Bezpieczeństwo sieci
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
Jakub Skórka, Kacper Skórka, Marcin Kaim
Książka „Bezpieczeństwo w sieci – Jak skutecznie chronić się przed atakami” to poradnik, dzięki któremu każdy czytelnik, bez względu na stopień zaawansowania informatycznego, zrozumie podstawowe zasady bezpiecznej pracy na komputerze z systemem Windows 10 podłączonym do sieci z dostępem do Internetu. Czytelnik początkujący będzie miał szansę poznania wszystkich zagadnień, natomiast zaawansowany, będzie miał okazję przemyśleć sposób w jaki korzysta z komputera i sieci. W książce zgromadziliśmy wyselekcjonowany zasób podstawowych pojęć związanych z komputerem, Internetem i bezpieczeństwem sieci. Przedstawiliśmy zagrożenia, oraz tajemniczego wroga sieciowego, bo zrozumienie jego postępowania to klucz do naszego bezpieczeństwa. Omawiając zasady bezpiecznego korzystania z systemu Windows z dostępem do Internetu, staraliśmy się przedstawić jak zabezpieczyć nasze cyfrowe życie. Praca z przeglądarką internetową, korzystanie z chmury, bezpieczne zakupy czy ochrona dzieci, to kluczowe tematy jakimi się zajęliśmy. Autorami książki są młodzi zapaleńcy i hobbyści informatyczni, utalentowani uczniowie Zespołu Szkół nr 1 w Piekarach Śląskich, a prywatnie bracia Jakub i Kacper Skórka. Postanowili przygotować poradnik, dzięki któremu każdy będzie mógł poczuć się bezpieczniej w sieci. Pracowali wraz ze swoim nauczycielem Marcinem Kaim, nauczycielem przedmiotów zawodowych, instruktorem w Akademii Cisco CCNA oraz wydawcą i autorem wielu książek z dziedziny informatyki.
Bezpieczny Senior w Internecie
Marcin Kaim, Kacper Skórka, Jakub Skórka
Książka „Bezpieczny senior w Internecie” to poradnik, dedykowany nie tylko osobom starszym, ale również wszystkim czytelnikom bez względu na stopień zaawansowania informatycznego. Jest to kolejna pozycja po poprzednich tytułach naszego wydawnictwa: Smartfon, Laptop i Internet również dla seniora, które w podstawowy sposób przedstawiają podstawowe zasady bezpiecznej pracy przy użyciu sprzętu podłączonego do Internetu. Czytelnik początkujący będzie miał szansę poznania wszystkich zagadnień związanych z bezpieczeństwem, natomiast zaawansowany, będzie miał okazję przemyśleć w jaki sposób do tej pory korzysta z komputera i sieci. W książce zgromadziliśmy wyselekcjonowany zasób podstawowych pojęć związanych z komputerem, Internetem i bezpieczeństwem sieci. Przedstawiliśmy zagrożenia, oraz tajemniczego wroga sieciowego, bo zrozumienie jego postępowania to klucz do naszego bezpieczeństwa. Omawiając zasady bezpiecznego korzystania z systemu Windows z dostępem do Internetu, staraliśmy się przedstawić w jaki sposób zabezpieczyć nasze cyfrowe życie. Praca z przeglądarką internetową, korzystanie z chmury, bezpieczne zakupy czy ochrona dzieci, to kluczowe tematy jakimi się zajęliśmy. Autorami książki są młodzi zapaleńcy i hobbyści informatyczni, utalentowany uczeń i absolwent Zespołu Szkół nr 1 w Piekarach Śląskich, a prywatnie bracia Jakub i Kacper Skórka. Pracowali wraz ze swoim nauczycielem Marcinem Kaim, nauczycielem przedmiotów zawodowych, instruktorem w Akademii Cisco CCNA oraz wydawcą i autorem wielu książek z dziedziny informatyki.
