Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Sprog
Engelsk
Format
Kategori

Fakta

The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system.

In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.

© 2018 Packt Publishing (E-bog): 9781788473859

Release date

E-bog: 30. januar 2018

Tags

    Andre kan også lide...

    1. Cloud Security Handbook: Find out how to effectively secure cloud environments using AWS, Azure, and GCP Eyal Estrin
    2. Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software Uriel Kosayev
    3. Attacking and Exploiting Modern Web Applications: Discover the mindset, techniques, and tools to perform modern web attacks and exploitation Simone Onofri
    4. Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure Sagar Rahalkar
    5. Microsoft Azure Security Technologies Certification and Beyond: Gain practical skills to secure your Azure environment and pass the AZ-500 exam David Okeyode
    6. Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments David Okeyode
    7. Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting Roberto Martinez
    8. Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats David Álvarez Pérez
    9. Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Benjamin Kovacevic
    10. Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities Jason Deyalsingh
    11. Learn Red - Fundamentals of Red : Get up and running with the Red language for full-stack development: Get up and running with the Red language for full-stack development Ivo Balbaert
    12. The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities Benjamin Strout
    13. TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS Dr. Paul Duplys
    14. Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles Ken Underhill
    15. Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs Mostafa Yahia
    16. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide: Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. Lee Allen
    17. Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches Soledad Antelada Toledano
    18. Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program Jason Brown
    19. Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture Lester Nichols
    20. Unveiling the NIST Risk Management Framework (RMF): A practical guide to implementing RMF and managing risks in your organization Thomas Marsland
    21. Securing Industrial Control Systems and Safety Instrumented Systems: A practical guide for safeguarding mission and safety critical systems Jalal Bouhdada
    22. Learn Ethereum.: A practical guide to help developers set up and run decentralized applications with Ethereum 2.0 Xun (Brian) Wu
    23. Catching the Catfishers: Disarm the Online Pretenders, Predators, and Perpetrators Who Are Out to Ruin Your Life Tyler Cohen Wood
    24. Azure Security Cookbook: Practical recipes for securing Azure resources and operations Steve Miles
    25. The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and our Democratic Process David Burnham
    26. Privacy-Preserving Machine Learning: A use-case-driven approach to building and protecting ML pipelines from privacy and security threats Srinivasa Rao Aravilli
    27. Kali Linux Intrusion and Exploitation Cookbook: Powerful recipes to detect vulnerabilities and perform security assessments Dhruv Shah
    28. Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Dr. Gerald Auger
    29. Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity Mayukh Mukhopadhyay
    30. Human Proxies in Cryptographic Networks: Establishing a new direction to end-to-end encryption with the introduction of the inner envelope in the echo protocol Uni Nurf
    31. Advanced Network Simulations Simplified: Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3 Dr Anil Kumar Rangisetti
    32. Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes Tajinder Kalsi
    33. Building Full Stack DeFi Applications: A practical guide to creating your own decentralized finance projects on blockchain Samuel Zhou
    34. Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide: Become an expert and get Google Cloud certified with this practitioner's guide Prashant Kulkarni
    35. Brain Gain: Technology and the Quest for Digital Wisdom Marc Prensky
    36. George Berkeley: A Philosophical Life Tom Jones
    37. Architecting Cloud-Native Serverless Solutions: Design, build, and operate serverless solutions on cloud and open source platforms Safeer Cm
    38. Madness Is Civilization: When the Diagnosis Was Social, 1948–1980 Michael E. Staub
    39. Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots John Markoff
    40. Violent Accounts: Understanding the Psychology of Perpetrators through South Africa's Truth and Reconciliation Commission Robert N Kraft
    41. Unfreedom: Slavery and Dependence in Eighteenth-Century Boston Jared Ross Hardesty
    42. The History of the Port of London: A Vast Emporium of All Nations Peter Stone
    43. Mining California: An Ecological History Andrew C. Isenberg
    44. The Spike: How Our Lives Are Being Transformed by Rapidly Advancing Technologies Damien Broderick
    45. The History of the Future: Oculus, Facebook, and the Revolution That Swept Virtual Reality Blake J. Harris
    46. Ingenium: Five Machines That Changed the World Mark Denny
    47. The Future of Us: The Science of What We'll Eat, Where We'll Live, and Who We'll Be Jay Ingram
    48. The Shamama Case: Contesting Citizenship across the Modern Mediterranean Jessica M. Marglin

    Vælg dit abonnement

    • Over 600.000 titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned
    • 1 konto

    • 20 timer/måned

    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis
    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned
    • 1 konto

    • 100 timer/måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Unlimited

    For dig som lytter og læser ubegrænset.

    149 kr. /måned
    • 1 konto

    • Ubegrænset adgang

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned
    • 2-6 konti

    • 100 timer/måned pr. konto

    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    2 konti

    179 kr. /måned
    Start tilbuddet