vi CHAPTER 8 Mobile Devices and Embedded Systems Lab 8-1: Drive Encryption. . . . . . . . . . . . . . 83 Lab 8-2: Asset and GPS Management. . . . . . . 86 Lab 8-3: Locating Vulnerable IoT Devices. . . . . 88 CHAPTER 9 Introduction to Cryptography Lab 9-1: Symmetric Encryption. . . . . . . . . . . 91 Lab 9-2: Asymmetric Encryption. . . . . . . . . . 94 Lab 9-3: Hashing. . . . . . . . . . . . . . . . . . . . 96 Lab 9-4: Password Hashes and Cracking . . . . . 98 CHAPTER 10 Public Key Infrastructure Lab 10-1: Certificate Management in Windows. . . . . . . . . . . . . . . . . . . . . . 101 Lab 10-2: Creating a Self-Signed Certificate. . 103 Lab 10-3: Viewing Web Security and Certificate Information. . . . . . . . . . . . . 105 Lab 10-4: Consensus Protocols and Bitcoin . . 108 CHAPTER 11 Command- Line Interface Management Lab 11-1: System Management from the Windows Command Prompt. . . . . . . . . . 111 Lab 11-2: Windows Command Prompt Batch Files. . . . . . . . . . . . . . . . . . . . . 113 Lab 11-3: System Management with Windows PowerShell . . . . . . . . . . . . . . 115 Lab 11-4: Windows PowerShell Scripts. . . . . 117 Lab 11-5: Network Management with Linux Bash. . . . . . . . . . . . . . . . . . . . . 120 CHAPTER 12 Secure Network Design Lab 12-1: Subnetting . . . . . . . . . . . . . . . . 123 Lab 12-2: Using iptables . . . . . . . . . . . . . . 127 Lab 12-3: Creating Logical Networking Diagrams . . . . . . . . . . . . . . . . . . . . . 129 Lab 12-4: Proxy Server. . . . . . . . . . . . . . . 131 Lab 12-5: Content Filtering. . . . . . . . . . . . 133 CHAPTER 13 Secure Network Administration Lab 13-1: DNS Information. . . . . . . . . . . . . 135 Lab 13-2: Network Sniffing . . . . . . . . . . . . 139 Lab 13-3: Ping Sweep. . . . . . . . . . . . . . . . 141 Lab 13-4: Wireshark and DNS Traffic . . . . . . 143 Lab 13-5: Network Connections and Protection. . . . . . . . . . . . . . . . . . . . . 145 CHAPTER 14 Wireless Network Security Lab 14-1: Wireless Network Scanning. . . . . . 149 Lab 14-2: Wireless Security Settings . . . . . . 153 Lab 14-3: Analyzing Wireless Activity Packets. . . . . . . . . . . . . . . . . . . . . . . 156 Lab 14-4: Wireless Site Survey . . . . . . . . . . 161 Lab 14-5: Viewing Wireless and WPA-Captured Traffic. . . . . . . . . . . . . . 163
Previous Page Next Page