Cybersecurity - Attack and Defense Strategies - Second Edition
暫譯: 網路安全 - 攻擊與防禦策略 - 第二版
Yuri Diogenes , Erdal Ozkaya
- 出版商: Packt Publishing
- 出版日期: 2019-12-31
- 售價: $3,180
- 貴賓價: 9.5 折 $3,021
- 語言: 英文
- 頁數: 634
- 裝訂: Paperback
- ISBN: 183882779X
- ISBN-13: 9781838827793
-
相關分類:
資訊安全
-
相關翻譯:
網絡安全與攻防策略:現代威脅應對之道(原書第2版) (簡中版)
-
其他版本:
Cybersecurity - Attack and Defense Strategies - Third Edition: Improve your security posture to mitigate risks and prevent attackers from infiltrating
買這商品的人也買了...
-
$2,460$2,337 -
$2,540$2,413 -
$480$379 -
$580$493 -
$580$458 -
$580$493 -
$940$700 -
$680$537 -
$590$466 -
$580$383 -
$800$720 -
$505Linux 防火牆, 4/e (Linux Firewalls: Enhancing Security with nftables and Beyond, 4/e)
-
$480$379 -
$2,900$2,755 -
$580$493 -
$699$594 -
$2,040$1,938 -
$1,750,800$1,663,260 -
$1,800$1,710 -
$680$537 -
$1,710$1,620 -
$980$774 -
$2,450$2,328 -
$680$537 -
$780$608
相關主題
商品描述
Key Features
- Covers the latest security threats and defense strategies for 2020
- Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach
- Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more
Book Description
Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.
Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system.
This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.
What you will learn
- The importance of having a solid foundation for your security posture
- Use cyber security kill chain to understand the attack strategy
- Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence
- Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy
- Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails
- Perform an incident investigation using Azure Security Center and Azure Sentinel
- Get an in-depth understanding of the disaster recovery process
- Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud
- Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure
Who this book is for
For the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.
商品描述(中文翻譯)
**主要特點**
- 涵蓋2020年最新的安全威脅和防禦策略
- 介紹進行威脅獵捕和處理系統入侵所需的技術和技能
- 提供有關雲安全姿態管理(Cloud Security Posture Management)、Microsoft Azure威脅保護、零信任網路策略、國家級攻擊、使用Azure Sentinel作為雲端SIEM進行日誌記錄和調查等新資訊,還有更多內容
**書籍描述**
《網路安全:攻擊與防禦策略(第二版)》是這本暢銷書的全新修訂版,涵蓋最新的安全威脅和防禦機制,包括雲安全姿態管理(CSPM)的詳細概述以及當前威脅環境的評估,並額外關注新的物聯網威脅和加密貨幣挖礦。
網路安全從組織需要了解的基本知識開始,以維持對外部威脅的安全姿態並設計穩健的網路安全計畫。它將帶你進入威脅行為者的思維模式,幫助你更好地理解動機和實際攻擊的步驟——網路安全殺傷鏈。你將獲得實踐經驗,使用新的偵查技術和追蹤用戶身份的方法,讓你能夠發現系統是如何被攻擊的,並識別和利用自己系統中的漏洞。
本書還專注於增強系統安全的防禦策略。你還將發現深入的工具,包括Azure Sentinel,以確保每個網路層都有安全控制,以及如何執行受損系統的恢復過程。
**你將學到什麼**
- 擁有堅實的安全姿態基礎的重要性
- 使用網路安全殺傷鏈來理解攻擊策略
- 通過改善安全政策、加固網路、實施主動感測器和利用威脅情報來提升組織的網路韌性
- 利用最新的防禦工具,包括Azure Sentinel和零信任網路策略
- 識別不同類型的網路攻擊,例如SQL注入、惡意軟體和社交工程威脅(如釣魚電子郵件)
- 使用Azure Security Center和Azure Sentinel進行事件調查
- 深入了解災難恢復過程
- 理解如何持續監控安全並為本地和混合雲實施漏洞管理策略
- 學習如何使用雲端進行日誌分析,以識別可疑活動,包括來自Amazon Web Services和Azure的日誌
**本書適合誰**
適合進入IT安全領域的IT專業人員、IT滲透測試人員、安全顧問或希望進行道德駭客的人士。具備滲透測試的先前知識將是有益的。
作者簡介
Yuri Diogenes is a professor at EC-Council University for their master's degree in cybersecurity and a Senior Program Manager at Microsoft for Azure Security Center. Yuri has a Master of Science degree in cybersecurity from UTICA College, and an MBA from FGV Brazil. Yuri currently holds the following certifications: CISSP, CyberSec First Responder, CompTIA CSA+, E|CEH, E|CSA, E|CHFI, E|CND, CyberSec First Responder, CompTIA, Security+, CompTIA Cloud Essentials, Network+, Mobility+, CASP, CSA+, MCSE, MCTS, and Microsoft Specialist - Azure.
