Limit search to available items
Record 24 of 30
Previous Record Next Record
Book Cover
Book
Author Miller, David, 1959 November 5-

Title Security administrator street smarts : a real world guide to Comp TIA security+ skills certification and beyond / David R. Miller, Michael Gregg
Edition Third edition
Published Indianapolis : Wiley Pub., [2011]
©2011

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Mil/Sas 2011  AVAILABLE
 MELB  005.8 Mil/Sas 2011  AVAILABLE
Description xlii, 580 pages : illustrations ; 24 cm
Contents Contents note continued: Criteria for Completion -- Task 2.4 Security Templates -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.5 Securing Autoruns -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.6 Securing Hardware Devices -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.7 Virtualization -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.8 Locking the Computer Using an Idle Time-out -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 3 Malicious Software -- Task 3.1 Installing, Updating, and Running Antivirus Software -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.2 Using a Rootkit Checker -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.3 Adware -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.4 Using a Spyware Checker -- Scenario --
Contents note continued: Phase 8 Security Testing -- Task 8.1 Penetration Testing with Nessus -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.2 Penetration Testing with Retina -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.3 Performing Assessments with MBSA -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.4 Performing Security Assessments with IT Shavlik -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.5 Performing Internet Vulnerability Profiling -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.6 Tracking Hostile IPs -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.7 Investigating Netcat -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 8.8 Exploiting Vulnerabilities with Metasploit -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion --
Contents note continued: Phase 9 Investigating Incidents -- Task 9.1 Configuring an Audit Policy for Object Access -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 9.2 Reviewing the Audit Logs -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 9.3 Forcing a Memory Dump -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 9.4 Capturing Packets with the Packet Analyzer: Wireshark -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 9.5 Recovering Previous Versions of Files -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 9.6 Recovering Deleted Content from the File System -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 10 Security Troubleshooting -- Task 10.1 Booting into Safe Mode -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 10.2 Implementing Last Known Good Configuration -- Scenario --
Contents note continued: Scope of Task -- Procedure -- Criteria for Completion -- Task 10.3 Using System Restore -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 10.4 Sanitizing Media -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 10.5 Implementing a Host-Based Intrusion Detection System -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion
Contents note continued: Scope of Task -- Procedure -- Criteria for Completion -- Task 3.5 Malicious Software Removal Tool -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.6 McAfee Site Advisor -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.7 ARP Poisoning with Cain & Abel -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 3.8 Attacking Authentication with Firesheep -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 4 Secure Storage -- Task 4.1 The Encrypting File System -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.2 EFS Data Recovery -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.3 Implementing Syskey -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.4 Converting FAT to NTFS -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion --
Contents note continued: Scope of Task -- Procedure -- Criteria for Completion -- Task 5.4 Securing the Default User Accounts -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 5.5 Implementing a Deny Group -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 6 Network Security -- Task 6.1 Deploying IPSec -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.2 Configuring the VPN Server -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.3 Configuring the VPN Client -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.4 Implementing Secure Remote Administration -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.5 Secure Administration Using Run As -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.6 Configuring a Packet Filter -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion --
Contents note continued: Task 4.5 Implementing Disk Fault Tolerance with RAID -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.6 Backing Up Data -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.7 Restoring Data from a Backup -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.8 Securing Shares -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.9 BitLocker Drive Encryption -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 4.10 Securing Data to Satisfy FIPS 140-2 Using PGP Desktop -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 5 Managing User Accounts -- Task 5.1 Creating User Accounts -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 5.2 Implementing the Password Policy -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 5.3 Auditing Logons -- Scenario --
Contents note continued: Task 6.7 Implementing 802.11 Wireless Security -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.8 Implementing an IPSec VPN Using AES -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 6.9 Implementing a Personal Firewall -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 7 Securing Internet Activity -- Task 7.1 Configuring Internet Access -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.2 Using Internet Explorer Security Zones -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.3 Configuring IE for Secure Use of Cookies -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.4 Using Internet Connection Sharing -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.5 Securing Email -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion --
Contents note continued: Task 7.6 Spam Management -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.7 Installing and Using a Digital Certificate -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.8 Certificate Backup and Management -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.9 Performing Secure File Exchange -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.10 Validating Downloads and Checking the Hash -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.11 Logging and Recording Internet Activity -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.12 Using HTTPS to Encrypt Web Traffic -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 7.13 Using Force-TLS to Add Security to Web Browsing -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion --
Machine generated contents note: Phase 1 The Grunt Work of Security -- Task 1.1 Performing an Initial Risk Assessment -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 1.2 Determining Which Security Policy Is Most Important -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 1.3 Establishing a User-Awareness Program -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 1.4 Reviewing a Physical-Security Checklist -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 1.5 Understanding the Value of Documents -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Phase 2 Hardening Systems -- Task 2.1 Managing Services -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.2 Managing Ports -- Scenario -- Scope of Task -- Procedure -- Criteria for Completion -- Task 2.3 Patching the Operating System -- Scenario -- Scope of Task -- Procedure --
Summary "A step-by-step guide to the tasks involved in security administrationIf you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. Security administrators confront a wide assortment of challenging tasks; those seeking a career in security administration are hampered by a lack of actual experience This guide simulates that experience by walking you through a variety of common tasks, demonstrating step by step how to perform them and how to circumvent roadblocks you may encounter Tasks are arranged according to four phases of the security administrator's role: designing a secure network, creating and implementing standard security policies, identifying insecure systems in an existing environment, and training both onsite and remote users This comprehensive workbook provides the next best thing to intensive on-the-job training for security professionals"--
Notes Includes index
Subject Computer networks -- Security measures -- Examinations -- Study guides.
Computer security -- Examinations -- Study guides.
Electronic data processing personnel -- Certification.
Genre/Form Study guides.
Author Gregg, Michael (Michael C.)
LC no. 2011016572
ISBN 9781118061169 (paperback)