|
After reading "Building DMZs for Enterprise Networks" you will understand how to design, plan, implement, maintain, secure, and test a DMZ segment using a variety of technologies. This oneofakind book by bestselling authors Robert Shimonski and Dr. Thomas W. Shinder will teach you DMZ design principles, show you how to configure the hardware that makes up DMZs, securely populate the DMZs with systems and services, and be able to implement security on a DMZ.Understand DMZ Concepts and LayoutSee how to plan your network security and why, and learn the risks of implementing DMZs.Master Intrusion Detection Systems in the DMZSet up a honeypot, configure IDS, use CiscoSecure IDS and Snort, and set up an IDS on a small budget.Design and Implement a Wireless DMZLearn why we need wireless DMZs and how to build the wireless DMZ. Find wireless DMZ examples and a wireless LAN security bestpractices list.Build Infrastructure Different Firewall VendorsUse Cisco PIX firewalls, Check Point NG, Nokia solutions, and Microsoft ISA Server 2000 with your DMZ segment and control its traffic.Master the Basics of DMZ Router and Switch SecuritySecure the most commonly forgotten pieces of the DMZthe connecting hardware and completely harden your edge systems.Understand DMZBased VPN ServicesLearn how you place VPN Services in the DMZ and learn the differences between sitetosite VPNs and other set ups.Place Sun Systems on Your DMZGet a look at Sun Solaris bastion hosts, control access to resources, and lock down your systems.Build Windows 2000 Bastion Hosts on Your DMZLearn Windows 2000 specifics and see how to configure security, set up remote administration of DMZ hosts, and vulnerabilityscan your hosts.Hack the DMZGet into the mind of the hacker and see what you need to do to secure the DMZ before hackers tear into it.Register for Your 1 Year UpgradeThe Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
|
|
|