Request for consultation

Thanks for your request. You’ll soon be chatting with a consultant to get the answers you need.
{{formPostErrorMessage.message}} [{{formPostErrorMessage.code}}]
First Name is required. 'First Name' must contain at least 0 characters 'First Name' cannot exceed 0 characters Please enter a valid First Name
Last Name is required. 'Last Name' must contain at least 0 characters 'Last Name' cannot exceed 0 characters Please enter a valid Last Name
Institution is required.
Discipline is required.
Why are you contacting us today? is required. 'Why are you contacting us today?' must contain at least 0 characters 'Why are you contacting us today?' cannot exceed 0 characters Please enter a valid Why are you contacting us today?

Hands-On Ethical Hacking and Network Defense 2nd Edition

Michael T. Simpson, Kent Backman, James Corley

  • Published
  • Previous Editions 2006
  • 480 Pages

Overview

Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker.

Michael T. Simpson,

Michael T. Simpson is president/senior consultant of MTS Consulting, Inc., a firm specializing in network security and network design. His certifications include CEH, CISSP, Security+, OSSTMM Professional Security Tester (OPST), OSSTMM Professional Security Analyst (OPSA), ITIL, MCSE, MCDBA, MCSD, MCT, and OCP. He also holds an M.B.A. from M.B.A. Chaminade University and has authored or co-authored eight books. Mike has more than 30 years of industry experience, including 20 years with the U.S. Department of Defense, where he designed and configured computer networks, served as an Oracle® database and UNIX® administrator, and held multiple cyber security positions.

Kent Backman,

Kent Backman's expertise is in intrusion analysis, network vulnerability assessment, and opensource solution engineering. His interest and skill in ethical hacking developed while managing Web servers for Fortune 500 companies. An analyst for many security incident response teams, Kent spent several years in Baghdad as part of the advisory team to the Iraq Ministry of Defense, specializing in network security and Linux engineering. He holds RHCT, MCSA, CISSP, and CEH certifications and is a network security consultant in Honolulu.

James Corley,

James (Jim) Corley has more than twenty-five years of experience in IT as a systems analyst, network engineer, and security professional. He worked for the DoD for nine years as a database administrator and information systems security officer. For the past sixteen years, Jim has been a consultant to the DoD on dozens of IT programs supporting both classified and unclassified voice, video, and data systems. He has been a Certified Information Systems Security Professional (CISSP) since 2002.
  • Provides updated computer security tools with a look at new vulnerabilities and exploits and innovative methods to protect networks.
  • Includes a thorough update of the federal and state computer crime laws as well as changes in penalties for illegal computer hacking.
  • Bootable DVD allows you to use a Linux-based OS and BackTrack security tools on any Microsoft Windows OS to make hands-on activities easier to perform so you can spend more time learning how to use security tools then learning how to install and configure Linux.
  • Back of book DVD also includes OSSTMM version 3.0 Lite, a manual for security testers, and several examples of penetration-testing forms you can modify for your use.
  • Information on Web filtering, Intrusion Prevention System (IPS), and a look at how virtualization is used both by hackers and security professionals alike has been added to this edition.
  • Includes numerous case studies that take the student through all aspects of network planning, including interconnectivity issues, physical transmission options, voice and data integration, WAN transport methods and ATM technologies.
  • Provides a step-by-step approach to penetration testing techniques and methodologies.
  • Helps students discover network vulnerabilities by explaining tools hackers use to bypass network security.
  • Includes up-to-date material on network security, and wireless technology and how they affect Wide Area Networks, as well as a thorough background on ethical and legal issues pertaining to penetration testing.
  • Features extensive learning tools, including Review Questions, Hands-On Projects, and Case Projects, that allow students to practice skills as they learn.
1: Ethical Hacking Overview.
2: TCP/IP Concepts Review.
3: Network and Computer Attacks.
4: Footprinting and Social Engineering.
5: Port Scanning.
6: Enumeration.
7: Programming for Security Professionals.
8: Embedded Operating Systems.
9: Linux Operating System Vulnerabilities.
10: Hacking Web Servers.
11: Hacking Wireless Networks.
12: Cryptography.
13: Protecting Networks with Security Devices.
Appendix A: Legal Resources.
Appendix B: Resources.
Appendix C: Virtual Machine Instructions.
Appendix: Documentation Forms for Penetration Tests (Will appear on DVD in the back of the book only).

Textbook Only Options

Traditional eBook and Print Options

{{collapseContainerClosed['detail_0'] ? 'Show More' : 'Show Less'}}
z

  • ISBN-10: 1133477038
  • ISBN-13: 9781133477037
  • STARTING AT $18.99

  • STARTING AT $31.49

  • ISBN-10: 1435486099
  • ISBN-13: 9781435486096
  • Bookstore Wholesale Price $150.00
  • RETAIL $199.95

Cengage provides a range of supplements that are updated in coordination with the main title selection. For more information about these supplements, contact your Learning Consultant.

FOR INSTRUCTORS

Instructor Website

ISBN: 9781305086623
Everything you need for your course in one place! This collection of product-specific lecture and class tools is available online via the instructor resource center at www.cengage.com/login. You’ll be able to access and download materials such as PowerPoint® presentations, images, instructor’s manual, videos, and more.

Cengage Learning Testing, powered by Cognero® Instant Access

ISBN: 9781305109360
Cengage Learning Testing, powered by Cognero® is a flexible, online system that allows you to import, edit, and manipulate content from the text’s test bank or elsewhere, including your own favorite test questions; create multiple test versions in an instant; and deliver tests from your LMS, your classroom, or wherever you want.