SSCP Study Guide and DVD Training System
Chapter 2: Access Controls
- Exercise 2.01: Obtaining Access to Objects
- Exercise 2.02: Brute Force Cracking with L0phtCrack
Chapter 3: Administration
- Exercise 3.01: Viewing Discretionary Access Control Settings on UNIX
Chapter 4: Audit and Monitoring
- Exercise 4.01: Security Checklist Audit
- Exercise 4.02: Using a Wardialer
Chapter 5: Risk, Response, and Recovery
- Exercise 5.01: Identifying Risks
- Exercise 5.02: Risks and Threats
- Exercise 5.03: Determining the Annual Loss Expected to Occur from Risks
- Exercise 5.04: Alternate Sites
- Exercise 5.05: Using Tools to View Volatile Data in Memory
- Exercise 5.06: Acquiring Evidence Using EnCase
Chapter 6: Cryptography
- Exercise 6.01: Cracking an NT Password Hash
- Exercise 6.02: Binary Math with XOR
- Exercise 6.02: Reviewing a Digital Certificate
Chapter 7: Data Communications
- Exercise 7.01: ARP Spoofing
Chapter 8: Malicious Code and Malware
- Exercise 8.01: Creating a Professional Virus Report
- Exercise 8.02: Performing a Ping of Death Attack
- Exercise 8.03: Capturing FTP with a Sniffer