Blue team i cyberbezpieczeństwo. Zestaw narzędzi dla specjalistów od zabezpieczeń w sieci
Nadean H. Tanner
Zapewnienie bezpieczeństwa IT spędza sen z powiek nie tylko inżynierom, ale również menedżerom i kierownictwu organizacji. W tym zadaniu mają im pomóc różnorodne narzędzia, jednak ich skuteczne wykorzystanie wymaga nie tylko wyrafinowanej wiedzy technicznej. Konieczne jest nieco szersze spojrzenie na sprawy cyberbezpieczeństwa, aby zastosować właściwe strategie obronne i środki zaradcze. By podejmować trafne decyzje, potrzebna jest wiedza o najlepszych praktykach cyberbezpieczeństwa i o dostępnych narzędziach. To wszechstronny i praktyczny podręcznik dla kierowników i inżynierów. Opisuje różnorodne metody, platformy i technologie pochodzące od wielu dostawców, zawiera też wskazówki, jak je wykorzystać do tworzenia optymalnych rozwiązań. Przedstawiono tu pożyteczne informacje o sieciach komputerowych, podstawowych narzędziach bezpieczeństwa, rozwiązywaniu problemów w systemie Windows, inwentaryzacji sieci, zarządzaniu podatnościami, bezpieczeństwie aplikacji internetowych, zarządzaniu aktualizacjami i konfiguracją oraz wiele innych kwestii. Książka jest równocześnie treściwa i prosta w odbiorze, pozwala zapoznać się z aspektami technicznymi i nietechnicznymi, z teorią i praktyką cyberbezpieczeństwa - z pewnością ułatwi naukę metod oceny zagrożeń oraz sprawdzania i poprawiania stosowanej konfiguracji. W książce znajdziesz: teoretyczne i praktyczne aspekty bezpieczeństwa informatycznego skuteczne strategie obronne rodzaje narzędzi zapewniających cyberbezpieczeństwo zastosowanie takich narzędzi jak PuTTY, pathping, sysinternals
Carlos A. Lozano , Shahmeer Amir
Bug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers.This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed.This book will get you started with bug bounty hunting and its fundamentals.
Ashish Kothekar
This comprehensive guide to QRadar will help you build an efficient security operations center (SOC) for threat hunting and need-to-know software updates, as well as understand compliance and reporting and how IBM QRadar stores network data in real time.The book begins with a quick introduction to QRadar components and architecture, teaching you the different ways of deploying QRadar. You’ll grasp the importance of being aware of the major and minor upgrades in software and learn how to scale, upgrade, and maintain QRadar. Once you gain a detailed understanding of QRadar and how its environment is built, the chapters will take you through the features and how they can be tailored to meet specifi c business requirements. You’ll also explore events, flows, and searches with the help of examples. As you advance, you’ll familiarize yourself with predefined QRadar applications and extensions that successfully mine data and find out how to integrate AI in threat management with confidence. Toward the end of this book, you’ll create different types of apps in QRadar, troubleshoot and maintain them, and recognize the current security challenges and address them through QRadar XDR.By the end of this book, you’ll be able to apply IBM QRadar SOC’s prescriptive practices and leverage its capabilities to build a very efficient SOC in your enterprise.
Sherwin John C. Tragura
FastAPI is an Asynchronous Server Gateway Interface (ASGI)-based framework that can help build modern, manageable, and fast microservices. Because of its asynchronous core platform, this ASGI-based framework provides the best option when it comes to performance, reliability, and scalability over the WSGI-based Django and Flask. When working with Python, Flask, and Django microservices, you’ll be able to put your knowledge to work with this practical guide to building seamlessly manageable and fast microservices.You’ll begin by understanding the background of FastAPI and learning how to install, configure, and use FastAPI to decompose business units. You’ll explore a unique and asynchronous REST API framework that can provide a better option when it comes to building microservices. After that, this book will guide you on how to apply and translate microservices design patterns in building various microservices applications and RESTful APIs using the FastAPI framework.By the end of this microservices book, you’ll be able to understand, build, deploy, test, and experiment with microservices and their components using the FastAPI framework.
Kevin Cardwell
Security flaws and new hacking techniques emerge overnight – security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams. Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you’re going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients.Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams.
Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite
Dr. Sunny Wear
Burp Suite is a Java-based platform for testing the security of your web applications, and has been adopted widely by professional enterprise testers.The Burp Suite Cookbook contains recipes to tackle challenges in determining and exploring vulnerabilities in web applications. You will learn how to uncover security flaws with various test cases for complex environments. After you have configured Burp for your environment, you will use Burp tools such as Spider, Scanner, Intruder, Repeater, and Decoder, among others, to resolve specific problems faced by pentesters. You will also explore working with various modes of Burp and then perform operations on the web. Toward the end, you will cover recipes that target specific test scenarios and resolve them using best practices.By the end of the book, you will be up and running with deploying Burp for securing web applications.
