Cybersecurity โ€“ Attack and Defense Strategies: Improve your security posture to mitigate risks and prevent attackers from infiltrating your system, Edition 3

ยท Packt Publishing Ltd
แžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž…
570
แž‘แŸ†แž–แŸแžš

แžขแŸ†แž–แžธแžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€แž“แŸแŸ‡

Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscapeKey FeaturesUpdated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and moreExplore the latest tools for ethical hacking, pentesting, and Red/Blue teamingIncludes recent real-world examples to illustrate the best practices to improve security postureBook Description

Cybersecurity โ€“ Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture.

In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques.

By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.

What you will learnLearn to mitigate, recover from, and prevent future cybersecurity eventsUnderstand security hygiene and value of prioritizing protection of your workloadsExplore physical and virtual network segmentation, cloud network visibility, and Zero Trust considerationsAdopt new methods to gather cyber intelligence, identify risk, and demonstrate impact with Red/Blue Team strategiesExplore legendary tools such as Nmap and Metasploit to supercharge your Red TeamDiscover identity security and how to perform policy enforcementIntegrate threat detection systems into your SIEM solutionsDiscover the MITRE ATT&CK Framework and open-source tools to gather intelligenceWho this book is for

If you are an IT security professional who wants to venture deeper into cybersecurity domains, this book is for you. Cloud security administrators, IT pentesters, security consultants, and ethical hackers will also find this book useful. Basic understanding of operating systems, computer networking, and web applications will be helpful.

แžŸแŸ’แžœแŸ‚แž„แžšแž€โ€‹แž…แŸ’แžšแžพแž“แž‘แŸ€แž

แžขแŸ†แž–แžธโ€‹แžขแŸ’แž“แž€แž“แžทแž–แž“แŸ’แž’

Yuri Diogenes is a professor at EC-Council University for their BSc in Cybersecurity and a Principal PM Manager at Microsoft for Microsoft Defender for Cloud. Yuri has an MSc in Cybersecurity from UTICA College, PhD student in the Cybersecurity Leadership program at Capitol Technology University, and an MBA from FGV Brazil. He currently holds the following certifications: CISSP, CyberSec First Responder, MITRE ATT&CK Cyber Threat Intelligence, CompTIA CySa+, E-CEH, E-CSA, E-CHFI, E-CND, CompTIA, Security+, Network+ and CASP. He has published over 27 books, mostly on information security.

Dr. Erdal Ozkaya is named among the Top 50 Technology Leaders by CIO Online & IDC. He is a Chief Cybersecurity Strategist and CISO at Xcitium (Comodo Cybersecurity), and a professor at Charles Sturt University. His expertise spans end-to-end IT solutions, management, communications, and innovation. He's a well-known public speaker, an award-winning technical expert, author, and creator of certifications (courseware and exams) for prestigious organizations such as Microsoft, EC Council, CertNexus, and other expert-level vendors with an esteemed list of credits to his name. He is working with an ardent passion for raising cyber awareness and leveraging new, innovative approaches.

แžœแžถแž™แžแž˜แŸ’แž›แŸƒแžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€แž“แŸแŸ‡

แž”แŸ’แžšแžถแž”แŸ‹แž™แžพแž„แžขแŸ†แž–แžธแž€แžถแžšแž™แž›แŸ‹แžƒแžพแž‰แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แŸ”

