• Complain

Yuri Diogenes - Cybersecurity – Attack and Defense Strategies

Here you can read online Yuri Diogenes - Cybersecurity – Attack and Defense Strategies full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Packt Publishing, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Yuri Diogenes Cybersecurity – Attack and Defense Strategies

Cybersecurity – Attack and Defense Strategies: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cybersecurity – Attack and Defense Strategies" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscape

Key Features
  • Updated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and more
  • Explore the latest tools for ethical hacking, pentesting, and Red/Blue teaming
  • Includes recent real-world examples to illustrate the best practices to improve security posture
Book Description

Cybersecurity Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture.

In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques.

By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.

What you will learn
  • Learn to mitigate, recover from, and prevent future cybersecurity events
  • Understand security hygiene and value of prioritizing protection of your workloads
  • Explore physical and virtual network segmentation, cloud network visibility, and Zero Trust considerations
  • Adopt new methods to gather cyber intelligence, identify risk, and demonstrate impact with Red/Blue Team strategies
  • Explore legendary tools such as Nmap and Metasploit to supercharge your Red Team
  • Discover identity security and how to perform policy enforcement
  • Integrate threat detection systems into your SIEM solutions
  • Discover the MITRE ATT&CK Framework and open-source tools to gather intelligence
Who this book is for

If you are an IT security professional who wants to venture deeper into cybersecurity domains, this book is for you. Cloud security administrators, IT pentesters, security consultants, and ethical hackers will also find this book useful. Basic understanding of operating systems, computer networking, and web applications will be helpful.

Table of Contents
  1. Security Posture
  2. Incident Response Process
  3. What is a Cyber Strategy?
  4. Understanding the Cybersecurity Kill Chain
  5. Reconnaissance
  6. Compromising the System
  7. Chasing a Users Identity
  8. Lateral Movement
  9. Privilege Escalation
  10. Security Policy
  11. Network Security
  12. Active Sensors
  13. Threat Intelligence
  14. Investigating an Incident
  15. Recovery Process
  16. Vulnerability Management
  17. Log Analysis

Cybersecurity – Attack and Defense Strategies — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cybersecurity – Attack and Defense Strategies" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Cybersecurity Attack and Defense Strategies Third Edition Improve your security - photo 1

Cybersecurity Attack and Defense Strategies

Third Edition

Improve your security posture to mitigate risks and prevent attackers from infiltrating your system

Yuri Diogenes

Dr. Erdal Ozkaya

BIRMINGHAMMUMBAI Cybersecurity Attack and Defense Strategies Third Edition - photo 2

BIRMINGHAMMUMBAI

Cybersecurity Attack and Defense Strategies

Third Edition

Copyright 2022 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Senior Publishing Product Manager: Dr. Shailesh Jain

Acquisition Editor Peer Reviews: Gaurav Gavas

Project Editor: Janice Gonsalves

Content Development Editor: Georgia Daisy van der Post

Copy Editor: Safis Editing

Technical Editor: Srishty Bhardwaj

Proofreader: Safis Editing

Indexer: Hemangini Bari

Presentation Designer: Rajesh Shirsath

First published: January 2018

Second edition: December 2019

Third edition: September 2022

Production reference: 1220922

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham

B3 2PB, UK.

ISBN 978-1-80324-877-6

www.packt.com

Contributors
About the authors

Yuri Diogenes has a Master of Science in Cybersecurity Intelligence and Forensics Investigation from UTICA College and is currently working on his PhD in Cybersecurity Leadership from Capitol Technology University. Yuri has been working at Microsoft since 2006 and, currently, he is a Principal PM Manager for the CxE Microsoft Defender for Cloud team. Yuri has published a total of 26 books, mostly around information security and Microsoft technologies. Yuri is also a Professor at EC-Council University where he teaches on the Bachelor in Cybersecurity program. Yuri has an MBA and many IT/security industry certifications, including CISSP, MITRE ATT&CK Cyber Threat Intelligence Certified, E|CND, E|CEH, E|CSA, E|CHFI, CompTIA Security+, CySA+, Network+, CASP, and CyberSec First Responder. You can follow Yuri on Twitter at @yuridiogenes.

Thank you to my wife and daughters for their endless support; my great God for giving me strength and guiding my path each step of the way; to my co-author Erdal for another great partnership; and to the entire Packt Publishing team for another amazing release.

Dr. Erdal Ozkaya is known as a passionate, solutions-focused professional with a comprehensive, global background within the information technology, information security, and cybersecurity fields. He is committed to the delivery of accurate, accessible resources to inform individuals and organizations of cybersecurity and privacy matters in the internet age. Erdal is a well-known public speaker, an award-winning technical expert, the author of more than 20 books, and a writer of certifications. Some of his recent awards are: Global Cybersecurity Leader of the year (InfoSec Awards), Best IT Blogs by Cisco (Top 5), Best CISO for Banking and Financial Sector, Top 50 Technology Leaders by IDC, CIO Online, and Microsoft Most Valuable Professional. You can follow Erdal on Twitter @Erdal_Ozkaya.

Thank you to my family for their endless support, to my co-author Yuri for good friendship and partnership, to all our readers who made this book multi-award winning, and to the entire Packt Publishing team for another amazing release.

About the reviewer

Thomas Marr is an experienced information security professional with a lengthy history of supporting organizations ranging from technology start-ups to Fortune 500 companies to the United States Department of Defense. Thomas is also a proud veteran of the United States Army where he served on active duty as a military intelligence analyst, specializing in signals intelligence and open source intelligence. In addition to his work with Packt Publishing as a technical reviewer, Thomas actively provides technical expertise to information security community projects as an SME on CompTIAs Certification Advisory Committee for Cybersecurity. He continuously evaluates industry-respected certifications including Security+, PenTest+, CySA+, and CASP+.

Thank you to my supportive family and the dream team at Packt Publishing for their teamwork in producing this book.

Join our community on Discord

Join our communitys Discord space for discussions with the author and other readers:

https://packt.link/SecNet

Preface COVID-19 pushed organizations to accelerate their digital - photo 3

Preface

COVID-19 pushed organizations to accelerate their digital transformations, and with that they had to rapidly adopt a more flexible policy to enable remote work. This new environment created a series of cybersecurity challenges for organizations, and new opportunities for threat actors to perform their malicious operations. Throughout this book, you will learn about the importance of security posture management to improve your defense. You will also learn about attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics. In addition, this book will teach you techniques to gather exploitation intelligence and identify risks, and will demonstrate the impact of Red and Blue Team activity.

Who this book is for

This book is for the IT professional venturing into the IT security domain, pen testers, security consultants, or those looking to perform ethical hacking. Prior knowledge of computer networks, cloud computing, and operating systems is beneficial.

What this book covers

Chapter 1, Security Posture, defines what constitutes a good security posture and explores the importance of having a good defense and attack strategy.

Chapter 2, Incident Response Process, introduces the incident response process and the importance of establishing a consistent plan. It covers different industry standards and best practices for handling incident response.

Chapter 3, What is a Cyber Strategy?, explains what a cyber strategy is, why its needed, and how an effective enterprise cyber strategy can be built.

Chapter 4, Understanding the Cybersecurity Kill Chain, prepares the reader to understand the mindset of an attacker, the different stages of an attack, and what usually takes place in each one of these stages.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cybersecurity – Attack and Defense Strategies»

Look at similar books to Cybersecurity – Attack and Defense Strategies. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cybersecurity – Attack and Defense Strategies»

Discussion, reviews of the book Cybersecurity – Attack and Defense Strategies and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.