TRANSITION GUIDE - Samples.jblearning

1y ago
17 Views
2 Downloads
565.57 KB
5 Pages
Last View : 2m ago
Last Download : 2m ago
Upload by : Aliana Wahl
Transcription

TRANSITION GUIDEThis transition guide serves to outline the updates and new content found in Network Security,Firewalls, and VPNs, Third Edition.SUMMARYNetwork Security, Firewalls, and VPNs, Third Edition provides a unique, in-depth lookat the major business challenges and threats that are introduced when an organization’snetwork is connected to the public Internet. Written by industry experts, this book provides acomprehensive explanation of network security basics, including how hackers access onlinenetworks and the use of Firewalls and VPNs to provide security countermeasures. Usingexamples and exercises, this book incorporates hands-on activities to prepare the reader todisarm threats and prepare for emerging technologies and future attacks.REVISION UPDATES Available with updated cybersecurity Cloud Labs which provide a hands-on, immersivemock IT infrastructure enabling students to test their skills with realistic security scenariosJ. Michael Stewart; Denise KinseyISBN: 978-1-284-18365-8Paperback 500 pages 2022 The Table of Contents has been fully restructured to offer a more logical sequencing ofsubject matter Increased coverage on device implantation and configuration Updated current media examples and best practices for different industries throughout New Chapter on detailing network topologiesAPPLICABLE COURSES Written for IT students and professionals looking to gain knowledge in network security andinformation systems security.INSTRUCTOR RESOURCES Instructor’s Guide Syllabus Slides in PowerPoint format 15-Week Course Map Handouts Course Projects Answers to Lab Exercises Test BankSTAY : STE3ETG20Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803phone: 1-800-832-0034 fax: 978-443-8000 www.jblearning.com

CHAPTER OUTLINEThis chapter outline has been created to help you easily transition to the third edition. Note that chapter content from the second edition may now befound in a different chapter in the third edition. Also note that chapter numbers and titles may have been updated.Network Security, Firewalls,and VPNs, Third EditionNetwork Security, Firewalls,and VPNs, Second EditionBy J. Michael Stewart andDenise KinseyBy J. Michael StewartSECOND EDITIONTHIRD EDITIONChapter 1 Access Control FrameworkChapter 1 Access Control FrameworkChapter 2 Assessing Risk and Its Impact on Access ControlChapter 2 Business Drivers for Access ControlChapter 3 Business Drivers for Access ControlsChapter 3 Human Nature and Organizational BehaviorChapter 4 Access Control Policies, Standards, Procedures, and GuidelinesChapter 4 Assessing Risk and Its Impact on Access ControlChapter 5 Unauthorized Access and Security BreachesChapter 5 Access Control in the EnterpriseChapter 6 Mapping Business Challenges to Access Control TypesChapter 6 Mapping Business Challenges to Access Control TypesChapter 7 Human Nature, Organizational Behavior, and ConsiderationsChapter 7 Access Control System ImplementationsChapter 8 Access Control for Information SystemsChapter 8 Access Control for Information SystemsChapter 9 Physical Security and Access ControlChapter 9 Physical Security and Access ControlChapter 10 Access Control in the EnterpriseChapter 10 Access Control Solutions for Remote WorkersChapter 11 Access Control System ImplementationsChapter 11 Public Key Infrastructure and EncryptionChapter 12 Access Control Solutions for Remote WorkersChapter 12 Testing Access Control SystemsChapter 13 Public Key Infrastructure and EncryptionChapter 13 Access Control AssuranceChapter 14 Testing Access Control SystemsChapter 14 Access Control Laws, Policies, and StandardsChapter 15 Access Control AssuranceChapter 15 Security Breaches and the LawJones & Bartlett Learning 5 Wall Street Burlington, MA 01803phone: 1-800-832-0034 fax: 978-443-8000 www.jblearning.com