แžขแžถแž“โ€‹แž–แŸแžแŸŒแž˜แžถแž“

แž‘แžผแžšแžŸแž–แŸ’แž‘แž†แŸ’แž›แžถแžแžœแŸƒ แž“แžทแž„โ€‹แžแŸแž”แŸ’แž›แŸแž
แžŠแŸ†แžกแžพแž„แž€แž˜แŸ’แž˜แžœแžทแž’แžธ Google Play Books แžŸแž˜แŸ’แžšแžถแž”แŸ‹ Android แž“แžทแž„ iPad/iPhone แŸ” แžœแžถโ€‹แž’แŸ’แžœแžพแžŸแž˜แž€แžถแž›แž€แž˜แŸ’แž˜โ€‹แžŠแŸ„แž™แžŸแŸ’แžœแŸแž™แž”แŸ’แžšแžœแžแŸ’แžแžทแž‡แžถแž˜แžฝแž™โ€‹แž‚แžŽแž“แžธโ€‹แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€โ€‹ แž“แžทแž„โ€‹แžขแž“แžปแž‰แŸ’แž‰แžถแžแžฑแŸ’แž™โ€‹แžขแŸ’แž“แž€แžขแžถแž“แž–แŸแž›โ€‹แž˜แžถแž“แžขแŸŠแžธแž“แž’แžบแžŽแžทแž แžฌแž‚แŸ’แž˜แžถแž“โ€‹แžขแŸŠแžธแž“แž’แžบแžŽแžทแžโ€‹แž“แŸ…แž‚แŸ’แžšแž”แŸ‹แž‘แžธแž€แž“แŸ’แž›แŸ‚แž„แŸ”
แž€แžปแŸ†แž–แŸ’แž™แžผแž‘แŸแžšโ€‹แž™แžฝแžšแžŠแŸƒ แž“แžทแž„แž€แžปแŸ†แž–แŸ’แž™แžผแž‘แŸแžš
แžขแŸ’แž“แž€แžขแžถแž…แžŸแŸ’แžŠแžถแž”แŸ‹แžŸแŸ€แžœแž—แŸ…แž‡แžถแžŸแŸ†แžกแŸแž„แžŠแŸ‚แž›แž”แžถแž“แž‘แžทแž‰แž“แŸ…แž€แŸ’แž“แžปแž„ Google Play แžŠแŸ„แž™แž”แŸ’แžšแžพแž€แž˜แŸ’แž˜แžœแžทแž’แžธแžšแžปแž€แžšแž€แžแžถแž˜แžขแŸŠแžธแž“แž’แžบแžŽแžทแžแž€แŸ’แž“แžปแž„แž€แžปแŸ†แž–แŸ’แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แŸ”
eReaders แž“แžทแž„โ€‹แžงแž”แž€แžšแžŽแŸโ€‹แž•แŸ’แžŸแŸแž„โ€‹แž‘แŸ€แž
แžŠแžพแž˜แŸ’แž”แžธแžขแžถแž“แž“แŸ…แž›แžพโ€‹แžงแž”แž€แžšแžŽแŸ e-ink แžŠแžผแž…แž‡แžถโ€‹แžงแž”แž€แžšแžŽแŸแžขแžถแž“โ€‹แžŸแŸ€แžœแž—แŸ…แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€ Kobo แžขแŸ’แž“แž€แž“แžนแž„แžแŸ’แžšแžผแžœโ€‹แž‘แžถแž‰แž™แž€โ€‹แžฏแž€แžŸแžถแžš แž แžพแž™โ€‹แž•แŸ’แž‘แŸแžšแžœแžถแž‘แŸ…โ€‹แžงแž”แž€แžšแžŽแŸโ€‹แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แŸ” แžŸแžผแž˜แžขแž“แžปแžœแžแŸ’แžแžแžถแž˜โ€‹แž€แžถแžšแžŽแŸ‚แž“แžถแŸ†แž›แž˜แŸ’แžขแžทแžแžšแž”แžŸแŸ‹แž˜แž‡แŸ’แžˆแž˜แžŽแŸ’แžŒแž›แž‡แŸ†แž“แžฝแž™ แžŠแžพแž˜แŸ’แž”แžธแž•แŸ’แž‘แŸแžšแžฏแž€แžŸแžถแžšโ€‹แž‘แŸ…แžงแž”แž€แžšแžŽแŸแžขแžถแž“แžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€แžŠแŸ‚แž›แžŸแŸ’แž‚แžถแž›แŸ‹แŸ”

แž…แŸ’แžšแžพแž“แž‘แŸ€แžแžŠแŸ„แž™ Yuri Diogenes

แžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€โ€‹แžŸแŸ’แžšแžŠแŸ€แž„แž‚แŸ’แž“แžถ