Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Cybersecurity Blue Team Toolkit
Taschenbuch von Nadean H Tanner
Sprache: Englisch

42,20 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Produkt Anzahl: Gib den gewünschten Wert ein oder benutze die Schaltflächen um die Anzahl zu erhöhen oder zu reduzieren.
Kategorien:
Beschreibung

A practical cybersecurity handbook for both tech and non-tech professionals

There are plenty of books exploring the individual, highly technical components of cybersecurity. They offer specialized, narrowly focused training on a multitude of topics and technologies. But the resources available for end users and managers in need of clear, straightforward, and strategic guidance on the best practices and available tools of cybersecurity are surprisingly limited.

The Cybersecurity Blue Team Toolkit is an informative, accurate, and practical handbook that provides up-todate instruction for those in hands-on management and technical positions. This balanced, comprehensive guide helps readers navigate the various cybersecurity philosophies, frameworks, vendors, and compliances to arrive at optimal solutions to protect dynamic, multifaceted environments in real-world situations. Readers new to the industry or those seeking to expand their expertise will gain knowledge of fundamental networking and security tools, Microsoft Windows troubleshooting, network mapping, vulnerability management, web application security, patch configuration, and much more. Substantive yet easy-to-read chapters cover the practice and underlying theory of cybersecurity?from assessment, configuration, protection, and defense strategies, to remediation and offensive measures.

Author Nadean H. Tanner draws from her extensive experience in both academia and the Department of Defense to provide a unique perspective on cybersecurity tools and methods applicable to a wide spectrum of industries and sectors. An invaluable addition to the desk of anyone tasked with pinging an asset, running a tracert, or pinpointing the physical and logical addresses of an unresponsive web server, this book:

  • Satisfies a significant need for a practical, not overly technical guidebook for cybersecurity professionals
  • Presents clear and user#45;friendly explanations of cybersecurity in both theory and practice
  • Covers tools such as PuTTY, pathping, sysinternals®, NMAP®, OpenVAS, Metasploit®, and WireShark®
  • Includes instructions on virtual lab construction, exercises, and illustrations

A practical cybersecurity handbook for both tech and non-tech professionals

There are plenty of books exploring the individual, highly technical components of cybersecurity. They offer specialized, narrowly focused training on a multitude of topics and technologies. But the resources available for end users and managers in need of clear, straightforward, and strategic guidance on the best practices and available tools of cybersecurity are surprisingly limited.

The Cybersecurity Blue Team Toolkit is an informative, accurate, and practical handbook that provides up-todate instruction for those in hands-on management and technical positions. This balanced, comprehensive guide helps readers navigate the various cybersecurity philosophies, frameworks, vendors, and compliances to arrive at optimal solutions to protect dynamic, multifaceted environments in real-world situations. Readers new to the industry or those seeking to expand their expertise will gain knowledge of fundamental networking and security tools, Microsoft Windows troubleshooting, network mapping, vulnerability management, web application security, patch configuration, and much more. Substantive yet easy-to-read chapters cover the practice and underlying theory of cybersecurity?from assessment, configuration, protection, and defense strategies, to remediation and offensive measures.

Author Nadean H. Tanner draws from her extensive experience in both academia and the Department of Defense to provide a unique perspective on cybersecurity tools and methods applicable to a wide spectrum of industries and sectors. An invaluable addition to the desk of anyone tasked with pinging an asset, running a tracert, or pinpointing the physical and logical addresses of an unresponsive web server, this book:

  • Satisfies a significant need for a practical, not overly technical guidebook for cybersecurity professionals
  • Presents clear and user#45;friendly explanations of cybersecurity in both theory and practice
  • Covers tools such as PuTTY, pathping, sysinternals®, NMAP®, OpenVAS, Metasploit®, and WireShark®
  • Includes instructions on virtual lab construction, exercises, and illustrations
Über den Autor

Nadean H. Tanner has been in the technology industry for over 20 years in a variety of positions from marketing to training to web development to hardware. She has worked in academia as an IT director and a postgraduate technology instructor. She has also been a trainer and consultant in advanced cybersecurity for Fortune 500 companies as well as the U.S. Department of Defense.

