Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

Sprog
Engelsk
Format
Kategori

Fakta

Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity

Key Features

• Covers the latest security threats and defense strategies for 2020 • Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach • Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more

Book Description

Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.

Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system.

This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.

What you will learn

• The importance of having a solid foundation for your security posture • Use cyber security kill chain to understand the attack strategy • Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence • Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy • Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails • Perform an incident investigation using Azure Security Center and Azure Sentinel • Get an in-depth understanding of the disaster recovery process • Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud • Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure

Who this book is for

For the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.

© 2019 Packt Publishing (E-bog): 9781838822217

Release date

E-bog: 31. december 2019

Tags

    Andre kan også lide...

    1. Cybersecurity For Dummies Joseph Steinberg
    2. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    3. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    4. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    5. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    6. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    7. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    8. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    9. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    10. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    11. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
    12. Cyber Security for Decision Makers Jarno Limnéll
    13. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    14. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    15. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    16. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    17. Biggest Cyber Crimes in the History Introbooks Team
    18. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    19. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    20. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
    21. Cybersecurity For Beginners: How to Manage Risk, Using the NIST Cybersecurity Framework John Knowles
    22. Cybercrime Investigators Handbook Graeme Edwards
    23. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    24. Cloud Security For Dummies Ted Coombs
    25. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    26. Cyberdeterrence and Cyberwar Martin C. Libicki
    27. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
    28. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
    29. Ethical Hacking Introbooks Team
    30. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
    31. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
    32. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    33. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    34. CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
    35. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
    36. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    37. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    38. Cybersecurity for Beginners: 3 Books In 1: What You Must Know About Cybersecurity, How to Get A Job In Cybersecurity, How to Defend Against Hackers & Malware ATTILA KOVACS
    39. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    40. Tor and the Dark Art of Anonymity Lance Henderson
    41. Cybersecutity First Principles Rick Howard
    42. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    43. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    44. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
    45. How to Implement Artificial Intelligence and Cybersecurity in Modern Businesses: BASICS AND GUIDES FOR DUMMIES AND BEGINNERS Perry S
    46. Cybersecurity for Beginners: How to Defend Against Hackers & Malware ATTILA KOVACS

    Vælg dit abonnement

    • Over 600.000 titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned
    • 1 konto

    • 20 timer/måned

    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis
    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned
    • 1 konto

    • 100 timer/måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Unlimited

    For dig som lytter og læser ubegrænset.

    149 kr. /måned
    • 1 konto

    • Ubegrænset adgang

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned
    • 2-6 konti

    • 100 timer/måned pr. konto

    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    2 konti

    179 kr. /måned
    Prøv gratis