Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Cybersecurity - attack and defense strategies
by
Ozkaya, Erdal
, Diogenes, Yuri
in
COM015000 COMPUTERS / Security / Viruses & Malware
/ COM060040 COMPUTERS / Security / Online Safety & Privacy
/ Computer networks
/ COMPUTERS / Networking / Network Protocols
/ Networking and Servers
/ Security measures
2018
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Cybersecurity - attack and defense strategies
by
Ozkaya, Erdal
, Diogenes, Yuri
in
COM015000 COMPUTERS / Security / Viruses & Malware
/ COM060040 COMPUTERS / Security / Online Safety & Privacy
/ Computer networks
/ COMPUTERS / Networking / Network Protocols
/ Networking and Servers
/ Security measures
2018
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cybersecurity - attack and defense strategies
by
Ozkaya, Erdal
, Diogenes, Yuri
in
COM015000 COMPUTERS / Security / Viruses & Malware
/ COM060040 COMPUTERS / Security / Online Safety & Privacy
/ Computer networks
/ COMPUTERS / Networking / Network Protocols
/ Networking and Servers
/ Security measures
2018
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
eBook
Cybersecurity - attack and defense strategies
2018
Request Book From Autostore
and Choose the Collection Method
Overview
The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system. In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.
Publisher
PACKT Publishing,Packt Publishing, Limited,Packt Publishing Limited,Packt Publishing
Subject
ISBN
1788475291, 9781788475297, 178847385X, 9781788473859
This website uses cookies to ensure you get the best experience on our website.