vi  CHAPTER  8  Mobile  Devices  and  Embedded  Systems  Lab  8-1:  Drive  Encryption.  .  .  .  .  .  .  .  .  .  .  .  .  .  83  Lab  8-2:  Asset  and  GPS  Management.  .  .  .  .  .  .  86  Lab  8-3:  Locating  Vulnerable  IoT  Devices.  .  .  .  .  88  CHAPTER  9  Introduction  to  Cryptography  Lab  9-1:  Symmetric  Encryption.  .  .  .  .  .  .  .  .  .  .  91  Lab  9-2:  Asymmetric  Encryption.  .  .  .  .  .  .  .  .  .  94  Lab  9-3:  Hashing.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  96  Lab  9-4:  Password  Hashes  and  Cracking  .  .  .  .  .  98  CHAPTER  10  Public  Key  Infrastructure  Lab  10-1:  Certificate  Management  in  Windows.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  101  Lab  10-2:  Creating  a  Self-Signed  Certificate.  .  103  Lab  10-3:  Viewing  Web  Security  and  Certificate  Information.  .  .  .  .  .  .  .  .  .  .  .  .  105  Lab  10-4:  Consensus  Protocols  and  Bitcoin  .  .  108  CHAPTER  11  Command-  Line  Interface  Management  Lab  11-1:  System  Management  from  the  Windows  Command  Prompt.  .  .  .  .  .  .  .  .  .  111  Lab  11-2:  Windows  Command  Prompt  Batch  Files.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  113  Lab  11-3:  System  Management  with  Windows  PowerShell  .  .  .  .  .  .  .  .  .  .  .  .  .  .  115  Lab  11-4:  Windows  PowerShell  Scripts.  .  .  .  .  117  Lab  11-5:  Network  Management  with  Linux  Bash.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  120  CHAPTER  12  Secure  Network  Design  Lab  12-1:  Subnetting  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  123  Lab  12-2:  Using  iptables  .  .  .  .  .  .  .  .  .  .  .  .  .  .  127  Lab  12-3:  Creating  Logical  Networking  Diagrams  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  129  Lab  12-4:  Proxy  Server.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  131  Lab  12-5:  Content  Filtering.  .  .  .  .  .  .  .  .  .  .  .  133  CHAPTER  13  Secure  Network  Administration  Lab  13-1:  DNS  Information.  .  .  .  .  .  .  .  .  .  .  .  .  135  Lab  13-2:  Network  Sniffing  .  .  .  .  .  .  .  .  .  .  .  .  139  Lab  13-3:  Ping  Sweep.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  141  Lab  13-4:  Wireshark  and  DNS  Traffic  .  .  .  .  .  .  143  Lab  13-5:  Network  Connections  and  Protection.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  145  CHAPTER  14  Wireless  Network  Security  Lab  14-1:  Wireless  Network  Scanning.  .  .  .  .  .  149  Lab  14-2:  Wireless  Security  Settings  .  .  .  .  .  .  153  Lab  14-3:  Analyzing  Wireless  Activity  Packets.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  156  Lab  14-4:  Wireless  Site  Survey  .  .  .  .  .  .  .  .  .  .  161  Lab  14-5:  Viewing  Wireless  and  WPA-Captured  Traffic.  .  .  .  .  .  .  .  .  .  .  .  .  .  163