-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cybersecurity – Attack and Defense Strategies, 3rd edition
By :

Cybersecurity – Attack and Defense Strategies, 3rd edition
By:
Overview of this book
Cybersecurity – Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture.
In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques.
By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.
Table of Contents (20 chapters)
Preface
In Progress
| 0 / 5 sections completed |
0%
Security Posture
In Progress
| 0 / 8 sections completed |
0%
Incident Response Process
In Progress
| 0 / 7 sections completed |
0%
What is a Cyber Strategy?
In Progress
| 0 / 9 sections completed |
0%
Understanding the Cybersecurity Kill Chain
In Progress
| 0 / 11 sections completed |
0%
Reconnaissance
In Progress
| 0 / 9 sections completed |
0%
Compromising the System
In Progress
| 0 / 7 sections completed |
0%
Chasing a User’s Identity
In Progress
| 0 / 5 sections completed |
0%
Lateral Movement
In Progress
| 0 / 7 sections completed |
0%
Privilege Escalation
In Progress
| 0 / 4 sections completed |
0%
Security Policy
In Progress
| 0 / 8 sections completed |
0%
Network Security
In Progress
| 0 / 9 sections completed |
0%
Active Sensors
In Progress
| 0 / 8 sections completed |
0%
Threat Intelligence
In Progress
| 0 / 6 sections completed |
0%
Investigating an Incident
In Progress
| 0 / 8 sections completed |
0%
Recovery Process
In Progress
| 0 / 9 sections completed |
0%
Vulnerability Management
In Progress
| 0 / 10 sections completed |
0%
Log Analysis
In Progress
| 0 / 10 sections completed |
0%
Other Books You May Enjoy
In Progress
| 0 / 1 sections completed |
0%
Index
In Progress
| 0 / 1 sections completed |
0%
Customer Reviews