Dr. Erdal Ozkaya is a leading Cybersecurity Professional with business development, management, and academic skills who focuses on securing the Cyber Space and sharing his real-life skills as a Security Advisor, Speaker, Lecturer, and Author.
Erdal is known to be passionate about reaching communities, creating cyber awareness campaigns, and leveraging new and innovative approaches and technologies to holistically address the information security and privacy needs for every person and organization in the world.
He is an award-winning technical expert and speaker: His recent awards include: Cyber Security Professional of the Year MEA, Hall of Fame by CISO Magazine, Cybersecurity Influencer of the Year (2019), Microsoft Circle of Excellence Platinum Club (2017), NATO Center of Excellence (2016) Security Professional of the Year by MEA Channel Magazine (2015), Professional of the Year Sydney (2014), and many speaker of the year awards in conferences.
He also holds Global Instructor of the Year awards from EC Council and Microsoft. Erdal is also a part-time lecturer at Charles Sturt University, Australia.
Erdal has co-authored many cybersecurity books as well as security certification courseware and exams for different vendors.
Erdal has the following qualifications: Doctor of Philosophy in Cybersecurity, Master of Computing Research, Master of Information Systems Security, Bachelor of Information Technology, Microsoft Certified Trainer, Microsoft Certified Learning Consultant, ISO27001 Auditor and Implementer, Certified Ethical Hacker (CEH), Certified Ethical Instructor and Licensed Penetration Tester, and 90+ other industry certifications.
作者簡介(中文翻譯)
尤里·迪奧根斯是EC-Council University的網路安全碩士學位教授,也是微軟Azure安全中心的高級計劃經理。尤里擁有UTICA College的網路安全碩士學位,以及巴西FGV的工商管理碩士學位。尤里目前持有以下認證:CISSP、CyberSec First Responder、CompTIA CSA+、E|CEH、E|CSA、E|CHFI、E|CND、CyberSec First Responder、CompTIA Security+、CompTIA Cloud Essentials、Network+、Mobility+、CASP、CSA+、MCSE、MCTS,以及微軟專家 - Azure。
厄達爾·奧茲卡亞博士是一位領先的網路安全專業人士,擁有商業發展、管理和學術技能,專注於保護網路空間,並分享他作為安全顧問、演講者、講師和作者的實際技能。
厄達爾以熱衷於接觸社區、創建網路安全意識活動,以及利用新穎的創新方法和技術來全面解決全球每個人和組織的信息安全和隱私需求而聞名。
他是一位獲獎的技術專家和演講者:他最近的獎項包括:MEA年度網路安全專業人士、CISO雜誌名人堂、2019年度網路安全影響者、2017年微軟卓越圓桌會議白金俱樂部、2016年北約卓越中心MEA頻道雜誌年度安全專業人士(2015年)、2014年悉尼年度專業人士,以及多個會議的年度演講者獎。
他還獲得了EC Council和微軟的全球年度講師獎。厄達爾也是澳大利亞查爾斯·斯圖爾特大學的兼職講師。
厄達爾共同撰寫了多本網路安全書籍,以及針對不同供應商的安全認證課程和考試。
厄達爾擁有以下資格:網路安全哲學博士、計算研究碩士、信息系統安全碩士、信息技術學士、微軟認證講師、微軟認證學習顧問、ISO27001審核員和實施者、認證道德駭客(CEH)、認證道德講師和持牌滲透測試員,以及90多項其他行業認證。
目錄大綱
- Security Posture
- Incident Response Process
- What is a Cyber Strategy?
- Understanding the Cybersecurity Kill Chain
- Reconnaissance
- Compromising the System
- Chasing a User's Identity
- Lateral Movement
- Privilege Escalation
- Security Policy
- Network Segmentation
- Active Sensors
- Threat Intelligence
- Investigating an Incident
- Recovery Process
- Vulnerability Management
- Log Analysis
目錄大綱(中文翻譯)
- Security Posture
- Incident Response Process
- What is a Cyber Strategy?
- Understanding the Cybersecurity Kill Chain
- Reconnaissance
- Compromising the System
- Chasing a User's Identity
- Lateral Movement
- Privilege Escalation
- Security Policy
- Network Segmentation
- Active Sensors
- Threat Intelligence
- Investigating an Incident
- Recovery Process
- Vulnerability Management
- Log Analysis