This document has been created to help you easily transition to the Cloud Labs for the ThirdEdition.GLOBAL LAB UPDATES Automated Lab Report functionality allows students to create Deliverables directly from theLab Guide and download their Lab Reports as PDFs. Primary operating system updated to Windows Server 2019. Additional updates to all software used in the labs. More realistic network topologies. Increased number of screenshots. Improved alignment with textbook chapters. Replaced Landing VM and RDP folder with Virtual Machine drop-down menu on Lab Viewtoolbar for simplified navigation. Moved Lab Overview before Learning Objectives. Eliminated deliverable files, replacing with screenshots where applicable.J. Michael Stewart; Denise KinseyISBN: 978-1-284-18365-8Paperback 500 pages 2022 Eliminated Assessment Worksheets and reduced Assessment Quizzes to 10 questions tosimplify assessment options. Updated Section 3 to provide more engaging scenario-based challenge exercises.SPECIFIC LAB UPDATESLab 1: Assessing the Network with Common Security Tools New lab introduces students to a simple network topology, foundational networkingconcepts, and common network assessment tools.Lab 2: Defending the Network from a Simulated Malware Attack New lab, introduces students to network security threats and practical defensive measuresLab 3: Designing a Secure Network Topology New lab, introduces students to security-conscious network designLab 4: Configuring the Windows Defender Firewall New lab transplanted from Access Control lab set. Introduces students to the host-based Windows Defender FirewallLab 5: Planning and Implementing a Physical Firewall Configuration Significant revision of 2e Lab 3: Configuring a pfSense Firewall on the Client Separates physical firewall configuration from firewall rule configuration, which has beenmoved to Lab 7. Provides greater detail and insight into the process of setting up LAN, WAN, and DMZinterfaces on a fresh pfSense firewall installation.Lab 6: Logging and Monitoring Network Traffic New lab, introduces students to IDS/IPS’s, syslog servers, and SIEM toolsLab 7: Planning and Configuring Custom Firewall Rules Significant revision of 2e Labs 3 and 4: Configuring a pfSense Firewall on the Client andConfiguring a pfSense Firewall on the Server (contains elements of both). Continues firewall implementation introduced in Lab 5 Provides greater insight into planning and implementing custom firewall rulesLab 8: Configuring a VPN Server with pfSense Updated version of 2e Lab 7: Configuring a Virtual Private Network Server New, more intuitive network topology Provides greater insight into critical steps of configuring a VPN serverJones & Bartlett Learning 5 Wall Street Burlington, MA 01803phone: 1-800-832-0034 fax: 978-443-8000 www.jblearning.com

Lab 9: Configuring a VPN Client for Secure File Transfers Updated version of 2e Lab 8: Configuring a VPN Client for Secure File Transfers New, more intuitive network topology Provides greater insight into critical steps of configuring a VPN clientLab 10: Penetration Testing a pfSense Firewall Updated version of 2e Lab 5: Penetration Testing a pfSense Firewall New, more intuitive network topology Section 2 introduces Kali Linux and OpenVAS and explores black-box penetration testingSupplemental Lab 1: Analyzing Network Traffic with Wireshark Updated version of 2e Lab 1: Analyzing Protocols with WiresharkSupplemental Lab 2: Using Wireshark and NetWitness Investigator to Analyze Wireless Traffic Updated version of 2e Lab 2: Using Wireshark and NetWitness Investigator to AnalyzeWireless TrafficSupplemental Lab 3: Using Social Engineering Techniques to Plan an AttackJ. Michael Stewart; Denise KinseyISBN: 978-1-284-18365-8Paperback 500 pages 2022 Updated version of 2e Lab 6: Using Social Engineering Techniques to Plan an Attack Moved corporationtechs.com website into internal lab environment Added email server and clients to the internal lab environmentSupplemental Lab 4: Attacking a Virtual Private Network Updated version of 2e Lab 9: Attacking a Virtual Private Network Added email server and clients to the internal lab environmentSupplemental Lab 5: Drafting a Network Security Policy New lab, introduces students to security policies, standards, and controlsJones & Bartlett Learning 5 Wall Street Burlington, MA 01803phone: 1-800-832-0034 fax: 978-443-8000 www.jblearning.com

