Cybersecurity – Attack and Defense Strategies will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. (Limited-time offer)
Table of Contents
- Security Posture
- Incident Response Process
- Understanding the Cybersecurity Kill Chain
- Reconnaissance
- Compromising the System
- Chasing a User’s Identity
- Lateral Movement
- Privilege Escalation
- Security Policy
- Network Segmentation
- Active Sensors
- Threat Intelligence
- Investigating an Incident
- Recovery Process
- Vulnerability Management
- Log Analysis
Download Free PDF / Read Online
Author(s): Yuri Diogenes, Dr. Erdal Ozkaya
Publisher: Packt Publishing
Published: January 2018
Format(s): Online
File size: –
Number of pages: 384
Download / View Link(s): This offer has ended.
Free as of 04/17/2022
Publisher: Packt Publishing
Published: January 2018
Format(s): Online
File size: –
Number of pages: 384
Download / View Link(s): This offer has ended.
Free as of 04/17/2022