Home Page Icon
Home Page
Table of Contents for
Table of Exercises
Close
Table of Exercises
by Nadean H. Tanner, Jeff T. Parker
CASP+ CompTIA Advanced Security Practitioner Study Guide, 4th Edition
Cover
Title Page
Copyright
Acknowledgments
About the Authors
About the Technical Editor
Table of Exercises
Introduction
Chapter 1: Risk Management
Chapter 2: Configure and Implement Endpoint Security Controls
Chapter 3: Security Operations Scenarios
Chapter 4: Security Ops: Vulnerability Assessments and Operational Risk
Chapter 5: Compliance and Vendor Risk
Chapter 6: Cryptography and PKI
Chapter 7: Incident Response and Forensics
Chapter 8: Security Architecture
Chapter 9: Secure Cloud and Virtualization
Chapter 10: Mobility and Emerging Technologies
Appendix: Answers to Review Questions
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
About the Technical Editor
Next
Next Chapter
Introduction
Table of Exercises
Exercise 1.1
Calculating Annualized Loss Expectancy
Exercise 1.2
Reviewing the Employee Termination Process
Exercise 2.1
Running a Security Scanner to Identify Vulnerabilities
Exercise 2.2
Bypassing Command Shell Restrictions
Exercise 3.1
Using WinDump to Sniff Traffic
Exercise 3.2
Reviewing and Assessing ACLs
Exercise 4.1
Tracking Vulnerabilities in Software
Exercise 4.2
Performing Passive Reconnaissance on Your Company, School, or Another Organization
Exercise 5.1
What Services Should Be Moved to the Cloud?
Exercise 5.2
Identifying Risks and Issues with Cloud Computing
Exercise 5.3
Reviewing Documents
Exercise 8.1
Configuring iptables
Exercise 8.2
Using Pingdom Full Page Test
Exercise 8.3
Testing Your Antivirus Program
Exercise 8.4
Reviewing and Assessing ACLs
Exercise 9.1
Creating a Virtual Machine
Exercise 9.2
Identifying What Services Should Be Moved to the Cloud
Exercise 9.3
Identifying Risks and Issues with Cloud Computing
Exercise 9.4
Understanding Online Storage
Exercise 9.5
Turning to the Cloud for Storage and Large File Transfer
Exercise 9.6
Eavesdropping on Web Conferences
Exercise 9.7
Sniffing Email with Wireshark
Exercise 9.8
Sniffing VoIP with Cain & Abel
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset