Cybersecurity: Attack and Defense Strategies

Enhance your organization’s secure posture by improving your attack and defense strategies

Access cutting-edge content as it's created

Want access to this book right now? Read as we develop it as part of our Early Access program. Click here to find out more about Early Access.

Code Files

Cybersecurity: Attack and Defense Strategies

Yuri Diogenes, Erdal Ozkaya

Enhance your organization’s secure posture by improving your attack and defense strategies

Quick links: > What will you learn?> Table of content

Access cutting-edge content as it's created

Want access to this book right now? Read as we develop it as part of our Early Access program. Click here to find out more about Early Access.

Mapt Subscription
FREE
$29.99/m after trial
Early Access eBook
$22.40
RRP $31.99
Save 29%
Pre-Order Print
$39.99
RRP $39.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$22.40
$39.99
$29.99 p/m after trial
RRP $31.99
RRP $39.99
Subscription
Early Access eBook
Pre-Order Print
Start 14 Day Trial

Frequently bought together


Cybersecurity: Attack and Defense Strategies Book Cover
Cybersecurity: Attack and Defense Strategies
$ 31.99
$ 22.40
Information Security Handbook Book Cover
Information Security Handbook
$ 35.99
$ 25.20
Buy 2 for $35.00
Save $32.98
Add to Cart

Book Details

ISBN 139781788475297
Paperback449 pages

Book Description

The book will start with the initial Incident Response process, moving to Red Team tactics, where you will learn the basic syntax for commonly used Windows and Linux tools to perform the necessary operations. You will also gain hands-on experience of using the new red team techniques with powerful tools like python and PowerShell which will enable you to find out vulnerabilities in your system and mediums to exploit them. Moving on, you will learn how to compromise a system, hack the user’s identity, and the various tools used by the red team to find vulnerabilities in a system.

In the next section, you will learn about the defense strategies followed by the blue team to enhance the overall security of a system. You will also learn about an in depth strategy to ensure that there are security controls in each network layer and ways in which you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.

By the end of this book, you will be well-versed with Red and Blue team techniques and will learn military grade security aspects of attacking and defending a system.

Table of Contents

Chapter 1: Security Posture
Current threat landscape
Cybersecurity challenges
Enhancing your security posture
Red and blue team
References
Summary
Chapter 2: Incident Response Process
Incident Response process
Handling an incident
Post–incident activity
Incident Response in the cloud
References
Summary
Chapter 3: Understanding the Cybersecurity Kill Chain
External reconnaissance
Access and privilege escalation
Exfiltration
Sustainment
Assault
Obfuscation
Threat lifecycle managament
References
Summary
Chapter 4: Reconnaissance
External reconnaissance
Internal reconnaissance
Conclusion
References
Summary
Chapter 5: Compromising the System
Analyzing current trends
Phishing
Exploiting a vulnerability
Zero-Day
Performing the steps to compromise a system
References
Summary
Chapter 6: Chasing User's Identity
Identity is the new perimeter
Strategies to compromise user's identity
Hacking user's identity
References
Summary
Chapter 7: Lateral Movement
Infiltration
Performing lateral movement
Summary
Chapter 8: Privilege Escalation
Infiltration
Avoiding alerts
Performing privilege escalation
Conclusion and lessons learnt
References
Summary
Chapter 9: Security Policy
Reviewing your security policy
Educating the end user
Policy enforcement
Monitoring for compliance
References
Summary
Chapter 10: Network Segmentation
Defense in depth approach
Physical network segmentation
Securing remote access to the network
Virtual network segmentation
Hybrid cloud network security
References
Summary
Chapter 11: Active Sensors
Chapter 12: Threat Intelligence
Chapter 13: Investigating an Incident
Chapter 14: Recovery Process
Chapter 15: Vulnerability Management
Chapter 16: Log Analysis

What You Will Learn

  • Learn the importance of having a solid foundation for your security posture
  • Understand the attack strategy using cyber security kill chain.
  • Learn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence
  • Learn how to perform an incident investigation
  • Get in-depth understanding of the recovery process
  • Understand continuous security monitoring, and how to implement a vulnerability management strategy
  • Learn how to perform log analysis to identify suspicious activities

Authors

Table of Contents

Chapter 1: Security Posture
Current threat landscape
Cybersecurity challenges
Enhancing your security posture
Red and blue team
References
Summary
Chapter 2: Incident Response Process
Incident Response process
Handling an incident
Post–incident activity
Incident Response in the cloud
References
Summary
Chapter 3: Understanding the Cybersecurity Kill Chain
External reconnaissance
Access and privilege escalation
Exfiltration
Sustainment
Assault
Obfuscation
Threat lifecycle managament
References
Summary
Chapter 4: Reconnaissance
External reconnaissance
Internal reconnaissance
Conclusion
References
Summary
Chapter 5: Compromising the System
Analyzing current trends
Phishing
Exploiting a vulnerability
Zero-Day
Performing the steps to compromise a system
References
Summary
Chapter 6: Chasing User's Identity
Identity is the new perimeter
Strategies to compromise user's identity
Hacking user's identity
References
Summary
Chapter 7: Lateral Movement
Infiltration
Performing lateral movement
Summary
Chapter 8: Privilege Escalation
Infiltration
Avoiding alerts
Performing privilege escalation
Conclusion and lessons learnt
References
Summary
Chapter 9: Security Policy
Reviewing your security policy
Educating the end user
Policy enforcement
Monitoring for compliance
References
Summary
Chapter 10: Network Segmentation
Defense in depth approach
Physical network segmentation
Securing remote access to the network
Virtual network segmentation
Hybrid cloud network security
References
Summary
Chapter 11: Active Sensors
Chapter 12: Threat Intelligence
Chapter 13: Investigating an Incident
Chapter 14: Recovery Process
Chapter 15: Vulnerability Management
Chapter 16: Log Analysis

Book Details

ISBN 139781788475297
Paperback449 pages
Read More

Read More Reviews

Recommended for You

Information Security Handbook Book Cover
Information Security Handbook
$ 35.99
$ 25.20
Network Vulnerability Assessment Book Cover
Network Vulnerability Assessment
$ 35.99
$ 25.20
Understanding Software Book Cover
Understanding Software
$ 23.99
$ 16.80
Scalable programming with Scala and Spark [Video] Book Cover
Scalable programming with Scala and Spark [Video]
$ 49.99
$ 42.50
Using Spring and Angular for Web Application [Video] Book Cover
Using Spring and Angular for Web Application [Video]
$ 124.99
$ 106.25
Develop an Advanced Cross-platform App Using Xamarin.Forms and XAML [Video] Book Cover
Develop an Advanced Cross-platform App Using Xamarin.Forms and XAML [Video]
$ 124.99
$ 106.25