Book description
All you need to know about defending networks, in one book
· Clearly explains concepts, terminology, challenges, tools, and skills
· Covers key security standards and models for business and government
· The perfect introduction for all network/computer security professionals and students
Welcome to today’s most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you’ll need to be effective.
Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks.
You’ll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You’ll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism.
Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you’ve learned–in the classroom and in your career.
Learn How To
· Evaluate key network risks and dangers
· Choose the right network security approach for your organization
· Anticipate and counter widespread network attacks, including those based on “social engineering”
· Successfully deploy and apply firewalls and intrusion detection systems
· Secure network communication with virtual private networks
· Protect data with cryptographic public/private key systems, digital signatures, and certificates
· Defend against malware, including ransomware, Trojan horses, and spyware
· Harden operating systems and keep their security up to date
· Define and implement security policies that reduce risk
· Explore leading security standards and models, including ISO and NIST standards
· Prepare for an investigation if your network has been attacked
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Contents at a Glance
- Contents
- About This E-Book
- Preface
- About the Author
- Dedication
- Acknowledgments
- About the Technical Reviewers
- We Want to Hear from You!
- Reader Services
-
Chapter 1: Introduction to Network Security
- Introduction
- The Basics of a Network
- Basic Network Utilities
- The OSI Model
- What Does This Mean for Security?
- Assessing Likely Threats to the Network
- Classifications of Threats
- Likely Attacks
- Threat Assessment
- Understanding Security Terminology
- Choosing a Network Security Approach
- Network Security and the Law
- Using Security Resources
- Summary
- Chapter 2: Types of Attacks
- Chapter 3: Fundamentals of Firewalls
- Chapter 4: Firewall Practical Applications
- Chapter 5: Intrusion-Detection Systems
- Chapter 6: Encryption Fundamentals
- Chapter 7: Virtual Private Networks
- Chapter 8: Operating System Hardening
- Chapter 9: Defending Against Virus Attacks
- Chapter 10: Defending Against Trojan Horses, Spyware, and Adware
- Chapter 11: Security Policies
- Chapter 12: Assessing System Security
- Chapter 13: Security Standards
- Chapter 14: Physical Security and Disaster Recovery
- Chapter 15: Techniques Used by Attackers
- Chapter 16: Introduction to Forensics
- Chapter 17: Cyber Terrorism
- Appendix A: Answers
- Glossary
- Index
Product information
- Title: Network Defense and Countermeasures: Principles and Practices, 3rd Edition
- Author(s):
- Release date: April 2018
- Publisher(s): Pearson IT Certification
- ISBN: 9780134893112
You might also like
book
Network Defense and Countermeasures: Principles and Practices, Second Edition
Network Defense and Countermeasures: Principles and Practices Everything you need to know about modern network attacks …
book
Security Program and Policies: Principles and Practices, Second Edition
Everything you need to know about information security programs and policies, in one book Clearly explains …
book
Cybersecurity – Attack and Defense Strategies - Second Edition
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats …
book
Defensive Security Handbook, 2nd Edition
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have …