In this Lab Manual, you'll practice
Configuring workstation network connectivityAnalyzing network communicationEstablishing secure network application communication using TCP/IP protocolsPenetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other toolsDefending against network application attacks, including SQL injection, web browser exploits, and email attacksCombatting Trojans, man-in-the-middle attacks, and steganographyHardening a host computer, using antivirus applications, and configuring firewallsSecuring network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsecPreparing for and detecting attacksBacking up and restoring dataHandling digital forensics and incident responseInstructor resources available:
This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separatelyVirtual machine filesSolutions to the labs are not included in the book and are only available to adopting instructors