaniment to Principles of Information Security, Second Edition and Management of Information Security.

"synopsis" may belong to another edition of this title.

About the Author

Michael Whitman, Ph.D., CISM, CISSP, is a professor of information systems and security in the CSIS department at Kennesaw State University, where he also serves as director of the KSU Center for Information Security Education and coordinator for the Bachelor of Science in Information Security and Assurance program. Dr. Whitman is an active researcher in information security, fair and responsible use policies, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security and data communications and is an active member of the Computer Security Institute, the Information Systems Security Association, the Georgia Electronic Commerce Association's Information Security Working Group, the Association for Computing Machinery, and the Association for Information Systems. Dr. Whitman has published articles in the industry's top journals and co-authored a number of books in the field published by Course Technology.

Herbert Mattord, M.B.A., CISM, CISSP, gained 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University in 2002. During his career as an IT practitioner, Mattord served as manager of corporate information technology security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge presented in this textbook. He currently teaches undergraduate courses in information security, data communications, local area networks, database technology, project management, and systems analysis and design. Mattord also serves as coordinator for the Bachelor of Business Administration and Certificate in Information Security and Assurance programs, as well as operations manager of the KSU Center for Information Security Education and Awareness. Mattord is the co-author of several books published by Course Technology and is an active researcher in information security management topics.

David M. Shackelford has worked as a security architect and manager for a number of large companies for over nine years, and currently runs his own consulting practice. He specializes in incident handling and response, intrusion detection and traffic analysis, and vulnerability assessment. He also writes material and grades security certification papers for this SRNS Institute. His certification include CISSP, GSEC, GCIH,G7799, MCSE, and MCIWR, and he is currently working on an MBA.

