Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Mastering Windows Security and Hardening
  • Table Of Contents Toc
  • Feedback & Rating feedback
Mastering Windows Security and Hardening

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
4.6 (8)
close
close
Mastering Windows Security and Hardening

Mastering Windows Security and Hardening

4.6 (8)
By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
close
close
1
Section 1: Getting Started
6
Section 2: Applying Security and Hardening
13
Section 3: Protecting, Detecting, and Responding for Windows Environments

Other Books You May Enjoy

If you enjoyed this book, you may be interested in these other books by Packt:

Learn Computer Forensics

William Oettinger

ISBN: 978-1-83864-817-6

  • Understand investigative processes, the rules of evidence, and ethical guidelines
  • Recognize and document different types of computer hardware
  • Understand the boot process covering BIOS, UEFI, and the boot sequence
  • Validate forensic hardware and software
  • Discover the locations of common Windows artifacts
  • Document your findings using technically correct terminology

Metasploit 5.0 for Beginners - Second Edition

Sagar Rahalkar

ISBN: 978-1-83898-266-9

  • Set up the environment for Metasploit
  • Understand how to gather sensitive information and exploit vulnerabilities
  • Get up to speed with client-side attacks and web application scanning using Metasploit
  • Leverage the latest features of Metasploit 5.0 to evade anti-virus
  • Delve into cyber attack management...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY