HHWForum.hu
Filmek
TV Sorozatok Feliratos filmek Szinkronos filmek HD és Blu-ray Karácsony Online nézhető filmek Film kollekciók Mobilos filmek Rajzfilmek Dokumentum filmek Horror filmek Magyar filmek DVD ISO HUN DVD ISO ENG DVD-Rip ENG 3D filmek Zenés filmek
Zenék
Zenei Kérések Videóklippek, koncertfelvételek OST Single
Játékok
Játék Kérések
XXX
XXX Játékok XXX Magyar XXX Sorozatok, Gyűjtemények XXX Képek XXX Magazinok, képregények XXX Videók és Rövid filmek
Mobil
Mobilos filmek Mobilos programok Androidos játékok Mobil Háttérképek Csengőhangok
Programok
Windows Op. ISO ENG Windwos Op. ISO HUN Microsoft Office MacOS Program Kérések
Háttérképek
Templates Háttérképek Témák
E-könyvek
E-könyv Kérések Külföldi könyvek Hangoskönyvek Külföldi magazinok Gyerek hangoskönyvek Gyerekdalok
Mai Friss

Keresés
A fő kategória kiválasztásával az alfórumokban is keres.
Saját feltöltéseim
User
Belépés   Regisztráció
Belépés
Felhasználónév
Jelszó: Elfelejtett jelszó?
 
HHWForum.hu Letöltések E-könyvek Külföldi könyvek Modern-Cybersecurity-Practices

  • 0 szavazat - átlag 0
  • 1
  • 2
  • 3
  • 4
  • 5
Rétegzési módok
Modern-Cybersecurity-Practices
Nem elérhető 0dayddl
Power User
**
Üzenetek: 16,257
Témák: 16,257
Thanks Received: 0 in 0 posts
Thanks Given: 0
Csatlakozott: Jan 2023
Értékelés: 0
#1
2023-06-24, 16:33
[Kép: 1b6bb475cad8cb4c2e12c9964e214171.jpg]
epub | 45.81 MB | English | Isbn:‎ B087X8BP4V | Author: Pascal Ackerman | Year: 2020

Description:

Idézet:A practical book that will help you defend against malicious activities

Key Features
  • Learn how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out
  • Learn how to choose, design and implement a cybersecurity program that best fits your needs
  • Learn how to improve a cybersecurity program and accompanying cybersecurity posture by checks, balances and cyclic improvement activities
  • Learn to verify, monitor and validate the cybersecurity program by active and passive cybersecurity monitoring activities
  • Learn to detect malicious activities in your environment by implementing Threat Hunting exercises

Description
Modern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on Company-X's environment, shows how an attacker could use information and tools to infiltrate the companies network, exfiltrate sensitive data and then leave the company in disarray by leaving behind a little surprise for any users to find the next time they open their computer.

After we see how an attacker pulls off their malicious goals, the next part of the book will have your pick, design, and implement a security program that best reflects your specific situation and requirements. Along the way, we will look at a variety of methodologies, concepts, and tools that are typically used during the activities that are involved with the design, implementation, and improvement of one's cybersecurity posture.

After having implemented a fitting cybersecurity program and kickstarted the improvement of our cybersecurity posture improvement activities we then go and look at all activities, requirements, tools, and methodologies behind keeping an eye on the state of our cybersecurity posture with active and passive cybersecurity monitoring tools and activities as well as the use of threat hunting exercises to find malicious activity in our environment that typically stays under the radar of standard detection methods like firewall, IDS' and endpoint protection solutions.

What will you learn
  • Explore the different methodologies, techniques, tools, and activities an attacker uses to breach a modern company's cybersecurity defenses
  • Learn how to design a cybersecurity program that best fits your unique environment
  • Monitor and improve one's cybersecurity posture by using active and passive security monitoring tools and activities.
  • Build a Security Incident and Event Monitoring (SIEM) environment to monitor risk and incident development and handling.
  • Use the SIEM and other resources to perform threat hunting exercises to find hidden mayhem

Who this book is for
This book is a must read to everyone involved with establishing, maintaining, and improving their Cybersecurity program and accompanying cybersecurity posture.

