Modern Cybersecurity Practices Pascal Ackerman
- Autor:
- Pascal Ackerman
- Wydawnictwo:
- BPB Publications
- Ocena:
- Stron:
- 410
- Dostępne formaty:
-
ePubMobi
Zostało Ci
na świąteczne zamówienie
opcje wysyłki »
Opis
książki
:
Modern Cybersecurity Practices
A practical book that will help you defend against malicious activities
Key Features Learn how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out
Learn how to choose, design and implement a cybersecurity program that best fits your needs
Learn how to improve a cybersecurity program and accompanying cybersecurity posture by checks, balances and cyclic improvement activities
Learn to verify, monitor and validate the cybersecurity program by active and passive cybersecurity monitoring activities
Learn to detect malicious activities in your environment by implementing Threat Hunting exercises
Description
Modern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on Company-Xs environment, shows how an attacker could use information and tools to infiltrate the companies network, exfiltrate sensitive data and then leave the company in disarray by leaving behind a little surprise for any users to find the next time they open their computer.
After we see how an attacker pulls off their malicious goals, the next part of the book will have your pick, design, and implement a security program that best reflects your specific situation and requirements. Along the way, we will look at a variety of methodologies, concepts, and tools that are typically used during the activities that are involved with the design, implementation, and improvement of ones cybersecurity posture.
After having implemented a fitting cybersecurity program and kickstarted the improvement of our cybersecurity posture improvement activities we then go and look at all activities, requirements, tools, and methodologies behind keeping an eye on the state of our cybersecurity posture with active and passive cybersecurity monitoring tools and activities as well as the use of threat hunting exercises to find malicious activity in our environment that typically stays under the radar of standard detection methods like firewall, IDS and endpoint protection solutions.
What you will learn
Explore the different methodologies, techniques, tools, and activities an attacker uses to breach a modern companys cybersecurity defenses
Learn how to design a cybersecurity program that best fits your unique environment
Monitor and improve ones cybersecurity posture by using active and passive security monitoring tools and activities.
Who this book is for
This book is a must read to everyone involved with establishing, maintaining, and improving their Cybersecurity program and accompanying cybersecurity posture.
Table of Contents
1. Whats at stake
2. Define scope
3.Adhere to a security standard
4. Defining the policies
5. Conducting a gap analysis
6. Interpreting the analysis results
7. Prioritizing remediation
8. Getting to a comfortable level
9. Conducting a penetration test
10. Passive security monitoring
11. Active security monitoring
12. Threat hunting
13. Continuous battle
14. Time to reflect
About the Authors
Pascal Ackerman is a seasoned industrial security professional with a degree in electrical engineering and with 18 years of experience in industrial network design and support, information and network security, risk assessments, pentesting, threat hunting, and forensics.
Key Features
Description
Modern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on Company-Xs environment, shows how an attacker could use information and tools to infiltrate the companies network, exfiltrate sensitive data and then leave the company in disarray by leaving behind a little surprise for any users to find the next time they open their computer.
After we see how an attacker pulls off their malicious goals, the next part of the book will have your pick, design, and implement a security program that best reflects your specific situation and requirements. Along the way, we will look at a variety of methodologies, concepts, and tools that are typically used during the activities that are involved with the design, implementation, and improvement of ones cybersecurity posture.
After having implemented a fitting cybersecurity program and kickstarted the improvement of our cybersecurity posture improvement activities we then go and look at all activities, requirements, tools, and methodologies behind keeping an eye on the state of our cybersecurity posture with active and passive cybersecurity monitoring tools and activities as well as the use of threat hunting exercises to find malicious activity in our environment that typically stays under the radar of standard detection methods like firewall, IDS and endpoint protection solutions.
What you will learn
Who this book is for
This book is a must read to everyone involved with establishing, maintaining, and improving their Cybersecurity program and accompanying cybersecurity posture.
Table of Contents
1. Whats at stake
2. Define scope
3.Adhere to a security standard
4. Defining the policies
5. Conducting a gap analysis
6. Interpreting the analysis results
7. Prioritizing remediation
8. Getting to a comfortable level
9. Conducting a penetration test
10. Passive security monitoring
11. Active security monitoring
12. Threat hunting
13. Continuous battle
14. Time to reflect
About the Authors
Pascal Ackerman is a seasoned industrial security professional with a degree in electrical engineering and with 18 years of experience in industrial network design and support, information and network security, risk assessments, pentesting, threat hunting, and forensics.
Wybrane bestsellery
BPB Publications - inne książki
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@ebookpoint.pl
Proszę wybrać ocenę!
Proszę wpisać opinię!
Książka drukowana
Oceny i opinie klientów: Modern Cybersecurity Practices Pascal Ackerman (0) Weryfikacja opinii następuje na podstawie historii zamowień na koncie Użytkownika umiejszczającego opinię.