Review

1. Information Security Technical Functions. This chapter provides an overview of the technical functions typically performed by an Information Security professional, and relates those functions to the text's laboratory exercises through the use of flows. These flows illustrate the combination of individual laboratory exercise components as phased tasked in the accomplishment of the function. 2. Information Security Technical Exercise Theory. In this section the theory and overview of each laboratory exercise is presented. Where possible, additional details that facilitate understanding how the laboratory exercise works and is used is included. Footprinting. Scanning And Enumeration. OS Processes And Services. Vulnerability Identification And Research. Vulnerability Validation. System Remediation And Hardening,. Web Browser Security. File Systems Overview And Familiarization. Data Management. Data Backup And Recovery. Access Controls. Host Intrusion Detection Systems. Log Security Issues. Anti-Forensics. Software Firewalls. Hardware Firewalls and WAPs. Network Intrusion Detection Systems. Network Traffic Analysis. Virtual Private Networks And Remote Access. Digital Certificates. Password Circumvention and Management. Malware: Anti-Virus and BOT Defense. Digital Forensics u Data Acquisition. Digital Forensics - Data Analysis. 3. Windows - Based Information Security Exercises. Chapter 3 contains the detailed exercises associated with Windows-based computers. Specifically this chapter contains exercises focused on Microsoft Windows XP and Vista. Some exercises are also focused on Server OSs like Microsoft Server 2003 where applicable. Footprinting. Scanning And Enumeration. OS Processes And Services. Vulnerability Identification And Research. Vulnerability Validation. System Remediation And Hardening,. Web Browser Security. File Systems Overview And Familiarization. New. Data Management. Data Backup And Recovery. Access Controls. Host Intrusion Detection Systems. Log Security Issues. Anti-Forensics. Software Firewalls. Hardware Firewalls and WAPs. Network Intrusion Detection Systems. Network Traffic Analysis. Virtual Private Networks And Remote Access. Digital Certificates. Password Circumvention and Management. Malware: Anti-Virus and BOT Defense. Digital Forensics u Data Acquisition. Digital Forensics - Data Analysis. Chapter 4 LINUX - Based Information Security Exercises. Chapter 4 contains the detailed exercises associated with LINUX-based computers. Specifically this chapter contains exercises focused on SUSE 9.0 Workstation. Some exercises are also focused on SUSE 9.0 Server where applicable. Footprinting. Scanning And Enumeration. OS Processes And Services. Vulnerability Identification And Research. Vulnerability Validation. System Remediation And Hardening,. Web Browser Security. File Systems Overview And Familiarization. New. Data Management. Data Backup And Recovery. Access Controls. Host Intrusion Detection Systems. Log Security Issues. Anti-Forensics. Software Firewalls. Hardware Firewalls and WAPs. Network Intrusion Detection Systems. Network Traffic Analysis. Virtual Private Networks And Remote Access. Digital Certificates. Password Circumvention and Management. Malware: Anti-Virus and BOT Defense. Digital Forensics u Data Acquisition. Digital Forensics - Data Analysis. 5. Domain 3: Business Continuity and Disaster Recovery Planning. The differences between BDP and DRP and how they work together. Scoping a BCP/DRP project. Business Impact Assessment (BIA). Risk analysis. Maximum Tolerable Downtime (MTD). Recovery Point Objective (RPO). Recovery Time Objective (RTO). Ranking critical business processes. Developing the business continuity and disaster recovery plan. Emergency response. Damage assessment and salvage. Notification. Personnel safety. Communications. Public utilities and infrastructure. Logistics and supplies. Fire and water protection. Business resumption planning. Restoration and recovery. Training. Plan maintenance. DRP and BCP testing Study questions, exercises, project(s). 6. Domain 4: Cryptography. Applications and uses of cryptography. Methods of encryption. Substitution. Permutation. One time pads. Types of encryption. Block ciphers. Stream ciphers. Types of encryption keys. Shared secrets. Public key cryptography. Initialization vectors (IVs). Cryptographic systems. Key management. Message digests and hashing. Digital signatures. Non-repudiation. Cryptanalysis (attacks on cryptographic algorithms). Applications of cryptography. Network security (SSL, VPN, SET, and so on). E-mail security (S/MIME, PGP, and so on). Public key infrastructure (PKI). Alternatives (watermarking, steganography). Study questions, exercises, project(s). 7. Domain 5: Information Security and Risk Management. Goals, mission, and objectives of an organization, and how security supports them. Risk management. Security strategies. Security concepts. The CIA Triad: Confidentiality, Integrity, and Availability. Defense in depth. Single points of failure. Privacy. Security management. Security governance. Security policy. Guidelines. Standards. Procedures. Security roles and responsibilities. Security education, training, and awareness. Reporting security issues to management. Service level agreements. Secure outsourcing. Identity management. Data classification and protection. Certification and accreditation. Security operations. Security assessments. Personnel security. Professional ethics. Study questions, exercises, project(s). 8. Domain 6: Legal, Regulations, Compliance and Investigations. Computer crime laws and regulations. U.S. laws. European laws. Investigations. Determining whether a crime has been committed. Forensic techniques and procedures. Gathering evidence. Preserving evidence. Chain of evidence. Ethical issues. Codes of conduct. RFC 1087 and investigations. Applying the (ISC) code of ethics. Study questions, exercises, project(s). 9. Domain 7: Operations Security. Security operations concepts. Need to know. Least privilege. Separation of duties. Monitoring of special privileges. Job rotation. Record retention. Backups. Anti-virus and anti-malware. Remote access. Employing resource protection. Incident management. Violations and breaches. Malware attacks (viruses, worms, spyware, phishing, and so on). Reporting to law enforcement. High availability architectures. Fault tolerance. Clusters. Failover. Denial of service. Vulnerability management. Patch management. Administrative management and control. Change management. Configuration management. Study questions, exercises, project(s). 10. Domain 8: Physical (Environmental) Security. Site physical security. Site access controls. Key cards, Biometrics, Mantraps, Guards. Dogs, Fences, Surveillance. Zones of security. Loading and unloading areas. Access logs. Visible notices. Exterior lighting. Secure siting. Nearby threats. Flooding. Chemicals. Social unrest. Building marking. Protection of equipment. Theft protection. Damage protection. Earthquake bracing, and so on. Check in / check out. Cabling security. Environment security. Heating and air conditioning. Humidity. Electric power. Line conditioning. Uninterruptible power supplies. Electric generators. Study questions, exercises, project(s). 11. Domain 9: Security Architecture and Design. Security Models. Biba. Bell LaPadula. Access Matrix. Take-Grant. Clark-Wilson. Multi-level security. Mandatory access control (MAC). Discretionary access control (DAC). Security threats. Covert channels. State attacks (TOCTTOU). Emanations. Maintenance hooks, back doors, privileged programs. Countermeasures. Assurance, trust, and confidence. Trusted Computing Base (TCB). Reference monitor. Kernel. Information systems evaluation models. Common Criteria. TCSEC. ITSEC. Computer architecture. Central processor. Single and multi processor designs. Bus. Memory. Secondary storage. Study questions, exercises, project(s). 12. Domain 10: Telecommunications and Network Security. Telecommunications technologies. X.25, Frame Relay, ATM, T-1/E-1, SONET, and so on. Wireless. EVDO, 1XRTT, CDMA, GSM/GPRS, Wimax, and so on. Network technologies. Ethernet, Token ring, Bisync, RS-232, RS-449. Wireless. WiFi, Bluetooth. Network protocols. TCP/IP, IPX/SPX, ATM, and so on. Routing protocols (RIP, IGRP, OSPF, and so on). Remote access / tunneling protocols. VPN, SSL, IPSec, L2TP, PPTP, PPP, SLIP, and so on. Network authentication protocols. RADIUS, DIAMETER, CHAP, EAP, and so on. Network based threats and vulnerabilities. Attacks (DoS, DDoS, Teardrop, Smurf, PoD, worms, spam, many more). Vulnerabilities (open services, unpatched system, poor configurations, and so on). Network countermeasures. Intrusion detection systems (IDS). Intrusion prevention systems (IPS). Firewalls. Private addressing / NAT. Gateways. Access control lists. Study questions, exercises, project(s). 13. Preparing for the Exam. Understanding certification requirements. Assessing your work experience. Finding an exam near you. Registering for the exam. Starting an exam study program. Preparing for exam day. Book travel and lodging. Confirming transportation. Know the route. Parking. What to bring. 14. After Earning the Certification. Annual maintenance fees. Earning CPEs. Conferences and seminars. Training. Teaching. Writing. Volunteer opportunities. Speaking, proctoring, articles, writing exam questions. Networking with other CISSPs. Mailing lists. Forums. Web sites. 15. Glossary. Index.

