Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

Sprog
Engelsk
Format
Kategori

Fakta

Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity

Key Features

• Covers the latest security threats and defense strategies for 2020 • Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach • Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more

Book Description

Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.

Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system.

This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.

What you will learn

• The importance of having a solid foundation for your security posture • Use cyber security kill chain to understand the attack strategy • Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence • Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy • Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails • Perform an incident investigation using Azure Security Center and Azure Sentinel • Get an in-depth understanding of the disaster recovery process • Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud • Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure

Who this book is for

For the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.

© 2019 Packt Publishing (E-bog): 9781838822217

Udgivelsesdato

E-bog: 31. december 2019

Tags

    Andre kan også lide...

    1. Hands-On Cybersecurity for Architects: Plan and design robust security architectures
      Hands-On Cybersecurity for Architects: Plan and design robust security architectures Milad Aslaner
    2. Building a Cyber Resilient Business: A cyber handbook for executives and boards
      Building a Cyber Resilient Business: A cyber handbook for executives and boards Shamane Tan
    3. Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
      Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs Kyle Wilhoit
    4. Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
      Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Dr. Erdal Ozkaya
    5. Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
      Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans Shinesa Cambric
    6. The Network: The Battle for the Airwaves and the Birth of the Communications Age
      The Network: The Battle for the Airwaves and the Birth of the Communications Age Scott Woolley
    7. Journey to Become a Google Cloud Machine Learning Engineer: Build the mind and hand of a Google Certified ML professional
      Journey to Become a Google Cloud Machine Learning Engineer: Build the mind and hand of a Google Certified ML professional Dr. Logan Song
    8. Industrial Cybersecurity: Efficiently secure critical infrastructure systems
      Industrial Cybersecurity: Efficiently secure critical infrastructure systems Pascal Ackerman
    9. Age of Invisible Machines: A Guide to Orchestrating AI Agents and Making Organizations More Self-Driving, Revised and Updated Second Edition
      Age of Invisible Machines: A Guide to Orchestrating AI Agents and Making Organizations More Self-Driving, Revised and Updated Second Edition Robb Wilson
    10. Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career
      Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career Ken Underhill
    11. Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
      Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence William Oettinger
    12. Attention All Passengers: The Airlines' Dangerous Descent---and How to Reclaim Our Skies
      Attention All Passengers: The Airlines' Dangerous Descent---and How to Reclaim Our Skies William J. McGee
    13. Countdown to Socialism
      Countdown to Socialism Devin Nunes
    14. Porter's Five Forces: Understand competitive forces and stay ahead of the competition
      Porter's Five Forces: Understand competitive forces and stay ahead of the competition 50minutes

    Vælg dit abonnement

    • Over 1 million titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned

    7 dage gratis
    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis

    Unlimited

    For dig som lytter og læser ubegrænset.

    159 kr. /måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned

    7 dage gratis
    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    Dig + 1 familiemedlem2 konti

    179 kr. /måned

    Prøv gratis

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned

    7 dage gratis
    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis