• Complain

Cesar Bravo - Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Here you can read online Cesar Bravo - Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Packt Publishing, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Cesar Bravo Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
  • Book:
    Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2022
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

An immersive learning experience enhanced with technical, hands-on labs to understand the concepts, methods, tools, platforms, and systems required to master the art of cybersecurity

Key Features
  • Get hold of the best defensive security strategies and tools
  • Develop a defensive security strategy at an enterprise level
  • Get hands-on with advanced cybersecurity threat detection, including XSS, SQL injections, brute forcing web applications, and more
Book Description

Every organization has its own data and digital assets that need to be protected against an ever-growing threat landscape that compromises the availability, integrity, and confidentiality of crucial data. Therefore, it is important to train professionals in the latest defensive security skills and tools to secure them. Mastering Defensive Security provides you with in-depth knowledge of the latest cybersecurity threats along with the best tools and techniques needed to keep your infrastructure secure.

The book begins by establishing a strong foundation of cybersecurity concepts and advances to explore the latest security technologies such as Wireshark, Damn Vulnerable Web App (DVWA), Burp Suite, OpenVAS, and Nmap, hardware threats such as a weaponized Raspberry Pi, and hardening techniques for Unix, Windows, web applications, and cloud infrastructures. As you make progress through the chapters, youll get to grips with several advanced techniques such as malware analysis, security automation, computer forensics, and vulnerability assessment, which will help you to leverage pentesting for security.

By the end of this book, youll have become familiar with creating your own defensive security tools using IoT devices and developed advanced defensive security skills.

What you will learn
  • Become well versed with concepts related to defensive security
  • Discover strategies and tools to secure the most vulnerable factor the user
  • Get hands-on experience using and configuring the best security tools
  • Understand how to apply hardening techniques in Windows and Unix environments
  • Leverage malware analysis and forensics to enhance your security strategy
  • Secure Internet of Things (IoT) implementations
  • Enhance the security of web applications and cloud deployments
Who this book is for

This book is for IT professionals, including systems administrators, programmers, IT architects, solution engineers, system analysts, data scientists, DBAs, and any IT expert looking to explore the fascinating world of cybersecurity.

Cybersecurity professionals who want to broaden their knowledge of security topics to effectively create and design a defensive security strategy for a large organization will find this book useful. A basic understanding of concepts such as networking, IT, servers, virtualization, and cloud is required.

Table of Contents
  1. A Refresher to Defensive Security Concepts
  2. Managing Threats, Vulnerabilities, and Risks
  3. Comprehending Policies, Procedures, Compliance, and Audits
  4. Patching Layer 8
  5. Cybersecurity Technologies and Tools
  6. Securing Windows Infrastructures
  7. Hardening a Unix Server
  8. Enhancing Your Network Defensive Skills
  9. Deep Diving into Physical Security
  10. Applying IoT Security
  11. Secure Development and Deployment on the Cloud
  12. Mastering Web App Security
  13. Vulnerability Assessment Tools
  14. Malware Analysis
  15. Leveraging Pentesting for Defensive Security
  16. Practicing Forensics
  17. Achieving Automation of Security Tools
  18. The Masters Compilation of Useful Resources

Cesar Bravo: author's other books


Who wrote Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure? Find out the surname, the name of the author of the book and a list of all author's works by series.

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Mastering Defensive Security Effective techniques to secure your Windows - photo 1
Mastering Defensive Security

Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Cesar Bravo

BIRMINGHAMMUMBAI Mastering Defensive Security Copyright 2021 Packt Publishing - photo 2

BIRMINGHAMMUMBAI

Mastering Defensive Security

Copyright 2021 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Group Product Manager: Vijin Boricha

Publishing Product Manager: Shrilekha Malpani

Senior Editor: Arun Nadar

Content Development Editor: Yasir Ali Khan

Technical Editor: Nithik Cheruvakodan

Project Coordinator: Shagun Saini

Proofreader: Safis Editing

Indexer: Manju Arasan

Production Designer: Jyoti Chauhan

First published: October 2021

Production reference: 1211021

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham

B3 2PB, UK.

ISBN 978-1-80020-816-2

www.packt.com

To all the brave people that decided to pursue a career in cybersecurity, and their countless efforts and sacrifices to keep the world safe!

Foreword

Throughout my careerwhich reads like a coming-of-age tale from cyberpunk hacker to cybersecurity CEOI have grown to see this industry evolve and mature in a similar fashion. For many of us with humble hacking origins common in that early era, the institutional knowledge of attack and defense comes as second nature.

As new threats continuously emerge, the need for a robust security culture is underscored by the billions lost to breaches. The importance of this collective wisdom distilled in an actionable manner for the next generation of cyber defenders is all too apparent.

This book's author, Cesar Bravo, takes you beyond the theory. His practical approach bridges the gap between concept and application.

Bravo leverages his profound experience as a cybersecurity expert to lay out a comprehensive understanding of risk, compliance, and the foundational concepts so crucial to the application of defensive techniques.

Moreover, the critical intersection of man and machinewhere breakdowns in physical security most often occuris uniquely covered alongside the frameworks and strategies necessary to become a vigilant defender.

If you are a cyber professional looking to master defensive security, this book is for you!

Darren Kitchen

Founder, Hak5

Contributors
About the author

Cesar Bravo is a researcher and inventor who has more than 100 inventions related to cybersecurity that are being patented in the US, Germany, China, and Japan. Those inventions include cybersecurity hardware, secure IoT systems and devices, and even cybersecurity systems for autonomous cars.

He loves to share knowledge and he has been working with several universities to teach cybersecurity at all levels, from introductory courses for non-IT people up to a master's degree in cybersecurity (for which he has also served as a thesis director).

In recent years, Cesar has become a recognized speaker (including delivering a TEDx talk), giving international presentations about cybersecurity and innovation in the UK, Germany, Mexico, the US, and Spain.

First, I want to thank all my students, who always encourage me with their questions and comments to become a better professional.

To my peer masters in cybersecurity, who took the challenge to learn about new topics and explore a new universe of possibilities, I am super grateful and proud of all of you.

To the cybersecurity community, who invest countless hours to stay up to date with new threats to make the world a better and more secure place to live, for you that live and work in the shadow of your desk, let me say that YOU are the real heroes!

And to my family and friends, who have always supported and encouraged me to become the best version of myself, to all of you, THANK YOU!

About the reviewers

Smith Gonsalves is the director and principal consultant of CyberSmithSECURE, a boutique consulting firm that specializes in providing cybersecurity services to MNCs worldwide. He has been known and recognized in the industry as one of India's youngest cyber evangelists and information security professionals of the time. His key area of work is in the instrumentation of orchestrating cyber capabilities for safeguarding high-end enterprises and institutions. Smith is a Cert-In Certified Auditor and has completed industry-nominated certifications including CISA, OSCP, CEH, CHFI, and TOGAF during his 7+ years of experience.

Yasser Ali is a cybersecurity consultant and red teamer at Dubai Electricity & Water Authority (DEWA).

Yasser has an extensive background in consultancy and advisory services. His experience in vulnerability research, pentesting, and reviewing standards and best practices has made Yasser a highly sought-after expert for enterprises.

Yasser's passion is mostly spent on the development of red teaming labs and offensive training where cybersecurity professionals sharpen their skills and learn new tradecraft-emulating techniques, tactics, and procedures (TTPs) used by adversaries.

Yasser was showcased in the BBC documentary movie How Hackers Steal Your ID. He is a specialized trainer and is regularly invited to participate in global information security conferences and discussion panels.

I wish to thank Shagun, Ali Mehdi, and the Packt team for their time and for allowing me the opportunity to review this book.

Big thanks to all security researchers and InfoSec communities such as HackerOne, Hackers Academy, and Malcrove. Without their contribution, innovation, and willingness to break the rules but not the law and to help one another, cybersecurity wouldn't be what it is today.

Lastly, a special heartfelt thanks to my caring and loving parents and siblings for always supporting me.

Table of Contents
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure»

Look at similar books to Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure»

Discussion, reviews of the book Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.