Principles of Cybersecurity, 1st Edition, Laboratory Manual
Organized to follow the textbook on a chapter-by-chapter basis, the Lab Manual provides questions to help the student review the material presented in the chapter. Pages can be printed on demand for assignment, or students can complete their assignments online using embedded form fields and then print or e-mail the responses for grading.
Access Workbook activities by clicking the Resources icon on the left hand menu in the viewer.Table of Contents
Abbreviated Contents
Principles of Cybersecurity, 1st Edition, Laboratory Manual
- Front Matter
- 1 - Introduction to Cybersecurity
- 2 - Information Security Fundamentals
- 3 - Managing User Security
- 4 - Command Line Interface Management
- 5 - Controlling Physical Environments and User Actions
- 6 - Protecting Host Systems
- 7 - Security Vulnerabilities and Protection of Nontraditional Hosts
- 8 - Overview of Network Security and Network Threats
- 9 - Protecting Network Services and Infrastructure from Attacks
- 10 - Wireless Network Security
- 11 - Encryption and Cryptography
- 12 - Threats to Data
- 13 - Penetration Testing
- 14 - Cloud Computing
- 15 - Risk Management
- 16 - Business Continuity and Disaster Recovery
- 17 - Incident Response and Computer Forensics
- 18 - Career and Workplace Considerations