• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to secondary navigation
  • Skip to primary sidebar

OnlineProgrammingBooks.com

Legally Free Computer Books

  • All Categories
  • All Books
  • All Categories
  • All Books
  • About Us
  • Privacy policy
  • Disclaimer
  • Subscribe
  • Contact
You are here: Home ▶ Limited-Time Offers ▶ Cybersecurity – Attack and Defense Strategies

Cybersecurity – Attack and Defense Strategies

April 17, 2022

Building Smart Homes with Raspberry Pi Zero

Cybersecurity – Attack and Defense Strategies will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. (Limited-time offer)

 

Table of Contents

  • Security Posture
  • Incident Response Process
  • Understanding the Cybersecurity Kill Chain
  • Reconnaissance
  • Compromising the System
  • Chasing a User’s Identity
  • Lateral Movement
  • Privilege Escalation
  • Security Policy
  • Network Segmentation
  • Active Sensors
  • Threat Intelligence
  • Investigating an Incident
  • Recovery Process
  • Vulnerability Management
  • Log Analysis

Download Free PDF / Read Online

Author(s): Yuri Diogenes, Dr. Erdal Ozkaya
Publisher: Packt Publishing
Published: January 2018
Format(s): Online
File size: –
Number of pages: 384
Download / View Link(s): This offer has ended.
Free as of 04/17/2022

Similar Books:

  1. SQL Server Transaction Log Management
  2. Rational Cybersecurity for Business
  3. Human Robot Interaction
  4. Concurrency Control and Recovery in Database Systems
  5. Free eBook: Security Concepts
Previous Post: « Building Smart Homes with Raspberry Pi Zero
Next Post: Delphi High Performance »

Primary Sidebar

Get Latest Updates

  • Facebook
  • Pinterest
  • RSS
  • Twitter
  • YouTube
  • About Us
  • Privacy policy
  • Disclaimer
  • Subscribe
  • Contact

Copyright © 2006–2023 OnlineProgrammingBooks.com