Luister en lees nu 14 dagen gratis

Ontdek Storytel nu 14 dagen gratis. Meer dan 1 miljoen luisterboeken en ebooks in één app.

  • Switch makkelijk tussen luisteren en lezen
  • Elke week honderden nieuwe verhalen
  • Voor ieder een passend abonnement
  • Opzeggen wanneer je maar wilt
Probeer 14 dagen gratis
BE - Details page - Device banner - 894x1036
Cover for Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

Taal
Engels
Formaat
Categorie

Non-fictie

Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity

Key Features

• Covers the latest security threats and defense strategies for 2020 • Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach • Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more

Book Description

Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.

Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system.

This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.

What you will learn

• The importance of having a solid foundation for your security posture • Use cyber security kill chain to understand the attack strategy • Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence • Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy • Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails • Perform an incident investigation using Azure Security Center and Azure Sentinel • Get an in-depth understanding of the disaster recovery process • Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud • Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure

Who this book is for

For the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.

© 2019 Packt Publishing (Ebook): 9781838822217

Verschijnt op:

Ebook: 31 december 2019

Anderen genoten ook van...

  1. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  2. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  3. Biggest Cyber Crimes in the History
    Biggest Cyber Crimes in the History Introbooks Team
  4. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  5. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  6. The DevSecOps Playbook: Deliver Continuous Security at Speed
    The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  7. Cybersecurity for Beginners: How to Defend Against Hackers & Malware
    Cybersecurity for Beginners: How to Defend Against Hackers & Malware ATTILA KOVACS
  8. Cybersecurity For Beginners: How to Manage Risk, Using the NIST Cybersecurity Framework
    Cybersecurity For Beginners: How to Manage Risk, Using the NIST Cybersecurity Framework John Knowles
  9. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  10. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  11. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  12. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  13. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  14. Cyber Security: Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
    Cyber Security: Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware Jonathan Rigdon
  15. Product Management for Beginners: Mastering the Fundamentals of Building Great Products
    Product Management for Beginners: Mastering the Fundamentals of Building Great Products James Ferry
  16. Game Theory Evolving: A Problem-Centered Introduction to Modeling Strategic Interaction - Second Edition
    Game Theory Evolving: A Problem-Centered Introduction to Modeling Strategic Interaction - Second Edition Herbert Gintis
  17. Mastering Active Directory - Third Edition: Design, deploy, and protect Active Directory Domain Services for Windows Server 2022
    Mastering Active Directory - Third Edition: Design, deploy, and protect Active Directory Domain Services for Windows Server 2022 Dishan Francis
  18. Quantum Computing for Beginners: Unveiling the Future of Technology and Transforming Computational Horizons
    Quantum Computing for Beginners: Unveiling the Future of Technology and Transforming Computational Horizons Steve Abrams
  19. The CISO Evolution: Business Knowledge for Cybersecurity Executives
    The CISO Evolution: Business Knowledge for Cybersecurity Executives Kyriakos Lambros
  20. Born Digital: The Story of a Distracted Generation
    Born Digital: The Story of a Distracted Generation Robert Wigley
  21. A Degree in a Book: Electrical And Mechanical Engineering: Everything You Need to Know to Master the Subject - in One Book!
    A Degree in a Book: Electrical And Mechanical Engineering: Everything You Need to Know to Master the Subject - in One Book! David Baker
