Preface
1
Infrastructure Security in the Real World
2
Understanding Access-Control and Monitoring Systems
3
Understanding Video Surveillance Systems
4
Understanding Intrusion-Detection and Reporting Systems
5
Infrastructure Security: Review Questions and Hands-On Exercises
6
Local Host Security in the Real World
7
Securing Devices
8
Protecting the Inner Perimeter
9
Protecting Remote Access
10
Local Host Security: Review Questions and Hands-On Exercises
11
Securing Local Networks
12
Networking Basics
13
Understanding Networking Protocols
14
Understanding Network Servers
15
Understanding Network Connectivity Devices
16
Understanding Network Transmission Media Security
17
Local Network Security: Review Questions
18
Perimeter Security in the Real World
19
Understanding the Environment
20
Hiding the Private Network
21
Protecting the Perimeter
22
Protecting Data Moving Through the Internet
23
Tools and Utilities
24
Identifying and Defending Against Vulnerabilities
25
Perimeter Security: Review Questions and Hands-On Exercises
26
APPENDIX A
27
APPENDIX B
28
APPENDIX C
29
INDEX