Network Defense and Countermeasures 4E
Cyber Security is a big concern today! Reinforce your guards against cyberterrorism by learning the latest concepts of network defense and countermeasure.
(NETWRK-DEFENSE.AB3) / ISBN : 978-1-64459-604-3About This Course
Network Defense and Counter Measure is a detailed study of the latest concepts, terminologies, techniques, and solutions for safeguarding your network. You’ll be learning about the modern practices of network protection that includes framing network defense systems, setting up VPNs, and securing network communication systems. Discover how to deploy firewalls and intrusion detection systems (IDS) to identify and mitigate threats like DDoS attacks. Additionally, you’ll also understand the growing risks of espionage and cyberterrorism and design intelligent solutions like honey pots and behavior-blocking.
Skills You’ll Get
- Identify network vulnerabilities
- Learn to deploy firewalls, VPNs, and IDS (Intrusion Detection System)
- Countering cyberattacks with malware defense
- Securing data with cryptography (encryption and decryption)
- Designing and implementing full-proof security policies
- Analyzing network traffic patterns and security logs
- Identify, recover and contain network security issues, minimizing the downtime
Interactive Lessons
18+ Interactive Lessons | 443+ Exercises | 260+ Quizzes | 179+ Flashcards | 179+ Glossary of terms
Gamified TestPrep
90+ Pre Assessment Questions | 2+ Full Length Tests | 90+ Post Assessment Questions | 180+ Practice Test Questions
Hands-On Labs
65+ LiveLab | 65+ Video tutorials | 02:18+ Hours
Preface
- Audience
- Overview of the Course
Introduction to Network Security
- Introduction
- The Basics of a Network
- Basic Network Utilities
- The OSI Model
- What Does This Mean for Security?
- Assessing Likely Threats to the Network
- Classifications of Threats
- Likely Attacks
- Threat Assessment
- Understanding Security Terminology
- Choosing a Network Security Approach
- Network Security and the Law
- Using Security Resources
- Summary
Types of Attacks
- Introduction
- Understanding Denial of Service Attacks
- Defending Against Buffer Overflow Attacks
- Defending Against IP Spoofing
- Defending Against Session Hijacking
- Blocking Virus and Trojan Horse Attacks
- Summary
Fundamentals of Firewalls
- Introduction
- What Is a Firewall?
- Implementing Firewalls
- Firewall Deployment
- Selecting and Using a Firewall
- Using Proxy Servers
- Summary
Firewall Practical Applications
- Introduction
- Using Single Machine Firewalls
- Windows 10 Firewall
- User Account Control
- Linux Firewalls
- Using Small Office/Home Office Firewalls
- Using Medium-Sized Network Firewalls
- Using Enterprise Firewalls
- Summary
Intrusion-Detection Systems
- Introduction
- Understanding IDS Concepts
- IDS Components and Processes
- SIEM
- Evasion Techniques
- Understanding and Implementing IDSs
- Understanding and Implementing Honeypots
- Summary
Encryption Fundamentals
- Introduction
- The History of Encryption
- Learning About Modern Encryption Methods
- Identifying Good Encryption
- Understanding Digital Signatures and Certificates
- Understanding and Using Decryption
- Cracking Passwords
- Steganography
- Steganalysis
- Quantum Computing and Quantum Cryptography
- Summary
Virtual Private Networks
- Introduction
- Basic VPN Technology
- Using VPN Protocols for VPN Encryption
- IPsec
- SSL/TLS
- Other VPN Protocols
- Implementing VPN Solutions
- Summary
Operating System Hardening
- Introduction
- Configuring Windows Properly
- Configuring Linux Properly
- Patching the Operating System
- Configuring Browsers
- Summary
Defending Against Virus Attacks
- Introduction
- Understanding Virus Attacks
- Virus Scanners
- Antivirus Policies and Procedures
- Additional Methods for Defending Your System
- What to Do If Your System Is Infected by a Virus
- Summary
Defending Against Trojan Horses and Phishing
- Introduction
- Trojan Horses
- Phishing
- Summary
Security Policies
- Introduction
- ISO 27002
- Important Standards
- Defining User Policies
- Defining System Administration Policies
- Defining Access Control
- Defining Developmental Policies
- Disaster Recovery
- Summary
Assessing System Security
- Introduction
- Risk Assessment Concepts
- Evaluating the Security Risk
- Conducting the Initial Assessment
- Probing the Network
- Vulnerabilities
- McCumber Cube
- Security Documentation
- Summary
Security Standards
- Introduction
- COBIT
- ISO Standards
- NIST Standards
- U.S. DoD Standards
- Using the Common Criteria
- Using Security Models
- U.S. Federal Regulations, Guidelines, and Standards
- Summary
Physical Security and Disaster Recovery
- Introduction
- Physical Security
- Disaster Recovery
- Ensuring Fault Tolerance
- Summary
Techniques Used by Attackers
- Introduction
- Preparing to Hack
- The Attack Phase
- Session Hijacking
- Wi-Fi Hacking
- Bluetooth Hacking
- Summary
Introduction to Forensics
- Introduction
- General Forensics Guidelines
- FBI Forensics Guidelines
- Imaging a Drive
- Finding Evidence on the PC
- Gathering Evidence from a Cell Phone
- Forensic Tools to Use
- Forensic Science
- To Certify or Not to Certify?
