Network Defense and Counter Measure 4e Lab

(NETWRK-DEFENSE.AB2.0L0)
Lab
Get A Free Trial

Skills You’ll Get

1

Introduction to Network Security

  • Viewing the MAC Address on Different Interfaces
  • Configuring a Class C IP Address
  • Configuring a Class B IP Address
  • Configuring a Class A IP Address
  • Using Command-Line Tools
  • Analyzing Malware
2

Types of Attacks

  • Conducting a DoS Attack Using a Smurf Attack
  • Performing DoS Attacks with a SYN Flood
  • Defending Against a Buffer Overflow Attack
  • Conducting IP Spoofing
  • Performing Session Hijacking Using Burp Suite
3

Fundamentals of Firewalls

  • Creating a DMZ Zone
  • Using Windows Firewall
  • Configuring a Proxy Server
4

Firewall Practical Applications

  • Configure User Access Control Settings
  • Configuring a Linux Firewall Using iptables
5

Intrusion-Detection Systems

  • Performing IDS Configuration with Snort
  • Setting up a Honeypot
6

Encryption Fundamentals

  • Examining Asymmetric Encryption
  • Performing Symmetric Information
  • Creating PGP Certification
  • Observing an MD5-Generated Hash Value
  • Observing a SHA256-Generated Hash Value
  • Adding a Digital Certificate
  • Cracking a Password using John the Ripper Tool
  • Using Rainbow Tables
  • Hiding Text using Steganography
7

Virtual Private Networks

  • Configuring a VPN
  • Setting Up a VPN Server with Windows Server 2016
  • Creating an L2TP VPN Using Openswan
  • Configuring IPSec
8

Operating System Hardening

  • Shutting Down a Service in Windows
  • Restricting the Null Session
  • Using Registry Editor
  • Configuring a Account Lockout Policy
  • Configuring a User Account
  • Setting Security Policies
  • Configuring the Security Setting in a Popular Browser
9

Defending Against Virus Attacks

  • Creating a Remote Access Trojan (RAT)
10

Defending Against Trojan Horses and Phishing

  • Using eLiTeWrap
  • Using the NetBus Application
  • Performing a Phishing Attack
11

Security Policies

  • Managing a User Using an Existing Security Policy
12

Assessing System Security

  • Filtering Ports Using Windows Firewall
  • Performing Vulnerability Scanning Using OpenVAS
  • Using Shodan to Find Webcams
  • Using OWASP ZAP
  • Conducting Vulnerability Scanning Using Nessus
  • Using the Advanced IP Scanner
  • Examining Open Source Security Testing Methodology Manual
13

Physical Security and Disaster Recovery

  • Taking a Full Backup
  • Taking an Incremental Backup
14

Techniques Used by Attackers

  • Conducting Passive Scanning Using Netcraft
  • Attacking a Website Using XSS Injection
  • Exploiting a Website Using SQL Injection
  • Cracking Windows Password Using Ophcrack
15

Introduction to Forensics

  • Using FTK Imager
  • Using Operating System Utilities in Windows
16

Cyber Warfare and Terrorism

  • Using BitLocker
  • Using EtherDetect
  • Capturing a Packet Using Wireshark

Related Courses

All Courses
scroll to top