Network Security, Firewalls,and VPNs, Third EditionNetwork Security, Firewalls,and VPNs, Second EditionBy J. Michael Stewart andDenise KinseyBy J. Michael StewartSECOND EDITIONTHIRD EDITIONLab 1: Analyzing Protocols with WiresharkLab 1: Assessing the Network with Common Security ToolsLab 2: Using Wireshark and NetWitness Investigator to Analyze Wireless TrafficLab 2: Defending the Network from a Simulated Malware AttackLab 3: Configuring a pfSense Firewall on the ClientLab 3: Designing a Secure Network TopologyLab 4: Configuring a pfSense Firewall on the ServerLab 4: Configuring the Windows Defender FirewallLab 5: Penetration Testing a pfSense FirewallLab 5: Planning and Configuring a Physical Firewall ImplementationLab 6: Using Social Engineering Techniques to Plan an AttackLab 6: Monitoring and Logging Network TrafficLab 7: Configuring a Virtual Private Network ServerLab 7: Planning and Configuring Custom Firewall RulesLab 8: Configuring a VPN Client for Secure File TransfersLab 8: Configuring a VPN Server with pfSenseLab 9: Attacking a Virtual Private NetworkLab 9: Configuring a VPN Client for Secure File TransfersLab 10: Investigating and Responding to Network Security IncidentsLab 10: Penetration Testing a pfSense FirewallSupplemental Lab 1: Analyzing Network Security with WiresharkSupplemental Lab 2: Using Wireshark and NetWitness Investigator to AnalyzeWireless TrafficSupplemental Lab 3: Using Social Engineering Techniques to Plan an AttackSupplemental Lab 4: Attacking a Virtual Private NetworkSupplemental Lab 5: Drafting a Network Security PolicyJones & Bartlett Learning 5 Wall Street Burlington, MA 01803phone: 1-800-832-0034 fax: 978-443-8000 www.jblearning.com

Penetration Testing a pfSense Firewall. Lab 5: Planning and Configuring a Physical Firewall Implementation. Lab 6: Using Social Engineering Techniques to Plan an Attack. Lab 6: Monitoring and Logging Network Traffic. Lab 7: Configuring a Virtual Private Network Server. Lab 7: Planning and Configuring Custom Firewall Rules. Lab 8: Configuring a .

Related Documents:

eBook) for the book directly through www.jblearning.com (this is the cheapest option): Website: www.jblearning.com. ISBN-13: 978-1284172102. Detailed reading materials are assigned week by week. Coursework & Schedule Graded activities The table below shows the act

WEB PROGRAMMING 9781284078855_FMxx_Pass02.indd 1 27/07/16 4:31 AM. World Headquarters Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803 978-443-5000 info@jblearning.com www.jblearning.com Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett

1 The Independent-Samples and Paired-Samples t Tests in SPSS versions 21-22 This guide uses the Rikers 1989 data set for Independent Samples test and the NELS dataset for the Paired Samples test. All t Tests are means comparisons: A One Sample t test compares a sample average to a population mean. An Independent Samples t test compares the averages of two groups whose members are

This portion of the contest will have the following 8 grain samples: o 4 corn samples o 2 soybean samples o 2 wheat samples Participants will have 60 minutes to complete all 8 samples. Each sample is worth 25 points. Participants will grade samples based on the of

Hospital of Hopital Central de Yaounde (HCY) and Hopital Ge neral de Yaounde (HGY). After inform consent, samples were collected and 101 samples were tested with the FACSCalib ur, 60 samples were tested with the CyFlow and 107 samples were tested with the FACSCount flow cytometers. All these samples were tested by different technician with PIMA POC

Directory structure SAMPLES/C Sample programs written in ANSI C, and portable to virtually any OS supporting PC/SC SAMPLES/DOTNET Sample programs written in C# and VB, targetting the .NET framework SAMPLES/JAVA Sample programs written in Java, using the javax.smardcardio class available on some systems SAMPLES/WIN32 Samples programs written in either C or C , that

Complex Samples General Linear Model .25 Complex Samples General Linear Model .25 Complex Samples General Linear Model Statistics 26 . 2 IBM SPSS Complex Samples 22. Chapter 2. Sampling from a Complex Design The Sampling Wizard guides you through the steps

PASSOVER BLUEBERRY MUFFINS (Alexa & Riley Newbold) Ingredients: -1/3 cup butter -1 scant cup of sugar -3 eggs -1/2 teaspoon vanilla -1/2 cup matzo cake meal -1/4 cup potato starch -1/4 teaspoon salt -1 cup blueberries (frozen, drained)— don’t defrost -Cinnamon sugar . Directions: Cream sugar and butter. Add three eggs one at a time, beating after each. Add vanilla and mix. Add matzo cake .