- Expert Witnesses
- Additional Types of Forensics
- Summary
Cyber Warfare and Terrorism
- Introduction
- Defending Against Computer-Based Espionage
- Defending Against Computer-Based Terrorism
- Choosing Defense Strategies
- Summary
Introduction to Network Security
- Configuring an IPv6 Address
- Configuring a CIDR-Based IP Address
- Viewing the MAC Address on Different Interfaces
- Using Command-Line Tools
- Analyzing Malware
Types of Attacks
- Conducting a DoS Attack Using a Smurf Attack
- Performing DoS Attacks with a SYN Flood
- Defending Against a Buffer Overflow Attack
- Conducting IP Spoofing
- Performing Session Hijacking Using Burp Suite
Fundamentals of Firewalls
- Creating a DMZ Zone
- Using Windows Firewall
- Configuring a Proxy Server
Firewall Practical Applications
- Configure User Access Control Settings
- Configuring a Linux Firewall Using iptables
Intrusion-Detection Systems
- Performing IDS Configuration with Snort
- Setting up a Honeypot
Encryption Fundamentals
- Examining Asymmetric Encryption
- Performing Symmetric Information
- Creating PGP Certification
- Observing an MD5-Generated Hash Value
- Observing a SHA256-Generated Hash Value
- Adding a Digital Certificate
- Cracking a Password Using Medusa
- Cracking a Password using John the Ripper Tool
- Using Rainbow Tables
- Hiding Text using Steganography
Virtual Private Networks
- Configuring a VPN
- Setting Up a VPN Server with Windows Server 2016
- Creating an L2TP VPN Using Openswan
- Configuring IPSec
Operating System Hardening
- Encrypting Files and Folders Using EFS
- Shutting Down a Service in Windows
- Restricting the Null Session
- Using Registry Editor
- Configuring a Account Lockout Policy
- Configuring a User Account
- Setting Security Policies
- Configuring the Security Setting in a Popular Browser
Defending Against Virus Attacks
- Creating a Remote Access Trojan (RAT)
Defending Against Trojan Horses and Phishing
- Connecting to a Remote Computer Using the Remote Desktop Connection
- Using eLiTeWrap
- Using the NetBus Application
- Performing a Phishing Attack
Security Policies
- Managing a User Using an Existing Security Policy
Assessing System Security
- Filtering Ports Using Windows Firewall
- Scanning for Vulnerabilities Using Nikto
- Using Nmap for Network Scanning
- Conducting Vulnerability Scanning Using Nessus
- Performing Vulnerability Scanning Using OpenVAS
- Using Shodan to Find Webcams
- Using OWASP ZAP
- Using the Advanced IP Scanner
- Examining Open Source Security Testing Methodology Manual
Physical Security and Disaster Recovery
- Taking a Full Backup
- Taking an Incremental Backup
Techniques Used by Attackers
- Conducting Passive Scanning Using Netcraft
- Attacking a Website Using XSS Injection
- Exploiting a Website Using SQL Injection
- Cracking Windows Password Using Ophcrack
Introduction to Forensics
- Using FTK Imager
- Using Operating System Utilities in Windows
Cyber Warfare and Terrorism
- Using BitLocker
- Using EtherDetect
- Capturing a Packet Using Wireshark
Any questions?Check out the FAQs
Still have unanswered questions and need to get in touch?
Contact Us NowA Network Defence and Countermeasure course can help you develop the skills required for this job, which entails protecting the digital infrastructure of an organization. Choose an online platform that offers interactive features like hands-on labs, glossary, flashcards, MCQs, video lessons, gamified testprep etc. for practicing your new found skills.
Cyber threats are a big concern in today’s world. Every organization big or small must hire Network Security Engineers to protect their organization’s sensitive data.
You’ll learn to use industry-standard tools and technologies with hands-on-training on our LiveLABs. These are tools and techniques you’ll learn:
- Firewalls
- Intrusion Detection/Prevention System (IDS/IPS)
- Virtual Private Network (VPN) Clients
- Vulnerability Scanners
- Cryptography Tools
In computer science, cryptography is the study and practice of maintaining secure communications using mathematical algorithms to disguise the message in the presence of threats.
Cryptography is important because it safeguards individuals and organizations against today’s cyber threats and information theft or loss.