The Network Security Test Lab: A Step-by-Step Guide

  • 7h 44m
  • Michael Gregg
  • John Wiley & Sons (US)
  • 2015

The Network Security Test Lab sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, this convenient resource will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats—including network attacks, crimeware, malware, and the most-prevalent malicious traffic—and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more.

Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them.

This complete guide is your introduction to mastering:

  • The best hardware and gear to develop your own test platform
  • All the ways attackers penetrate vulnerable security systems
  • Detection of malicious activity and effective defense responses
  • Defense-strategy authoring based on investigation and analysis

About the Author

MICHAEL GREGG is CEO of Superior Solutions. He is the author of twenty security books, including Security+ Street Smarts, and a regular contributor to Huffington Post, SearchNetworking.com, and other periodicals. During his twenty years working in security, networking, and Internet technology, he has testified before U.S. Congress and has developed a variety of learning tools for colleges and training organizations.

In this Book

  • Introduction
  • Building a Hardware and Software Test Platform
  • Passive Information Gathering
  • Analyzing Network Traffic
  • Detecting Live Systems and Analyzing Results
  • Enumerating Systems
  • Automating Encryption and Tunneling Techniques
  • Automated Attack and Penetration Tools
  • Securing Wireless Systems
  • An Introduction to Malware
  • Detecting Intrusions and Analyzing Malware
  • Forensic Detection
SHOW MORE
FREE ACCESS