SSCP Study Guide and DVD Training System

Chapter 2: Access Controls

Exercise 2.01: Obtaining Access to Objects
Exercise 2.02: Brute Force Cracking with L0phtCrack

Chapter 3: Administration

Exercise 3.01: Viewing Discretionary Access Control Settings on UNIX

Chapter 4: Audit and Monitoring

Exercise 4.01: Security Checklist Audit
Exercise 4.02: Using a Wardialer

Chapter 5: Risk, Response, and Recovery

Exercise 5.01: Identifying Risks
Exercise 5.02: Risks and Threats
Exercise 5.03: Determining the Annual Loss Expected to Occur from Risks
Exercise 5.04: Alternate Sites
Exercise 5.05: Using Tools to View Volatile Data in Memory
Exercise 5.06: Acquiring Evidence Using EnCase

Chapter 6: Cryptography

Exercise 6.01: Cracking an NT Password Hash
Exercise 6.02: Binary Math with XOR
Exercise 6.02: Reviewing a Digital Certificate

Chapter 7: Data Communications

Exercise 7.01: ARP Spoofing

Chapter 8: Malicious Code and Malware

Exercise 8.01: Creating a Professional Virus Report
Exercise 8.02: Performing a Ping of Death Attack
Exercise 8.03: Capturing FTP with a Sniffer

Категории