Shopping cart
Your cart empty!
Terms of use dolor sit amet consectetur, adipisicing elit. Recusandae provident ullam aperiam quo ad non corrupti sit vel quam repellat ipsa quod sed, repellendus adipisci, ducimus ea modi odio assumenda.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Do you agree to our terms? Sign up
Practice the Computer Security Skills You Need to Succeed!
40+ lab exercises challenge you to solve problems based on realistic case studies
Step-by-step scenarios require you to think critically
Lab analysis tests measure your understanding of lab results
Key term quizzes help build your vocabulary
Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines
In this Lab Manual, you'll practice
Configuring workstation network connectivity
Analyzing network communication
Establishing secure network application communication using TCP/IP protocols
Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools
Defending against network application attacks, including SQL injection, web browser exploits, and email attacks
Combatting Trojans, man-in-the-middle attacks, and steganography
Hardening a host computer, using antivirus applications, and configuring firewalls
Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec
Preparing for and detecting attacks
Backing up and restoring data
Handling digital forensics and incident response
Instructor resources available:
This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately
Virtual machine files
Solutions to the labs are not included in the book and are only available to adopting instructors
Comments