Computer Security Fundamentals

(pearson-comp-sec-fund-4thed) / ISBN : 978-1-64459-129-1
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
AI Tutor (Add-on)
284 Reviews
Get A Free Trial

About This Course

Use the Pearson Computer Security Fundamentals 4th Edition course and lab to gain hands-on expertise in the technologies and methodologies of computer security. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The IT security course and lab completely cover the Web security concepts and principles that help you improve your ability to prevent a network from threats. This Cybersecurity online course is for System Administrators who want to know more about information and IT security.

Skills You’ll Get

1

Introduction to Computer Security

  • Introduction
  • How Seriously Should You Take Threats to Network Security?
  • Identifying Types of Threats
  • Assessing the Likelihood of an Attack on Your Network
  • Basic Security Terminology
  • Concepts and Approaches
  • How Do Legal Issues Impact Network Security?
  • Online Security Resources
  • Summary
2

Networks and the Internet

  • Introduction
  • Network Basics
  • How the Internet Works
  • History of the Internet
  • Basic Network Utilities
  • Other Network Devices
  • Advanced Network Communications Topics
  • Summary
3

Cyber Stalking, Fraud, and Abuse

  • Introduction
  • How Internet Fraud Works
  • Identity Theft
  • Cyber Stalking
  • Protecting Yourself Against Cybercrime
  • Summary
4

Denial of Service Attacks

  • Introduction
  • DoS Attacks
  • Illustrating an Attack
  • Common Tools Used for DoS Attacks
  • DoS Weaknesses
  • Specific DoS Attacks
  • Real-World Examples of DoS Attacks
  • How to Defend Against DoS Attacks
  • Summary
5

Malware

  • Introduction
  • Viruses
  • Trojan Horses
  • The Buffer-Overflow Attack
  • Spyware
  • Other Forms of Malware
  • Detecting and Eliminating Viruses and Spyware
  • Summary
6

Techniques Used by Hackers

  • Introduction
  • Basic Terminology
  • The Reconnaissance Phase
  • Actual Attacks
  • Malware Creation
  • Penetration Testing
  • The Dark Web
  • Summary
7

Industrial Espionage in Cyberspace

  • Introduction
  • What Is Industrial Espionage?
  • Information as an Asset
  • Real-World Examples of Industrial Espionage
  • How Does Espionage Occur?
  • Protecting Against Industrial Espionage
  • The Industrial Espionage Act
  • Spear Phishing
  • Summary
8

Encryption

  • Introduction
  • Cryptography Basics
  • History of Encryption
  • Modern Cryptography Methods
  • Public Key (Asymmetric) Encryption
  • PGP
  • Legitimate Versus Fraudulent Encryption Methods
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Steganography
  • Cryptanalysis
  • Cryptography Used on the Internet
  • Quantum Computing Cryptography
  • Summary
9

Computer Security Technology

  • Introduction
  • Virus Scanners
  • Firewalls
  • Antispyware
  • IDSs
  • Digital Certificates
  • SSL/TLS
  • Virtual Private Networks
  • Wi-Fi Security
  • Summary
10

Security Policies

  • Introduction
  • What Is a Policy?
  • Defining User Policies
  • Defining System Administration Policies
  • Defining Access Control
  • Development Policies
  • Standards, Guidelines, and Procedures
  • Disaster Recovery
  • Important Laws
  • Summary
11

Network Scanning and Vulnerability Scanning

  • Introduction
  • Basics of Assessing a System
  • Securing Computer Systems
  • Scanning Your Network
  • Getting Professional Help
  • Summary
12

Cyber Terrorism and Information Warfare

  • Introduction
  • Actual Cases of Cyber Terrorism
  • Weapons of Cyber Warfare
  • Economic Attacks
  • Military Operations Attacks
  • General Attacks
  • Supervisory Control and Data Acquisitions (SCADA)
  • Information Warfare
  • Actual Cases
  • Future Trends
  • Defense Against Cyber Terrorism
  • Terrorist Recruiting and Communication
  • TOR and the Dark Web
  • Summary
13

Cyber Detective

  • Introduction
  • General Searches
  • Court Records and Criminal Checks
  • Usenet
  • Summary
14

Introduction to Forensics

  • Introduction
  • General Guidelines
  • Finding Evidence on the PC
  • Finding Evidence in System Logs
  • Getting Back Deleted Files
  • Operating System Utilities
  • The Windows Registry
  • Mobile Forensics: Cell Phone Concepts
  • The Need for Forensic Certification
  • Expert Witnesses
  • Additional Types of Forensics
  • Summary
15

Cybersecurity Engineering

  • Introduction
  • Defining Cybersecurity Engineering
  • SecML
  • Summary
A

Appendix A: Resources

1

Networks and the Internet

  • Using nslookup for Passive Reconnaissance
  • Using the ipconfig Command
  • Using arp
  • Using netstat
  • Using Routes
  • Using the ping Command
  • Using tracert
2

Cyber Stalking, Fraud, and Abuse

  • Performing a Phishing Attack
  • Configuring Pop-up Blocker Settings
3

Denial of Service Attacks

  • Performing DoS Attacks with a SYN Flood
  • Performing a DHCP Starvation Attack
  • Simulating the DDoS Attack with a SYN Flood
  • Protecting from the DOS Attack
4

Malware

  • Detecting Viruses Using Windows Defender
  • Creating a Remote Access Trojan (RAT)
  • Using eLiTeWrap
5

Techniques Used by Hackers

  • Using nmap for Network Enumeration
  • Using the Zenmap GUI
  • Exploiting the Cross-site Request Forgery (CSRF or XSRF) Attacks
  • Exploiting a Website using SQL Injection
  • Attacking a Website using XSS Injection
  • Cracking a Password using John the Ripper
6

Encryption

  • Creating PGP Certification
  • Observing the SHA-Generated Hash Value
  • Using Rainbow Tables to Crack Passwords
  • Using Steganography
7

Computer Security Technology

  • Configuring Iptables to Block ICMP Packets
  • Configuring Snort
  • Configuring an IPsec Policy
8

Security Policies

  • Creating a Policy for Restricting Installations
9

Network Scanning and Vulnerability Scanning

  • Disabling a Service
  • Performing an MBSA Scan
  • Using OWASP ZAP
10

Introduction to Forensics

  • Observing the Security Event log
  • Using openfiles and net sessions
  • Using the fc command
  • Exporting the Registry Keys

Computer Security Fundamentals

$ 279.99

Buy Now

Related Courses

All Course
scroll to top