Andrew Chu
Cybersecurity roles have grown exponentially in the IT industry and an increasing number of organizations have set up security operations centers (SOCs) to monitor and respond to security threats. The 210-255 SECOPS exam is the second of two exams required for the Cisco CCNA Cyber Ops certification. By providing you with fundamental knowledge of SOC events, this certification validates your skills in managing cybersecurity processes such as analyzing threats and malicious activities, conducting security investigations, and using incident playbooks.You'll start by understanding threat analysis and computer forensics, which will help you build the foundation for learning intrusion analysis and incident response principles. The book will then guide you through vocabulary and techniques for analyzing data from the network and previous events. In later chapters, you'll discover how to identify, analyze, correlate, and respond to incidents, including how to communicate technical and inaccessible (non-technical) examples. You'll be able to build on your knowledge as you learn through examples and practice questions, and finally test your knowledge with two mock exams that allow you to put what you’ve learned to the test.By the end of this book, you'll have the skills to confidently pass the SECOPS 210-255 exam and achieve CCNA Cyber Ops certification.
Glen D. Singh, Michael Vinod, Vijay Anandh
With CCNA Security certification, a network professional can demonstrate the skills required to develop security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security 210-260 Certification Guide will help you grasp the fundamentals of network security and prepare you for the Cisco CCNA Security Certification exam.You’ll begin by getting a grip on the fundamentals of network security and exploring the different tools available. Then, you’ll see how to securely manage your network devices by implementing the AAA framework and configuring different management plane protocols.Next, you’ll learn about security on the data link layer by implementing various security toolkits. You’ll be introduced to various firewall technologies and will understand how to configure a zone-based firewall on a Cisco IOS device. You’ll configure a site-to-site VPN on a Cisco device and get familiar with different types of VPNs and configurations. Finally, you’ll delve into the concepts of IPS and endpoint security to secure your organization’s network infrastructure.By the end of this book, you’ll be ready to take the CCNA Security Exam (210-260).
CCNP 300-410 ENARSI. Zaawansowane administrowanie sieciami przedsiębiorstwa i bezpieczeństwo sieci
Adam Józefiok
Dziwne, u mnie też nie działa... Rola administratora sieci komputerowej zaczyna się od jej skonfigurowania, jednak na tym absolutnie się nie kończy. Dalej musi on zadbać o to, by sieć działała poprawnie - jeśli cokolwiek pójdzie nie tak, administrator szybko dowie się o tym od użytkowników i zostanie poproszony, by równie szybko przywrócił ją do stanu poprzedniego. Drobnostka, jeśli problem okazuje się błahy i prosty do rozwiązania. Prawdziwe wyzwanie zaczyna się wtedy, kiedy naprawa usterki wymaga dogłębnej znajomości sieci, jej silnych i mocnych stron, a także metod radzenia sobie z awariami. Na szczęście powstała ta książka. Najnowsza pozycja autorstwa Adama Józefioka pozwoli Ci nie tylko poznać swoją sieć komputerową w najdrobniejszych szczegółach. Dowiesz się również, jak sobie radzić, gdy detal, z którego istnienia co prawda zdajesz sobie sprawę, ale którego nie bierzesz pod uwagę jako źródła ewentualnych problemów, nagle zaczyna sprawiać kłopoty. Przyswajając wiedzę teoretyczną zawartą w książce i trenując na jej podstawie umiejętności praktyczne, przygotujesz się równocześnie do zdania egzaminu CCNP ENCOR, a tym samym do zdobycia kolejnego certyfikatu przydatnego w Twojej rozwijającej się karierze administratora sieci komputerowych.
Omar A. Turner, Navya Lakshmana
Preparing for the Certified Cloud Security Professional (CCSP) exam can be challenging, as it covers a wide array of topics essential for advancing a cybersecurity professional’s career by validating their technical skills. To prepare for the CCSP exam, you need a resource that not only covers all the exam objectives but also helps you prepare for the format and structure of the exam.Written by two seasoned cybersecurity professionals with a collective experience of hundreds of hours training CCSP bootcamps, this CCSP study guide reflects the journey you’d undertake in such training sessions.The chapters are packed with up-to-date information necessary to pass the (ISC)2 CCSP exam. Additionally, to boost your confidence, the book provides self-assessment questions, exam tips, and mock exams with detailed answer explanations. You’ll be able to deepen your understanding using illustrative explanations that briefly review key points.As you progress, you’ll delve into advanced technical aspects of cloud domain security, such as application security, design, managing and securing data, and infrastructure in the cloud using best practices and legal policies and procedures.By the end of this guide, you’ll be ready to breeze through the exam and tackle real-world cloud security challenges with ease.