Table of Contents
1. What's at stake
2. Define scope
3.Adhere to a security standard
4. Defining the policies
5. Conducting a gap analysis
6. Interpreting the analysis results
7. Prioritizing remediation
8. Getting to a comfortable level
9. Conducting a penetration test.
10. Passive security monitoring.
11. Active security monitoring.
12. Threat hunting.
13. Continuous battle
14. Time to reflect

About the Author
Pascal Ackerman is a seasoned industrial security professional with a degree in electrical engineering and with 18 years of experience in industrial network design and support, information and network security, risk assessments, pentesting, threat hunting, and forensics.

Category:Windows Administration, Viruses & Malware, Windows Administration


[Kép: rapidgator.png]
Idézet:Modern-Cybersecurity-Practices.rar
[Kép: 361444878_fikper.png]
Idézet:Modern-Cybersecurity-Practices.rar

  •
A szerző üzeneteinek keresése
Válaszol


Hasonló témák...
Téma: Szerző Válaszok: Megtekintések: Utolsó üzenet
  Foundations Of Cybersecurity Second Edition (Jason Andress) Farid-Khan 0 44 2026-03-23, 14:17
Utolsó üzenet: Farid-Khan
  MODERN HARMONY EXERCISES II Scales Modes Melodic Analysis And Reharmonization Harmony In Modern Music (Schneider, Ricky) Farid-Khan 0 26 2026-03-23, 09:24
Utolsó üzenet: Farid-Khan
  Cyber Defense Matrix The Essential Guide To Navigating The Cybersecurity Landscape (Yu, Sounil) Farid-Khan 0 29 2026-03-23, 09:20
Utolsó üzenet: Farid-Khan
  MODERN HARMONY EXERCISES I Basic Concepts Major And Minor Key Harmony In Modern Music (Schneider, Ricky) Farid-Khan 0 25 2026-03-22, 21:05
Utolsó üzenet: Farid-Khan
  Foundations Of Cybersecurity 2nd Edition A Straightforward Introduction 2nd Edition (Jason Andress) Farid-Khan 0 27 2026-03-19, 16:10
Utolsó üzenet: Farid-Khan
  The Swedish Cookbook Lagom Flavors For The Modern Kitchen (Niklas Ekstedt;) Farid-Khan 0 23 2026-03-19, 15:36
Utolsó üzenet: Farid-Khan
  The Cunning Farmer Agrarian Magical Practices Mythology And Folklore (Todd Elliott;) Farid-Khan 0 24 2026-03-19, 14:11
Utolsó üzenet: Farid-Khan
  Clean Code With TypeScript Elevate Your TypeScript 6 Skills With Clean Code Principles And Production Ready Practices (R Farid-Khan 0 25 2026-03-18, 23:38
Utolsó üzenet: Farid-Khan
  Moss Medicine Indigenous Wisdom And Modern Pharmacology (Robert Dale Rogers;) Farid-Khan 0 23 2026-03-18, 22:17
Utolsó üzenet: Farid-Khan
  The Segmentation Blueprint Strategies For Building Modern Secure Networks (Raghunath Kulkarni, Kaarthik Sivakumar, Renat Farid-Khan 0 23 2026-03-18, 22:09
Utolsó üzenet: Farid-Khan

Digg   Delicious   Reddit   Facebook   Twitter   StumbleUpon  


Jelenlevő felhasználók ebben a témában:
1 Vendég

  •  
  • Vissza a lap tetejére  
  • Lite mode  
  •  Kapcsolat
Theme © 2014 iAndrew
MyBB, © 2002-2026 MyBB Group.
Lineáris
Rétegezett
Megtekintés nyomtatható verzióban
Feliratkozás a témára
Szavazás hozzáadása ehhez a témához
Send thread to a friend