Book Title: Mastering Enterprise Networks

Subtitle: Step-by-step labs to create, attack and defend enterprise networks

Authors: Mathew J. Heath Van Horn, PhD

Book Description: A hands on guide to create a personal lab space on an average laptop or PC which allows any learner to follow step-by-step instructions to create various enterprise networks and learn how to defend and attack these networks.

License:
Creative Commons Attribution

Contents

Book Information

Book Description

Mastering Enterprise Networks, is a comprehensive guide to building, defending, and attacking enterprise networks. It covers a wide range of topics, from network fundamentals to advanced security concepts. The book is well-organized and easy to follow, making it a valuable resource for both beginners and experienced network professionals.

One of the strengths of this book is its focus on hands-on learning. The book includes 50 chapters of labs that allow readers to practice the concepts they have learned. These labs are a great way to reinforce your understanding of enterprise networks while developing practical skills.

This book covers security from multiple perspectives. The book helps anyone learn a variety of security threats and countermeasures, including firewalls, intrusion detection systems, and vulnerability scanning. This information is essential for anyone who wants to protect their enterprise network from cyberattacks.

Each lab was tested by novices and experienced cyber workers.  The youngest tester was only 12 years old and many labs were tested by people with no cyber experience at all.  Each tester’s learning experience was incorporated into each lab to reflect how n00bs learned the material so that everyone could learn from these labs.

Overall, Mastering Enterprise Networks is an excellent resource for anyone who wants to learn more about enterprise networks. The book is comprehensive, well-written, and easy to follow. The hands-on labs are a great way to reinforce your understanding of the concepts, and the coverage of security is essential for anyone who wants to protect their network.

Send comments or corrections to prmaster@erau.edu

Authors

Mathew J. Heath Van Horn, PhD

License

Icon for the Creative Commons Attribution 4.0 International License

Mastering Enterprise Networks Copyright © 2024 by Mathew J. Heath Van Horn is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Subject

Computing and Information Technology

Metadata

Title
Mastering Enterprise Networks
Authors
Mathew J. Heath Van Horn, PhD
Editors
Dante Rocca; Jacob Christensen; and Julian Romano
Illustrator
Romana A. Heath Van Horn
Contributors
Jacob Christensen; Bernard Correa; Raechel Ferguson; Sawyer Hansen; Justin La Zare; Julian Romano; and Dante Rocca
License

Icon for the Creative Commons Attribution 4.0 International License

Mastering Enterprise Networks Copyright © 2024 by Mathew J. Heath Van Horn is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Primary Subject
Computing and Information Technology
Additional Subject(s)
Computer fraud and hacking, Computer networking and communications, Client–Server networking, Networking standards and protocols, Computer applications in industry and technology, Children’s / Teenage general interest: Computer and video games
Institution
Embry-Riddle Aeronautical University
Publisher
Embry-Riddle Aeronautical University
Digital Object Identifier (DOI)
https://doi.org/10.15394/eaglepub.2023.1069
Print ISBN
979-8-9852614-4-8