Dale Meredith, Christopher Rees
With cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book.This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book.By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v12 certified ethical hacker.
Hemang Doshi
CISM is a globally recognized and much sought-after certification in the field of IT security. This second edition of the Certified Information Security Manager Exam Prep Guide is up to date with complete coverage of the exam content through comprehensive and exam-oriented explanations of core concepts. Written in a clear, succinct manner, this book covers all four domains of the CISM Review Manual.With this book, you’ll unlock access to a powerful exam-prep platform which includes interactive practice questions, exam tips, and flashcards. The platform perfectly complements the book and even lets you bring your questions directly to the author.This mixed learning approach of exploring key concepts through the book and applying them to answer practice questions online is designed to help build your confidence in acing the CISM certification.By the end of this book, you'll have everything you need to succeed in your information security career and pass the CISM certification exam with this handy, on-the-job desktop reference guide.
Clint Bodungen, Aaron Crow
Are you ready to unleash the potential of AI-driven cybersecurity? This cookbook takes you on a journey toward enhancing your cybersecurity skills, whether you’re a novice or a seasoned professional. By leveraging cutting-edge generative AI and large language models such as ChatGPT, you'll gain a competitive advantage in the ever-evolving cybersecurity landscape.ChatGPT for Cybersecurity Cookbook shows you how to automate and optimize various cybersecurity tasks, including penetration testing, vulnerability assessments, risk assessment, and threat detection. Each recipe demonstrates step by step how to utilize ChatGPT and the OpenAI API to generate complex commands, write code, and even create complete tools. You’ll discover how AI-powered cybersecurity can revolutionize your approach to security, providing you with new strategies and techniques for tackling challenges. As you progress, you’ll dive into detailed recipes covering attack vector automation, vulnerability scanning, GPT-assisted code analysis, and more. By learning to harness the power of generative AI, you'll not only expand your skillset but also increase your efficiency.By the end of this cybersecurity book, you’ll have the confidence and knowledge you need to stay ahead of the curve, mastering the latest generative AI tools and techniques in cybersecurity.
Vladimir Yakovlev
Check Point firewalls are the premiere firewalls, access control, and threat prevention appliances for physical and virtual infrastructures. With Check Point’s superior security, administrators can help maintain confidentiality, integrity, and the availability of their resources protected by firewalls and threat prevention devices. This hands-on guide covers everything you need to be fluent in using Check Point firewalls for your operations.This book familiarizes you with Check Point firewalls and their most common implementation scenarios, showing you how to deploy them from scratch. You will begin by following the deployment and configuration of Check Point products and advance to their administration for an organization. Once you’ve learned how to plan, prepare, and implement Check Point infrastructure components and grasped the fundamental principles of their operation, you’ll be guided through the creation and modification of access control policies of increasing complexity, as well as the inclusion of additional features. To run your routine operations infallibly, you’ll also learn how to monitor security logs and dashboards. Generating reports detailing current or historical traffic patterns and security incidents is also covered.By the end of this book, you'll have gained the knowledge necessary to implement and comfortably operate Check Point firewalls.
Mustafa Toroman
Decyzja o przeniesieniu zasobów informatycznych do chmury jest podejmowana najczęściej wtedy, gdy niezawodność i bezpieczeństwo systemu są dla firmy sprawą kluczową. Jeśli chodzi o rozwiązania oparte na chmurze obliczeniowej, warto zainteresować się Azure. Azure udostępnia takie usługi, by umożliwić rozbudowę i monitorowanie aplikacji, baz danych czy innych usług oraz zarządzanie nimi w sposób globalny. Pozwala na ciągłe dostarczanie znakomitych, innowacyjnych rozwiązań. Umożliwia wirtualizację rozmaitych systemów, takich jak Windows, Linux, dystrybucje serwerowe, strony WWW, aplikacje ASP .NET, systemy CMS, bazy danych czy rozproszone klastry obliczeniowe. Oto praktyczne wprowadzenie do Azure. Wyjaśniono tu wiele pojęć potrzebnych w pracy administratora, takich jak sieci wirtualne oraz koncepcja IaaS. Omówiono zasady pracy z Azure oraz pokazano, jak można przygotować platformę do wdrożenia własnego systemu. Od strony praktycznej przedstawiono tworzenie zaawansowanych usług w platformie Azure. Sporo miejsca poświęcono najważniejszym kwestiom bezpieczeństwa i administracji, zaprezentowano też szereg dobrych praktyk, a także sporo technik ułatwiających rozwiązywanie najczęstszych problemów. Książka jest napisana w zwięzły i przystępny sposób. Dzięki niej szybko i skutecznie zaczniesz administrować zasobami w chmurze Azure. W tej książce między innymi: podstawowe pojęcia, koncepcje i modele związane z chmurą obliczeniową tworzenie i konfiguracja wirtualnej maszyny Azure praca z bazami danych, usługi IaaS i PaaS usługi hybrydowe, implementacja i zarządzanie tożsamość i bezpieczeństwo zasobów w chmurze Azure Chmura Azure: przenieś swój system na wyższy poziom!