"About this title" may belong to another edition of this title.

  • PublisherCengage Learning
  • Publication date2005
  • ISBN 10 061921631X
  • ISBN 13 9780619216313
  • BindingPaperback
  • LanguageEnglish
  • Edition number2
  • Number of pages448
  • Rating
    • 4.18 out of 5 stars
      11 ratings by Goodreads

Buy Used

Condition: Good
Ship within 24hrs. Satisfaction...
View this item

FREE shipping within U.S.A.

Destination, rates & speeds

Other Popular Editions of the Same Title

9781435441569: Hands-On Information Security Lab Manual

Featured Edition

ISBN 10:  1435441567 ISBN 13:  9781435441569
Publisher: Cengage Learning, 2010
Softcover

Search results for Hands-On Information Security Lab Manual

Stock Image

Whitman, Michael E.; Mattord, Herbert J.; Shackleford, Dave
Published by Cengage Learning (edition 2nd), 2005
ISBN 10: 061921631X ISBN 13: 9780619216313
Used Paperback

Seller: BooksRun, Philadelphia, PA, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Good. 2nd. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 061921631X-11-1

Contact seller

Buy Used

US$ 9.95
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Mattord, Herbert J., Whitman, Michael E., Shackleford, Dave M.
Published by Course Technology, 2005
ISBN 10: 061921631X ISBN 13: 9780619216313
Used Softcover

Seller: Better World Books, Mishawaka, IN, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Good. Used book that is in clean, average condition without any missing pages. Seller Inventory # 3363084-6

Contact seller

Buy Used

US$ 10.06
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Whitman, Michael E.; Mattord, Herbert J.; Shackleford, Dave
Published by Cengage Learning, 2005
ISBN 10: 061921631X ISBN 13: 9780619216313
Used Softcover

Seller: Hawking Books, Edgewood, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Good. Good Condition. Includes Unopened CD/DVD(s). Five star seller - Buy with confidence! Seller Inventory # X061921631XX3

Contact seller

Buy Used

US$ 11.44
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Whitman, Michael E.; Mattord, Herbert J.; Shackleford, Dave M.
Published by Course Technology, 2005
ISBN 10: 061921631X ISBN 13: 9780619216313
Used Paperback

Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.4. Seller Inventory # G061921631XI3N00

Contact seller

Buy Used

US$ 11.61
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Whitman/Mattord/Shackleford
ISBN 10: 061921631X ISBN 13: 9780619216313
Used Soft cover

Seller: James Lasseter, Jr, Brooksville, FL, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Soft cover. Condition: Very Good. Dust Jacket Condition: None. 2nd Edition. This is a sale of the lab manual only, no software is included. The reason for the slight condition downgrade is on the back cover there is a crease 4 1/2 inches long which should in no way affect use. 431 pages. 8 chapters and an index. A very serviceable copy. Again the book does not have the CD-Rom; this is a sale of the book only. Seller Inventory # 001469

Contact seller

Buy Used

US$ 11.99
Convert currency
Shipping: US$ 6.95
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Whitman, Michael E., Mattord, Herbert J., Shackleford, Dave
Published by Cengage Learning, 2005
ISBN 10: 061921631X ISBN 13: 9780619216313
New Paperback

Seller: The Book Spot, Sioux Falls, MN, U.S.A.

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

Paperback. Condition: New. Seller Inventory # Abebooks554675

Contact seller

Buy New

US$ 300.00
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket