Dekorationsartikel gehören nicht zum Leistungsumfang.
Modern Cybersecurity Practices
Exploring and Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization (English Edition)
Taschenbuch von Pascal Ackerman
Sprache: Englisch

31,90 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

auf Lager, Lieferzeit 1-2 Werktage

Kategorien:
Beschreibung
A practical book that will help you defend against malicious activitiesKey FeaturesLearn how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out Learn how to choose, design and implement a cybersecurity program that best fits your needsLearn how to improve a cybersecurity program and accompanying cybersecurity posture by checks, balances and cyclic improvement activitiesLearn to verify, monitor and validate the cybersecurity program by active and passive cybersecurity monitoring activitiesLearn to detect malicious activities in your environment by implementing Threat Hunting exercisesDescriptionModern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on Company-X's environment, shows how an attacker could use information and tools to infiltrate the companies network, exfiltrate sensitive data and then leave the company in disarray by leaving behind a little surprise for any users to find the next time they open their computer. After we see how an attacker pulls off their malicious goals, the next part of the book will have your pick, design, and implement a security program that best reflects your specific situation and requirements. Along the way, we will look at a variety of methodologies, concepts, and tools that are typically used during the activities that are involved with the design, implementation, and improvement of one's cybersecurity posture.After having implemented a fitting cybersecurity program and kickstarted the improvement of our cybersecurity posture improvement activities we then go and look at all activities, requirements, tools, and methodologies behind keeping an eye on the state of our cybersecurity posture with active and passive cybersecurity monitoring tools and activities as well as the use of threat hunting exercises to find malicious activity in our environment that typically stays under the radar of standard detection methods like firewall, IDS and endpoint protection solutions. What will you learnExplore the different methodologies, techniques, tools, and activities an attacker uses to breach a modern company's cybersecurity defensesLearn how to design a cybersecurity program that best fits your unique environmentMonitor and improve one's cybersecurity posture by using active and passive security monitoring tools and activities.Who this book is forThis book is a must read to everyone involved with establishing, maintaining, and improving their Cybersecurity program and accompanying cybersecurity posture.Table of Contents1. What's at stake2. Define scope3.Adhere to a security standard4. Defining the policies5. Conducting a gap analysis6. Interpreting the analysis results7. Prioritizing remediation8. Getting to a comfortable level9. Conducting a penetration test10. Passive security monitoring11. Active security monitoring12. Threat hunting13. Continuous battle14. Time to reflectAbout the Authors Pascal Ackerman is a seasoned industrial security professional with a degree in electrical engineering and with 18 years of experience in industrial network design and support, information and network security, risk assessments, pentesting, threat hunting, and forensics.
A practical book that will help you defend against malicious activitiesKey FeaturesLearn how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out Learn how to choose, design and implement a cybersecurity program that best fits your needsLearn how to improve a cybersecurity program and accompanying cybersecurity posture by checks, balances and cyclic improvement activitiesLearn to verify, monitor and validate the cybersecurity program by active and passive cybersecurity monitoring activitiesLearn to detect malicious activities in your environment by implementing Threat Hunting exercisesDescriptionModern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on Company-X's environment, shows how an attacker could use information and tools to infiltrate the companies network, exfiltrate sensitive data and then leave the company in disarray by leaving behind a little surprise for any users to find the next time they open their computer. After we see how an attacker pulls off their malicious goals, the next part of the book will have your pick, design, and implement a security program that best reflects your specific situation and requirements. Along the way, we will look at a variety of methodologies, concepts, and tools that are typically used during the activities that are involved with the design, implementation, and improvement of one's cybersecurity posture.After having implemented a fitting cybersecurity program and kickstarted the improvement of our cybersecurity posture improvement activities we then go and look at all activities, requirements, tools, and methodologies behind keeping an eye on the state of our cybersecurity posture with active and passive cybersecurity monitoring tools and activities as well as the use of threat hunting exercises to find malicious activity in our environment that typically stays under the radar of standard detection methods like firewall, IDS and endpoint protection solutions. What will you learnExplore the different methodologies, techniques, tools, and activities an attacker uses to breach a modern company's cybersecurity defensesLearn how to design a cybersecurity program that best fits your unique environmentMonitor and improve one's cybersecurity posture by using active and passive security monitoring tools and activities.Who this book is forThis book is a must read to everyone involved with establishing, maintaining, and improving their Cybersecurity program and accompanying cybersecurity posture.Table of Contents1. What's at stake2. Define scope3.Adhere to a security standard4. Defining the policies5. Conducting a gap analysis6. Interpreting the analysis results7. Prioritizing remediation8. Getting to a comfortable level9. Conducting a penetration test10. Passive security monitoring11. Active security monitoring12. Threat hunting13. Continuous battle14. Time to reflectAbout the Authors Pascal Ackerman is a seasoned industrial security professional with a degree in electrical engineering and with 18 years of experience in industrial network design and support, information and network security, risk assessments, pentesting, threat hunting, and forensics.
Details
Erscheinungsjahr: 2020
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Seiten: 410
ISBN-13: 9789389328257
ISBN-10: 938932825X
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Ackerman, Pascal
Hersteller: Amazon Digital Services LLC - Kdp
Maße: 227 x 193 x 25 mm
Von/Mit: Pascal Ackerman
Erscheinungsdatum: 30.04.2020
Gewicht: 0,726 kg
preigu-id: 118355050
Details
Erscheinungsjahr: 2020
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Seiten: 410
ISBN-13: 9789389328257
ISBN-10: 938932825X
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Ackerman, Pascal
Hersteller: Amazon Digital Services LLC - Kdp
Maße: 227 x 193 x 25 mm
Von/Mit: Pascal Ackerman
Erscheinungsdatum: 30.04.2020
Gewicht: 0,726 kg
preigu-id: 118355050
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte