Cybersecurity – Attack and Defense Strategies

Enhance your organization’s secure posture by improving your attack and defense strategies
Code Files

Cybersecurity – Attack and Defense Strategies

Yuri Diogenes, Erdal Ozkaya

2 customer reviews
Enhance your organization’s secure posture by improving your attack and defense strategies
eBook
$10.00
RRP $31.99
Save 68%
Print + eBook
$39.99
RRP $39.99
What do I get with a Mapt subscription?
  • Unlimited access to all Packt’s 6,000+ eBooks and Videos
  • 100+ new titles a month, learning paths, assessments & code files
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$10.00
$39.99
RRP $31.99
RRP $39.99
eBook
Print + eBook

Frequently bought together


Cybersecurity – Attack and Defense Strategies Book Cover
Cybersecurity – Attack and Defense Strategies
$ 31.99
$ 10.00
Web Penetration Testing with Kali Linux - Third Edition Book Cover
Web Penetration Testing with Kali Linux - Third Edition
$ 39.99
$ 10.00
Buy 2 for $20.00
Save $51.98
Add to Cart

Book Details

ISBN 139781788475297
Paperback384 pages

Book Description

The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system.

In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.

By the end of this book, you will be well-versed with Red Team and Blue Team techniques and will have learned the techniques used nowadays to attack and defend systems.

Table of Contents

What You Will Learn

  • Learn the importance of having a solid foundation for your security posture
  • Understand the attack strategy using cyber security kill chain
  • Learn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence
  • Learn how to perform an incident investigation
  • Get an in-depth understanding of the recovery process
  • Understand continuous security monitoring and how to implement a vulnerability management strategy
  • Learn how to perform log analysis to identify suspicious activities

Authors

Table of Contents

Book Details

ISBN 139781788475297
Paperback384 pages
Read More
From 2 reviews

Read More Reviews

These popular $10 titles might interest you

Web Penetration Testing with Kali Linux - Third Edition Book Cover
Web Penetration Testing with Kali Linux - Third Edition
$ 39.99
$ 10.00
Practical Cyber Intelligence Book Cover
Practical Cyber Intelligence
$ 35.99
$ 10.00
Preventing Ransomware Book Cover
Preventing Ransomware
$ 27.99
$ 10.00
Information Security Handbook Book Cover
Information Security Handbook
$ 35.99
$ 10.00
Kali Linux Wireless Penetration Testing Beginner’s Guide - Third Edition Book Cover
Kali Linux Wireless Penetration Testing Beginner’s Guide - Third Edition
$ 27.99
$ 10.00
Advanced Infrastructure Penetration Testing Book Cover
Advanced Infrastructure Penetration Testing
$ 35.99
$ 10.00