Wydawca: 8

8137
Ładowanie...
EBOOK

Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition

Yuri Diogenes, Dr. Erdal Ozkaya

Cybersecurity – Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture.In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques.By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.

8138
Ładowanie...
EBOOK

Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics

Yuri Diogenes, Dr. Erdal Ozkaya

The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system.In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.

8139
Ładowanie...
EBOOK

Cybersecurity. A Self-Teaching Introduction

Mercury Learning and Information, C. P. Gupta,...

This book provides fundamental concepts of cybersecurity and cybercrime in an easy-to-understand, self-teaching format. It covers data security, threats, viruses, malicious software, firewalls, VPNs, security architecture, design, policies, cyberlaw, and cloud security.The course starts with an introduction to information systems and cybersecurity application security. It progresses to developing secure information systems and understanding information security policies, standards, and cyberlaw. The final chapters address the security of emerging technologies, including cloud security, IoT, and AES.Understanding these concepts is crucial for protecting data and systems against cyber threats. This book transitions readers from basic knowledge to advanced cybersecurity practices, combining theoretical insights with practical applications. It is an invaluable resource for mastering cybersecurity in today's digital age.

8140
Ładowanie...
EBOOK

Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay

Walter Rocchi

Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand international security standards, such as the ISO27k family of standards.If you’re looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered. It'll not only equip you with the rudiments of cybersecurity but also guide you through privacy laws and explain how you can ensure compliance to protect yourself from cybercrime and avoid the hefty fines imposed for non-compliance with standards.Assuming that you're new to the field, this book starts by introducing cybersecurity frameworks and concepts used throughout the chapters. You'll understand why privacy is paramount and how to find the security gaps in your company's systems. There's a practical element to the book as well—you'll prepare policies and procedures to prevent your company from being breached. You’ll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US.By the end of this cybersecurity book, you'll be well-placed to protect your company's data and comply with the relevant standards.

8141
Ładowanie...
AUDIOBOOK

Cybersecurity and Privacy Law Handbook Audiobook. A beginner's guide to dealing with privacy and security while keeping hackers at bay

Walter Rocchi

Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand international security standards, such as the ISO27k family of standards.If you’re looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered. It'll not only equip you with the rudiments of cybersecurity but also guide you through privacy laws and explain how you can ensure compliance to protect yourself from cybercrime and avoid the hefty fines imposed for non-compliance with standards.Assuming that you're new to the field, this book starts by introducing cybersecurity frameworks and concepts used throughout the chapters. You'll understand why privacy is paramount and how to find the security gaps in your company's systems. There's a practical element to the book as well—you'll prepare policies and procedures to prevent your company from being breached. You’ll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US.By the end of this cybersecurity book, you'll be well-placed to protect your company's data and comply with the relevant standards.

8142
Ładowanie...
EBOOK

Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture

Lester Nichols

Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat; it requires both upskilling and a fundamental shift in how you view cybersecurity. Written by a seasoned cybersecurity expert with over two decades of experience spanning the public and private sectors, this all-encompassing guide outlines an accessible a path for cybersecurity engineers and newcomers to evolve into architects, sharing best practices to enhance your skills.After a brief introduction to the role and foundational concepts, this book will help you understand the day-to-day challenges faced by CSAs, supported by practical examples. You'll gain insights into assessing and improving your organization’s security posture, including system, hardware, and software security. You'll also learn how to set user and system policies and protocols through effective monitoring and enforcement, and understanding countermeasures that protect the system from unauthorized access attempts.To prepare you for the road ahead and augment your existing skills, the book provides invaluable tips and practices that will contribute to your success as a CSA. By the end of this book, you’ll be well-equipped to take up the CSA role and execute robust security solutions.

8143
Ładowanie...
EBOOK

Cybersecurity Attacks- Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage

Johann Rehberger

It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.

8144
Ładowanie...
EBOOK

Cybersecurity Beginner's Guide. Understand the inner workings of cybersecurity and learn how experts keep us safe

Joshua Mason

In today’s increasingly connected world, cybersecurity touches every aspect of our lives, yet it remains a mystery to most. This beginner’s guide pulls back the curtain on how cybersecurity really works, revealing what professionals do to keep us safe. Learn how cyber threats emerge, how experts counter them, and what you can do to protect yourself online.Perfect for business leaders, tech enthusiasts, and anyone curious about digital security, this book delivers insider knowledge without the jargon. This edition also explores cybersecurity careers, AI/ML in cybersecurity, and essential skills that apply in both personal and professional contexts.Air Force pilot turned cybersecurity leader Joshua Mason shares hard-won insights from his unique journey, drawing on years of training teams and advising organizations worldwide. He walks you through the tools and strategies used by professionals, showing how expert practices translate into real-world protection. With up-to-date information of the latest threats and defenses, this cybersecurity book is both an informative read and a practical guide to staying secure in the digital age.*Email sign-up and proof of purchase required.