Pearson-Comp-Sec-Fund : Pearson Computer Security Fundamentals Course

Pearson Computer Security Fundamentals Course
ISBN : 9781616913601
Includes:
246+ Test Prepkits
Rating :
(16)
The Computer Security Fundamentals course is a guide for any computer-savvy person and for students who wish to take first course in security. The course is intended as an introductory computer security course and will guide you to a plethora of additional resources. With the help of this course, you will also get to know how the hackers target the system and get the information about it. The course offers hands-on learning experience with the interactive lessons, test-preps, quizzes, exercises, and many more resources.

Here's what you will get

Lessons
Lessons
16+
Quizzes
246+
Flashcards
171+
Glossary of terms
171+
Test prep
Pre-assessment Questions
100+
Post-Assessment Questions
100+

Here's what you will learn

  • Introduction
  • How Seriously Should You Take Threats to Network Security?
  • Identifying Types of Threats
  • Assessing the Likelihood of an Attack on Your Network
  • Basic Security Terminology
  • Concepts and Approaches
  • How Do Legal Issues Impact Network Security?
  • Online Security Resources
  • Summary
  • Introduction
  • Network Basics
  • How the Internet Works
  • History of the Internet
  • Basic Network Utilities
  • Other Network Devices
  • Advanced Network Communications Topics
  • Summary
  • Introduction
  • How Internet Fraud Works
  • Identity Theft
  • Cyber Stalking
  • Protecting Yourself Against Cyber Crime
  • Summary
  • Introduction
  • DoS
  • Illustrating an Attack
  • Summary
  • Introduction
  • Viruses
  • Trojan Horses
  • The Buffer-Overflow Attack
  • The Sasser Virus/Buffer Overflow
  • Spyware
  • Other Forms of Malware
  • Detecting and Eliminating Viruses and Spyware
  • Summary
  • Introduction
  • Basic Terminology
  • The Reconnaissance Phase
  • Actual Attacks
  • Malware Creation
  • Penetration Testing
  • Summary
  • Introduction
  • What Is Industrial Espionage?
  • Information as an Asset
  • Real-World Examples of Industrial Espionage
  • How Does Espionage Occur?
  • Steganography Used in Industrial Espionage
  • Phone Taps and Bugs
  • Protecting Against Industrial Espionage
  • Industrial Espionage Act
  • Spear Phishing
  • Summary
  • Introduction
  • Cryptography Basics
  • History of Encryption
  • Modern Methods
  • Public Key (Asymmetric) Encryption
  • PGP
  • Legitimate Versus Fraudulent Encryption Methods
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Steganography
  • Cryptanalysis
  • Cryptography Used on the Internet
  • Summary
  • Introduction
  • Virus Scanners
  • Firewalls
  • Antispyware
  • IDS
  • Digital Certificates
  • SSL/TLS
  • Virtual Private Networks
  • Wi-Fi Security
  • Summary
  • Introduction
  • What Is a Policy?
  • Defining User Policies
  • Defining System Administration Policies
  • Defining Access Control
  • Developmental Policies
  • Standards, Guidelines, and Procedures
  • Data Classification
  • Disaster Recovery
  • Important Laws
  • Summary
  • Introduction
  • Basics of Assessing a System
  • Securing Computer Systems
  • Scanning Your Network
  • Getting Professional Help
  • Summary
  • Introduction
  • Actual Cases of Cyber Terrorism
  • Weapons of Cyber Warfare
  • Economic Attacks
  • Military Operations Attacks
  • General Attacks
  • Supervisory Control and Data Acquisitions (SCADA)
  • Information Warfare
  • Actual Cases
  • Future Trends
  • Defense Against Cyber Terrorism
  • Terrorist Recruiting and Communication
  • TOR and the Dark Web
  • Summary
  • Introduction
  • General Searches
  • Court Records and Criminal Checks
  • Usenet
  • Summary
  • Introduction
  • General Guidelines
  • Finding Evidence on the PC
  • Finding Evidence in System Logs
  • Getting Back Deleted Files
  • Operating System Utilities
  • The Windows Registry
  • Mobile Forensics: Cell Phone Concepts
  • The Need for Forensic Certification
  • Expert Witnesses
  • Additional Types of Forensics
  • Summary