CHROŃ I ROZWIJAJ BIZNES - CYBER AI Część 1 Wykorzystanie AI w bezpieczeństwie organizacji
Dariusz Gołębiowski
Masz firmę, fundację, albo inną organizację, którą chcesz ochronić przed cyberzagrożeniami? Świetnie, bo właśnie trzymasz wirtualną broń do walki z cyfrowymi złoczyńcami! Pierwsza część serii "CHROŃ I ROZWIJAJ BIZNES - CYBER AI" to Twoje kompendium wiedzy o tym, jak nie tylko wywinąć się z rąk hakerów, ale też sprytnie wdrożyć sztuczną inteligencję, która pomoże Ci spać spokojnie... no, przynajmniej dopóki AI nie zacznie przejmować kontroli nad światem. 😉 W tej książce dowiesz się, dlaczego malware to coś więcej niż problem komputera wujka Janka, jak unikać pułapek phishingowych, które są bardziej podstępne niż zaproszenie na "darmową pizzę", oraz dlaczego dyrektywa NIS 2 nie jest tylko kolejnym nudnym prawniczym dokumentem, który gdzieś tam podpisano. A teraz najlepsza część: sztuczna inteligencja (tak, ta od filmów sci-fi!) może być Twoim najlepszym przyjacielem w walce z zagrożeniami. Dzięki AI Twój system zabezpieczeń będzie niczym Sherlock Holmes, który znajdzie każdą podejrzaną aktywność, zanim jeszcze pomyślisz o kawie. W książce znajdziesz konkretne przykłady, jak AI może ochronić Twoje dane, monitorować pracowników (bez robienia z tego kolejnego odcinka live-streaam badziewnych seriali dla samotnych ludzi) i automatyzować reakcje na zagrożenia. Jeśli myślisz, że to koniec... to niespodzianka! Druga część serii, zaplanowana na przyszły rok, będzie o tym, jak sztuczna inteligencja nie tylko ochroni Twoją organizację, ale także pomoże Ci ją rozwijać - kto wie, może nawet stworzy dla Ciebie plan na podbój świata (w granicach prawa, oczywiście). Nie przegap okazji, żeby zabezpieczyć swój biznes przed zagrożeniami, które krążą w sieci szybciej niż memy z kotami. Zrób to z uśmiechem i nutą technologicznej magii!
Hemang Doshi
With the latest updates and revised study material, this second edition of the Certified Information Systems Auditor Study Guide provides an excellent starting point for your CISA certification preparation. The book strengthens your grip on the core concepts through a three-step approach. First, it presents the fundamentals with easy-to-understand theoretical explanations. Next, it provides a list of key aspects that are crucial from the CISA exam perspective, ensuring you focus on important pointers for the exam. Finally, the book makes you an expert in specific topics by engaging you with self-assessment questions designed to align with the exam format, challenging you to apply your knowledge and sharpen your understanding.Moreover, the book comes with lifetime access to supplementary resources on an online platform, including CISA flashcards, practice questions, and valuable exam tips. With unlimited access to the website, you’ll have the flexibility to practice as many times as you desire, maximizing your exam readiness.By the end of this book, you’ll have developed the proficiency to successfully obtain the CISA certification and significantly upgrade your auditing career.
