Contents
Phase 1: The Grunt Work of Security
Task 1.1: Performing an Initial Risk Assessment
Task 1.2: Determining Which Security Policy Is Most Important
Task 1.3: Establishing a User-Awareness Program
Task 1.4: Reviewing a Physical-Security Checklist
Task 1.5: Understanding the Value of Documents
Task 2.3: Patching the Operating System
Task 2.6: Securing Hardware Devices
Task 2.8: Locking the Computer Using an Idle Time-out
Task 3.1: Installing, Updating, and Running Antivirus Software
Task 3.2: Using a Rootkit Checker
Task 3.4: Using a Spyware Checker
Task 3.5: Malicious Software Removal Tool
Task 3.7: ARP Poisoning with Cain & Abel
Task 3.8: Attacking Authentication with Firesheep
Task 4.1: The Encrypting File System
Task 4.4: Converting FAT to NTFS
Task 4.5: Implementing Disk Fault Tolerance with RAID
Task 4.7: Restoring Data from a Backup
Task 4.9: BitLocker Drive Encryption
Task 4.10: Securing Data to Satisfy FIPS 140-2 Using PGP Desktop
Phase 5: Managing User Accounts
Task 5.1: Creating User Accounts
Task 5.2: Implementing the Password Policy
Task 5.4: Securing the Default User Accounts
Task 5.5: Implementing a Deny Group
Task 6.2: Configuring the VPN Server
Task 6.3: Configuring the VPN Client
Task 6.4: Implementing Secure Remote Administration
Task 6.5: Secure Administration Using Run As
Task 6.6: Configuring a Packet Filter
Task 6.7: Implementing 802.11 Wireless Security
Task 6.8: Implementing an IPSec VPN Using AES
Task 6.9: Implementing a Personal Firewall
Phase 7: Securing Internet Activity
Task 7.1: Configuring Internet Access
Task 7.2: Using Internet Explorer Security Zones
Task 7.3: Configuring IE for Secure Use of Cookies
Task 7.4: Using Internet Connection Sharing
Task 7.7: Installing and Using a Digital Certificate
Task 7.8: Certificate Backup and Management
Task 7.9: Performing Secure File Exchange
Task 7.10: Validating Downloads and Checking the Hash
Task 7.11: Logging and Recording Internet Activity
Task 7.12: Using HTTPS to Encrypt Web Traffic
Task 7.13: Using Force-TLS to Add Security to Web Browsing
Task 8.1: Penetration Testing with Nessus
Task 8.2: Penetration Testing with Retina
Task 8.3: Performing Assessments with MBSA
Task 8.4: Performing Security Assessments with IT Shavlik
Task 8.5: Performing Internet Vulnerability Profiling
Task 8.6: Tracking Hostile IPs
Task 8.7: Investigating Netcat
Task 8.8: Exploiting Vulnerabilities with Metasploit
Phase 9: Investigating Incidents
Task 9.1: Configuring an Audit Policy for Object Access
Task 9.2: Reviewing the Audit Logs
Task 9.3: Forcing a Memory Dump
Task 9.4: Capturing Packets with the Packet Analyzer: Wireshark
Task 9.5: Recovering Previous Versions of Files
Task 9.6: Recovering Deleted Content from the File System
Phase 10: Security Troubleshooting
Task 10.1: Booting into Safe Mode
Task 10.2: Implementing Last Known Good Configuration
Task 10.3: Using System Restore
Task 10.5: Implementing a Host-Based Intrusion Detection System