vii CHAPTER 15 Cloud Computing Lab 15-1: Managing and Securing a Cloud Environment. . . . . . . . . . . . . . . . . . . 165 Lab 15-2: SaaS Application . . . . . . . . . . . . 168 Lab 15-3: Cloud Policy Generators. . . . . . . . 170 Lab 15-4: Combating VM Sprawl. . . . . . . . . 172 Lab 15-5: SECaaS Product Analysis. . . . . . . . 174 CHAPTER 16 Governance, Risk, and Compliance Lab 16-1: Change Management Software . . . 175 Lab 16-2: PortExpert Scanner as a Detective Control . . . . . . . . . . . . . . . . 178 Lab 16-3: Evaluating User Training . . . . . . . 180 Lab 16-4: User Training through Interactive Labs. . . . . . . . . . . . . . . . . . . . . . . . . 182 CHAPTER 17 Incident Response and Digital Forensics Lab 17-1: Incident Response Analysis . . . . . . 185 Lab 17-2: Metadata. . . . . . . . . . . . . . . . . 188 Lab 17-3: Forensic Tools for Acquiring Images and Reporting Evidence. . . . . . . . . . . . 191 Lab 17-4: Forensic Tools for Analyzing Website Usage . . . . . . . . . . . . . . . . . . 194 Lab 17-5: Forensic Tools for Acquiring Evidence. . . . . . . . . . . . . . . . . . . . . . 198 CHAPTER 18 Business Continuity and Disaster Recovery Lab 18-1: Business-Impact Analysis . . . . . . . 201 Lab 18-2: RAID Systems . . . . . . . . . . . . . . 205 Lab 18-3: Server Data Backup. . . . . . . . . . . 208 Lab 18-4: Fault Tolerance with Shadow Copies . . . . . . . . . . . . . . . . . . . . . . . 210 Lab 18-5: Purchase Considerations for an Uninterruptible Power Supply (UPS). . . . . 212 CHAPTER 19 Employment and Soft Skills Lab 19-1: Creating a Résumé. . . . . . . . . . . 215 Lab 19-2: Job Preparation Planning. . . . . . . 217 Lab 19-3: Problem-Solving Using Visualization Tools. . . . . . . . . . . . . . . . 220 Lab 19-4: Networking through LinkedIn. . . . 222
Previous Page Next Page