Hemang Doshi, Javen Khoo Ai Wee
Following on from the success of its bestselling predecessor, this third edition of the CISA - Certified Information Systems Auditor Study Guide serves as your go-to resource for acing the CISA exam. Written by renowned CISA expert Hemang Doshi, this guide equips you with practical skills and in-depth knowledge to excel in information systems auditing, setting the foundation for a thriving career.Fully updated to align with the 28th edition of the CISA Official Review Manual, this guide covers the latest exam objectives and provides a deep dive into essential IT auditing areas, including IT governance, systems development, and asset protection. The book follows a structured, three-step approach to solidify your understanding. First, it breaks down the fundamentals with clear, concise explanations. Then, it highlights critical exam-focused points to ensure you concentrate on key areas. Finally, it challenges you with self-assessment questions that reflect the exam format, helping you assess your knowledge.Additionally, you’ll gain access to online resources, including mock exams, interactive flashcards, and invaluable exam tips, ensuring you’re fully prepared for the exam with unlimited practice opportunities.By the end of this guide, you’ll be ready to pass the CISA exam with confidence and advance your career in auditing.
Glen D. Singh
Achieving the Cisco Certified CyberOps Associate 200-201 certification helps you to kickstart your career in cybersecurity operations. This book offers up-to-date coverage of 200-201 exam resources to fully equip you to pass on your first attempt.The book covers the essentials of network security concepts and shows you how to perform security threat monitoring. You'll begin by gaining an in-depth understanding of cryptography and exploring the methodology for performing both host and network-based intrusion analysis. Next, you'll learn about the importance of implementing security management and incident response strategies in an enterprise organization. As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. You'll also discover the need for computer forensics and get to grips with the components used to identify network intrusions. Finally, the book will not only help you to learn the theory but also enable you to gain much-needed practical experience for the cybersecurity industry.By the end of this Cisco cybersecurity book, you'll have covered everything you need to pass the Cisco Certified CyberOps Associate 200-201 certification exam, and have a handy, on-the-job desktop reference guide.
M. L. Srinivasan
Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. But passing the final exam is challenging. Every year a lot of candidates do not prepare sufficiently for the examination, and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack confidence.This simple yet informative book will take you through the final weeks before the exam with a day-by-day plan covering all of the exam topics. It will build your confidence and enable you to crack the Gold Standard exam, knowing that you have done all you can to prepare for the big day.This book provides concise explanations of important concepts in all 10 domains of the CISSP Common Body of Knowledge (CBK). Starting with Confidentiality, Integrity, and Availability, you will focus on classifying information and supporting assets. You will understand data handling requirements for sensitive information before gradually moving on to using secure design principles while implementing and managing engineering processes. You will understand the application of cryptography in communication security and prevent or mitigate strategies for network attacks. You will also learn security control requirements and how to assess their effectiveness. Finally, you will explore advanced topics such as automated and manual test result analysis and reporting methods.A complete mock test is included at the end to evaluate whether you're ready for the exam. This book is not a replacement for full study guides; instead, it builds on and reemphasizes concepts learned from them.
Ted Jordan
The CISSP exam is for security professionals who understand that poor security can put a company out of business. The exam covers eight important security domains - risk management, security architecture, data security, network security, identity management, auditing, security operations, and software development security. Designed to cover all the concepts tested in the CISSP exam, CISSP (ISC)2 Certification Practice Exams and Tests will assess your knowledge of information security and introduce you to the tools you need to master to pass the CISSP exam (version May 2021). With more than 100 questions for every CISSP domain, this book will test your understanding and fill the gaps in your knowledge with the help of descriptive answers and detailed explanations. You'll also find two complete practice exams that simulate the real CISSP exam, along with answers. By the end of this book, you'll be ready to take and pass the (ISC)2 CISSP exam and achieve the Certified Information Systems Security Professional certification putting you in the position to build a career as a security engineer, security manager, or chief information security officer (CISO)
Shinesa Cambric, Michael Ratemo
As more and more companies are moving to cloud and multi-cloud environments, being able to assess the compliance of these environments properly is becoming more important. But in this fast-moving domain, getting the most up-to-date information is a challenge—so where do you turn?Cloud Auditing Best Practices has all the information you’ll need. With an explanation of the fundamental concepts and hands-on walk-throughs of the three big cloud players, this book will get you up to speed with cloud auditing before you know it.After a quick introduction to cloud architecture and an understanding of the importance of performing cloud control assessments, you’ll quickly get to grips with navigating AWS, Azure, and GCP cloud environments. As you explore the vital role an IT auditor plays in any company’s network, you'll learn how to successfully build cloud IT auditing programs, including using standard tools such as Terraform, Azure Automation, AWS Policy Sentry, and many more.You’ll also get plenty of tips and tricks for preparing an effective and advanced audit and understanding how to monitor and assess cloud environments using standard tools.By the end of this book, you will be able to confidently apply and assess security controls for AWS, Azure, and GCP, allowing you to independently and effectively confirm compliance in the cloud.