Hacker Techniques, Tools, and Incident Handling, Second Edition

Hacker Techniques, Tools, and Incident Handling, Second Edition

Sean-Philip Oriyano
ISBN-13: 978-1-284-03171-3
Paperback
417 pages
© 2014

Learn More
Request a Review Copy

  • Description
  • Applied Labs
  • Table of Contents
  • Course Objectives
  • Resources

Revised and updated to keep pace with changes in this evolving field, Hacker Techniques, Tools, and Incident Handling, Second Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, the Second Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.

Key Features

  • Includes a completely new Chapter 13 on social engineering and what it means in the context of cybersecurity, including a typical attack, identity theft, and best security practices
  • Provides new information on cryptography and encryption in network protocols
  • Updated references to Windows 8, Server 2008, Server 2012
  • Added information on Active Directory and Symantec Security Suite 10
  • Includes new material on using social networks, Wardriving and Warflying, detecting rogue access points and WiFi Pineapple
  • New section material on cloud computing and cloud security issues.

This title is available with Virtual Security Cloud Labs – delivered in a first-of-its-kind cloud computing environment- that provides a fully immersive mock IT infrastructure enabling hands-on-experiential learning. An integrated lab manual is available to assist you with these labs.
 

Lab #1: Assessing and Securing Systems on a Wide Area Network (WAN)
Lab #2: Applying Encryption and Hashing Algorithms for Secure Communications
Lab #3: Data Gathering and Footprinting on a Targeted Website
Lab #4: Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation
Lab #5: Attacking a Vulnerable Web Application and Database
Lab #6: Identifying and Removing Malware on a Windows System
Lab #7: Analyzing Network Traffic to Create a Baseline Definition
Lab #8: Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Lab #9: Investigating and Responding to Security Incidents
Lab #10: Securing the Network with an Intrusion Detection System (IDS)
Part 1: Hacker Techniques and Tools
Chapter 1: Hacking: The Next Generation
Chapter 2: TCP/IP Review
Chapter 3: Cryptographic Concepts
Chapter 4: Physical Security
Part 2: A Technical Overview of Hacking
Chapter 5: Footprinting Tools and Techniques
Chapter 6: Portscanning
Chapter 7: Enumeration and Computer System Hacking
Chapter 8: Wireless Vulnerabilities
Chapter 9: Web and Database Attacks
Chapter 10: Trojans and Backdoors
Chapter 11: Malware, Worms, and Computer Viruses
Chapter 12: Sniffers, Session Hijacking, and Denial of Service
Chapter 13: Linux, Live CDs, and Automated Assessment Tools
Part 3: Incident Response and Defensive Technologies
Chapter 14: Incident Response
Chapter 15: Defensive Technologies
  1. Explain the history and current state of hacking and penetration testing, including ethical and legal implications.
  2. Describe cryptology.
  3. Identify common information gathering tools and techniques.
  4. Analyze system vulnerabilities exploited by hackers.
  5. Perform web and database attacks.
  6. Remove trojans, backdoors, and malware from infected systems.
  7. Perform network traffic analysis and sniffing by using appropriate tools.
  8. Analyze wireless network vulnerabilities exploited by hackers.
  9. Perform incident handling by using appropriate methods.
  10. Compare and contrast defensive technologies.

Instructor Resources include:

  • PowerPoint Lectures
  • Instructor’s Guide
  • Test and Quiz Items
  • Sample Syllabus
  • Case Scenarios/Handouts
  • Handouts
  • Projects
  • Study Guide
  • Time on Task
  • Content Map