CSC-245 Network Defense

(TUI-CSC-245.AB3) / ISBN : 978-1-64459-785-9
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction to Network Security

  • The Basics of a Network
  • Basic Network Utilities
  • The OSI Model
  • What Does This Mean for Security?
  • Assessing Likely Threats to the Network
  • Classifications of Threats
  • Likely Attacks
  • Threat Assessment
  • Understanding Security Terminology
  • Choosing a Network Security Approach
  • Network Security and the Law
  • Using Security Resources
  • Understanding Denial of Service Attacks
  • Defending Against Buffer Overflow Attacks
  • Defending Against IP Spoofing
  • Defending Against Session Hijacking
  • Blocking Virus and Trojan Horse Attacks
  • What Is a Firewall?
  • Implementing Firewalls
  • Firewall Deployment
  • Selecting and Using a Firewall
  • Using Proxy Servers
  • Using Single Machine Firewalls
  • Windows 10 Firewall
  • User Account Control
  • Linux Firewalls
  • Using Small Office/Home Office Firewalls
  • Using Medium-Sized Network Firewalls
  • Using Enterprise Firewalls
  • Understanding IDS Concepts
  • IDS Components and Processes
  • SIEM
  • Evasion Techniques
  • Understanding and Implementing IDSs
  • Understanding and Implementing Honeypots
2

Encryption Fundamentals and Operating System Hardening

  • The History of Encryption
  • Learning About Modern Encryption Methods
  • Identifying Good Encryption
  • Understanding Digital Signatures and Certificates
  • Understanding and Using Decryption
  • Cracking Passwords
  • Steganography
  • Steganalysis
  • Quantum Computing and Quantum Cryptography
  • Basic VPN Technology
  • Using VPN Protocols for VPN Encryption
  • IPsec
  • SSL/TLS
  • Other VPN Protocols
  • Implementing VPN Solutions
  • Configuring Windows Properly
  • Configuring Linux Properly
  • Patching the Operating System
  • Configuring Browsers
  • Understanding Virus Attacks
  • Virus Scanners
  • Antivirus Policies and Procedures
  • Additional Methods for Defending Your System
  • What to Do If Your System Is Infected by a Virus
  • Trojan Horses
  • Phishing
3

Security Policies and Standards

  • ISO 27002
  • Important Standards
  • Defining User Policies
  • Defining System Administration Policies
  • Defining Access Control
  • Defining Developmental Policies
  • Disaster Recovery
  • Risk Assessment Concepts
  • Evaluating the Security Risk
  • Conducting the Initial Assessment
  • Probing the Network
  • Vulnerabilities
  • McCumber Cube
  • Security Documentation
  • COBIT
  • ISO Standards
  • NIST Standards
  • U.S. DoD Standards
  • Using the Common Criteria
  • Using Security Models
  • U.S. Federal Regulations, Guidelines, and Standards
  • Physical Security
  • Disaster Recovery
  • Ensuring Fault Tolerance
4

Cyber Warfare and Terrorism

  • Preparing to Hack
  • The Attack Phase
  • Session Hijacking
  • Wi-Fi Hacking
  • Bluetooth Hacking
  • General Forensics Guidelines
  • FBI Forensics Guidelines
  • Imaging a Drive
  • Finding Evidence on the PC
  • Gathering Evidence from a Cell Phone
  • Forensic Tools to Use
  • Forensic Science
  • To Certify or Not to Certify?
  • Expert Witnesses
  • Additional Types of Forensics
  • Defending Against Computer-Based Espionage
  • Defending Against Computer-Based Terrorism
  • Choosing Defense Strategies

1

Introduction to Network Security

  • Configuring an IPv6 Address
  • Configuring a CIDR-Based IP Address
  • Viewing the MAC Address on Different Interfaces
  • Using Command-Line Tools
  • Analyzing Malware
  • Conducting a DoS Attack Using a Smurf Attack
  • Performing DoS Attacks with a SYN Flood
  • Defending Against a Buffer Overflow Attack
  • Conducting IP Spoofing
  • Performing Session Hijacking Using Burp Suite
  • Creating a DMZ Zone
  • Using Windows Firewall
  • Configuring a Proxy Server
  • Configure User Access Control Settings
  • Configuring a Linux Firewall Using iptables
  • Performing IDS Configuration with Snort
  • Setting up a Honeypot
2

Encryption Fundamentals and Operating System Hardening

  • Examining Asymmetric Encryption
  • Performing Symmetric Information
  • Creating PGP Certification
  • Observing an MD5-Generated Hash Value
  • Observing a SHA256-Generated Hash Value
  • Adding a Digital Certificate
  • Cracking a Password Using Medusa
  • Cracking a Password using John the Ripper Tool
  • Using Rainbow Tables
  • Hiding Text using Steganography
  • Configuring a VPN
  • Setting Up a VPN Server with Windows Server 2016
  • Creating an L2TP VPN Using Openswan
  • Configuring IPSec
  • Encrypting Files and Folders Using EFS
  • Shutting Down a Service in Windows
  • Restricting the Null Session
  • Using Registry Editor
  • Configuring a Account Lockout Policy
  • Configuring a User Account
  • Setting Security Policies
  • Configuring the Security Setting in a Popular Browser
  • Creating a Remote Access Trojan (RAT)
  • Connecting to a Remote Computer Using the Remote Desktop Connection
  • Using eLiTeWrap
  • Using the NetBus Application
  • Performing a Phishing Attack
3

Security Policies and Standards

  • Managing a User Using an Existing Security Policy
  • Filtering Ports Using Windows Firewall
  • Scanning for Vulnerabilities Using Nikto
  • Using Nmap for Network Scanning
  • Conducting Vulnerability Scanning Using Nessus
  • Performing Vulnerability Scanning Using OpenVAS
  • Using Shodan to Find Webcams
  • Using OWASP ZAP
  • Using the Advanced IP Scanner
  • Examining Open Source Security Testing Methodology Manual
  • Taking a Full Backup
  • Taking an Incremental Backup
4

Cyber Warfare and Terrorism

  • Conducting Passive Scanning Using Netcraft
  • Attacking a Website Using XSS Injection
  • Exploiting a Website Using SQL Injection
  • Cracking Windows Password Using Ophcrack
  • Using FTK Imager
  • Using Operating System Utilities in Windows
  • Using BitLocker
  • Using EtherDetect
  • Capturing a Packet Using Wireshark

Related Courses

All Courses
scroll to top