  22. Summary: The End of the World Is Just the Beginning: Mapping the Collapse of Globalization By Peter Zeihan: Key Takeaways, Summary & Analysis
    Summary: The End of the World Is Just the Beginning: Mapping the Collapse of Globalization By Peter Zeihan: Key Takeaways, Summary & Analysis Brooks Bryant
  23. Duty of Care: An Executive Guide for Corporate Boards in the Digital Era
    Duty of Care: An Executive Guide for Corporate Boards in the Digital Era Alizabeth Calder
  24. Artificial Intelligence: A Comprehensive Guide to AI, Machine Learning, Internet of Things, Robotics, Deep Learning, Predictive Analytics, Neural Networks, Reinforcement Learning, and Our Future
    Artificial Intelligence: A Comprehensive Guide to AI, Machine Learning, Internet of Things, Robotics, Deep Learning, Predictive Analytics, Neural Networks, Reinforcement Learning, and Our Future Neil Wilkins
  25. Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design
    Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design Neel Ingman
  26. Agile Manifesto: Unleashing Innovation, Collaboration, and Adaptive Excellence in Modern Development Practices
    Agile Manifesto: Unleashing Innovation, Collaboration, and Adaptive Excellence in Modern Development Practices Daniel Green
  27. The Network: The Battle for the Airwaves and the Birth of the Communications Age
    The Network: The Battle for the Airwaves and the Birth of the Communications Age Scott Woolley
  28. The World After Capital
    The World After Capital Albert Wenger
  29. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  30. The Wedge of Truth: Splitting the Foundations of Naturalism
    The Wedge of Truth: Splitting the Foundations of Naturalism Phillip E. Johnson
  31. Transhumanistic Solar System
    Transhumanistic Solar System Allen Young
  32. Kanban for Beginners: A Comprehensive Guide to Visual Workflow Management
    Kanban for Beginners: A Comprehensive Guide to Visual Workflow Management Ben Rizer
  33. The Healthcare Mandate: How to Leverage Disruptive Innovation to Heal America's Biggest Industry
    The Healthcare Mandate: How to Leverage Disruptive Innovation to Heal America's Biggest Industry Nicholas Webb
  34. A Constitution of Many Minds: Why the Founding Document Doesn't Mean What It Meant Before
    A Constitution of Many Minds: Why the Founding Document Doesn't Mean What It Meant Before Cass R. Sunstein
  35. Product Management for Beginners Building Great Products
    Product Management for Beginners Building Great Products Steve Abrams
  36. How Global Currencies Work: Past, Present, and Future
    How Global Currencies Work: Past, Present, and Future Barry Eichengreen
  37. The Postmodern Pilgrim's Progress: An Allegorical Tale
    The Postmodern Pilgrim's Progress: An Allegorical Tale Joel Berry
  38. Culture Through Crisis: One Team's Commitment to Winning With Purpose
    Culture Through Crisis: One Team's Commitment to Winning With Purpose Andrew Limouris
  39. Bitcoin: FROM NOVICE TO CRYPTO PRO: NAVIGATING THE BITCOIN  LANDSCAPE WITH CONFIDENCE
    Bitcoin: FROM NOVICE TO CRYPTO PRO: NAVIGATING THE BITCOIN LANDSCAPE WITH CONFIDENCE Felix Ryder
  40. Intelligence: Theories about Psychology, Signs, and Stupidity
    Intelligence: Theories about Psychology, Signs, and Stupidity Jason Hendrickson

Maak je keuze:

  • Voor ieder een passend abonnement

  • Kies het aantal uur en accounts dat bij jou past

  • Download verhalen voor offline toegang

  • Kids Mode - een veilige omgeving voor kinderen

Meest gekozen

Unlimited

Voor wie onbeperkt wil luisteren en lezen.

€13.99 /30 dagen
14 dagen gratis
  • 1 account

  • Onbeperkte toegang

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

Probeer 14 dagen gratis

Premium

Voor wie zo nu en dan wil luisteren en lezen.

€9.99 /30 dagen
  • 1 account

  • 30 uur/maand

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

Probeer 7 dagen gratis

Flex

Voor wie Storytel wil proberen.

€7.99 /30 dagen
  • 1 account

  • 10 uur/30 dagen

  • Spaar ongebruikte uren op tot 50 uur

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

Probeer 7 dagen gratis

Family

Voor wie verhalen met familie en vrienden wil delen.

Vanaf €18.99 /30 dagen
14 dagen gratis
  • 2-3 accounts

  • Onbeperkte toegang

  • Meer dan 1 miljoen luisterboeken en ebooks

  • Altijd opzegbaar

2 accounts

€18.99 /30 dagen
Probeer 14 dagen gratis