Wiley Pathways Network Security Fundamentals Project Manual
Buy Rights Online Buy Rights

Rights Contact Login For More Details

  • Wiley

More About This Title Wiley Pathways Network Security Fundamentals Project Manual

English

You can get there

The Network Security Fundamentals Project Manual offers a wealth of easy-to-read, practical, and up-to-date activities that reinforce fundamental network security concepts. You will develop the core competencies and skills you'll need in the real world, including how to:
* Install Network Monitor and capture traffic
* Encrypt files using folder properties and the cipher command
* Install and use Certificate Services
* Configure an IPsec policy that requires authentication and encryption
* Use RSoP to view effective policy settings
* Configure Automatic Updates using the System utility and Group Policy
* Choose an IDS and position it on a network

With five to seven projects per chapter ranging from easy to more advanced, the Network Security Fundamentals Project Manual is ideal for both traditional and online courses and is an excellent companion to Cole's Network Security Fundamentals ISBN: 978-0-470-10192-6.

Wiley Pathways helps you achieve your goals

The texts and project manuals in this series offer a coordinated curriculum for learning information technology. Learn more at www.wiley.com/go/pathways.

English

Rachelle Reese has been designing and developing technical training courses for over ten years and has written a number of books on programming. She has an MA from San Jose State University. She is also a Microsoft Certified Application Developer (MCAD).

English

1. Computer and Network Security Principles

1.1. Identifying and Analyzing Risk 2

1.2. Installing Windows XP Professional 6

1.3. Installing Windows Server 2003 9

1.4. Using Microsoft Security Baseline Analyzer 13

1.5. Viewing Local Security Policy 18

1.6. Creating a Written Security Policy 24

2. Network and Server Security

2.1. Managing Server Roles 28

2.2. Managing Services and Ports 34

2.3. Using Network Monitor 38

2.4. Configuring Windows Firewall 42

2.5. Designing Border Security 45

3. Cryptography

3.1. Understanding Cryptography Concepts 48

3.2. Managing Driver Signing 49

3.3. Using Encrypting File System 53

3.4. Installing Certificate Services 57

3.5. Managing Certificate Authority Trusts 63

3.6. Requesting and Issuing Certificates 67

3.7. Revoking Certificates 70

4. Authentication

4.1. Comparing Credentials 75

4.2. Creating User Accounts 76

4.3. Configuring an Active Directory Domain Controller 82

4.4. Joining a Domain 89

4.5. Managing Password and Account Lockout Policies 93

4.6. Managing Authentication Protocols 101

4.7. Managing Logon Restrictions 103

5. Authorization and Access Control

5.1. Comparing Access Control Models 111

5.2. Managing Groups 112

5.3. Assigning Permissions 117

5.4. Troubleshooting Effective Permissions 125

5.5. Viewing User Right Assignments 129

6. Securing Network Transmission

6.1. Designing Network Perimeters 133

6.2. Implementing IP Address Filtering on IIS 135

6.3. Using IPsec Default Policies 139

6.4. Implementing Packet Filtering with IPsec 143

6.5. Implementing IPsec Encryption 150

7. Remote Access and Wireless Security

7.1. Understanding Remote Access Protocols and Wireless Security 156

7.2. Designing Remote Access and Wireless Access 158

7.3. Enabling Routing and Remote Access 160

7.4. Configuring a Dial-up Client 166

7.5. Configuring a VPN Client 171

7.6. Defining Remote Access Policies 176

8. Server Roles and Security

8.1. Using Default Templates 183

8.2. Creating and Applying a Baseline Template 188

8.3. Creating and Applying an Incremental Template 193

8.4. Securing DNS 197

8.5. Securing a File Server 203

8.6. Securing a Web and FTP Server 209

9. Protecting Against Malware

9.1. Identifying Malware 217

9.2. Comparing Antivirus, Anti-Spyware, and Anti-Malware Programs 218

9.3. Creating a Managed Computer 221

9.4. Securing Internet Explorer 224

9.5. Securing Outlook Express 232

10. Ongoing Security Management

10.1. Configuring Automatic Updates 237

10.2. Configuring Auditing 241

10.3. Using Event Viewer 245

10.4. Performing Remote Management with MMC 250

10.5. Using Telnet 256

10.6. Using Remote Desktop for Administration 260

11. Disaster Recovery and Fault Tolerance

11.1. Planning for the Worst 264

11.2. Responding to a Security Incident 270

11.3. Configuring Backups 272

11.4. Planning a RAID Configuration 282

11.5. Eliminating Single Points of Failure 284

12. Intrusion Detection and Forensics

12.1. Understanding Terminology 288

12.2. Comparing Intrusion Detection System Types 290

12.3. Investigating the Honeynet Project 292

12.4. Using Forensics Tools 294

12.5. Investigating an Attack 299

loading