Cybersecurity – Attack and Defense Strategies Cybersecurity – Attack and Defense Strategies

Cybersecurity – Attack and Defense Strategies

Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

    • $39.99
    • $39.99

Publisher Description

Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity

Key Features

Covers the latest security threats and defense strategies for 2020Introduces techniques and skillsets required to conduct threat hunting and deal with a system breachProvides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more
Book Description

Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.

Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system.

This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.

What you will learn

The importance of having a solid foundation for your security postureUse cyber security kill chain to understand the attack strategyBoost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligenceUtilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategyIdentify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emailsPerform an incident investigation using Azure Security Center and Azure SentinelGet an in-depth understanding of the disaster recovery processUnderstand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloudLearn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure
Who this book is for

For the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.

GENRE
Computers & Internet
RELEASED
2019
December 31
LANGUAGE
EN
English
LENGTH
634
Pages
PUBLISHER
Packt Publishing
SELLER
PublishDrive Inc.
SIZE
74.7
MB

More Books Like This

Mastering Defensive Security Mastering Defensive Security
2022
Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization
2020
Making Sense of Cybersecurity Making Sense of Cybersecurity
2022
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (English Edition) Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (English Edition)
2022
Cybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Cybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
2020
Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking, Social Engineering, and Vulnerability Assessment (English Edition) Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking, Social Engineering, and Vulnerability Assessment (English Edition)
2021

More Books by Yuri Diógenes & Dr. Erdal Ozkaya

Microsoft Azure Security Infrastructure Microsoft Azure Security Infrastructure
2016
Enterprise Mobility Suite Managing BYOD and Company-Owned Devices Enterprise Mobility Suite Managing BYOD and Company-Owned Devices
2015
Ready, Set, Achieve! Ready, Set, Achieve!
2015
Microsoft Azure Security Center Microsoft Azure Security Center
2018
Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e
2022
Exam Ref SC-200 Microsoft Security Operations Analyst Exam Ref SC-200 Microsoft Security Operations Analyst
2021