Inhaltsverzeichnis

Foreword xxi

Introduction xxiii

Chapter 1 Fundamental Networking and Security Tools 1

Ping 1

IPConfig 4

NSLookup 7

Tracert 9

NetStat 10

PuTTY 14

Chapter 2 Troubleshooting Microsoft Windows 17

RELI 18

PSR 19

PathPing 21

MTR 23

Sysinternals 24

The Legendary God Mode 28

Chapter 3 Nmap-The Network Mapper 31

Network Mapping 32

Port Scanning 34

Services Running 36

Operating Systems 38

Zenmap 39

Chapter 4 Vulnerability Management 43

Managing Vulnerabilities 43

OpenVAS 46

Nexpose Community 50

Chapter 5 Monitoring with OSSEC 57

Log-Based Intrusion Detection Systems 57

Agents 61

Adding an Agent 63

Extracting the Key for an Agent 64

Removing an Agent 64

Log Analysis 65

Chapter 6 Protecting Wireless Communication 67

802.11 67

inSSIDer 70

Wireless Network Watcher 71

Hamachi 72

Tor 78

Chapter 7 Wireshark 83

Wireshark 83

OSI Model 86

Capture 89

Filters and Colors 92

Inspection 93

Chapter 8 Access Management 97

AAA 98

Least Privilege 99

Single Sign-On 101

JumpCloud 103

Chapter 9 Managing Logs 109

Windows Event Viewer 110

Windows PowerShell 112

BareTail 116

Syslog 117

SolarWinds Kiwi 120

Chapter 10 Metasploit 125

Reconnaissance 127

Installation 128

Gaining Access 135

Metasploitable2 139

Vulnerable Web Services 144

Meterpreter 146

Chapter 11 Web Application Security 147

Web Development 148

Information Gathering 151

DNS 153

Defense in Depth 155

Burp Suite 156

Chapter 12 Patch and Configuration Management 165

Patch Management 166

Configuration Management 173

Clonezilla Live 179

Chapter 13 Securing OSI Layer 8 187

Human Nature 188

Human Attacks 192

Education 193

The Social Engineer Toolkit 195

Chapter 14 Kali Linux 205

Virtualization 206

Optimizing Kali Linux 219

Using Kali Linux Tools 221

Maltego 222

Recon-ng 223

Sparta 225

MacChanger 225

Nikto 226

Kismet 227

WiFite 228

John the Ripper 229

Hashcat 230

Chapter 15 CISv7 Controls and Best Practices 235

CIS Basic Controls-The Top Six 236

Inventory and Control of Hardware Assets 236

Inventory and Control of Software Assets 238

Continuous Vulnerability Management 239

Controlled Use of Administrative Privileges 240

Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 241

Maintenance, Monitoring, and Analysis of Audit Logs 246

In Conclusion 248

Index 249

Details
Erscheinungsjahr: 2019
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: 288 S.
ISBN-13: 9781119552932
ISBN-10: 1119552931
Sprache: Englisch
Herstellernummer: 1W119552930
Einband: Kartoniert / Broschiert
Autor: Tanner, Nadean H
Hersteller: Wiley
Verantwortliche Person für die EU: Wiley-VCH GmbH, Boschstr. 12, D-69469 Weinheim, product-safety@wiley.com
Maße: 235 x 189 x 17 mm
Von/Mit: Nadean H Tanner
Erscheinungsdatum: 30.04.2019
Gewicht: 0,387 kg
Artikel-ID: 114676114
Über den Autor

Nadean H. Tanner has been in the technology industry for over 20 years in a variety of positions from marketing to training to web development to hardware. She has worked in academia as an IT director and a postgraduate technology instructor. She has also been a trainer and consultant in advanced cybersecurity for Fortune 500 companies as well as the U.S. Department of Defense.

Inhaltsverzeichnis

Foreword xxi

Introduction xxiii

Chapter 1 Fundamental Networking and Security Tools 1

Ping 1

IPConfig 4

NSLookup 7

Tracert 9

NetStat 10

PuTTY 14

Chapter 2 Troubleshooting Microsoft Windows 17

RELI 18

PSR 19

PathPing 21

MTR 23

Sysinternals 24

The Legendary God Mode 28

Chapter 3 Nmap-The Network Mapper 31

Network Mapping 32

Port Scanning 34

Services Running 36

Operating Systems 38

Zenmap 39

Chapter 4 Vulnerability Management 43

Managing Vulnerabilities 43

OpenVAS 46

Nexpose Community 50

Chapter 5 Monitoring with OSSEC 57

Log-Based Intrusion Detection Systems 57

Agents 61

Adding an Agent 63

Extracting the Key for an Agent 64

Removing an Agent 64

Log Analysis 65

Chapter 6 Protecting Wireless Communication 67

802.11 67

inSSIDer 70

Wireless Network Watcher 71

Hamachi 72

Tor 78

Chapter 7 Wireshark 83

Wireshark 83

OSI Model 86

Capture 89

Filters and Colors 92

Inspection 93

Chapter 8 Access Management 97

AAA 98

Least Privilege 99

Single Sign-On 101

JumpCloud 103

Chapter 9 Managing Logs 109

Windows Event Viewer 110

Windows PowerShell 112

BareTail 116

Syslog 117

SolarWinds Kiwi 120

Chapter 10 Metasploit 125

Reconnaissance 127

Installation 128

Gaining Access 135

Metasploitable2 139

Vulnerable Web Services 144

Meterpreter 146

Chapter 11 Web Application Security 147

Web Development 148

Information Gathering 151

DNS 153

Defense in Depth 155

Burp Suite 156

Chapter 12 Patch and Configuration Management 165

Patch Management 166

Configuration Management 173

Clonezilla Live 179

Chapter 13 Securing OSI Layer 8 187

Human Nature 188

Human Attacks 192

Education 193

The Social Engineer Toolkit 195

Chapter 14 Kali Linux 205

Virtualization 206

Optimizing Kali Linux 219

Using Kali Linux Tools 221

Maltego 222

Recon-ng 223

Sparta 225

MacChanger 225

Nikto 226

Kismet 227

WiFite 228

John the Ripper 229

Hashcat 230

Chapter 15 CISv7 Controls and Best Practices 235

CIS Basic Controls-The Top Six 236

Inventory and Control of Hardware Assets 236

Inventory and Control of Software Assets 238

Continuous Vulnerability Management 239

Controlled Use of Administrative Privileges 240

Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 241

Maintenance, Monitoring, and Analysis of Audit Logs 246

In Conclusion 248

Index 249

Details
Erscheinungsjahr: 2019
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: 288 S.
ISBN-13: 9781119552932
ISBN-10: 1119552931
Sprache: Englisch
Herstellernummer: 1W119552930
Einband: Kartoniert / Broschiert
Autor: Tanner, Nadean H
Hersteller: Wiley
Verantwortliche Person für die EU: Wiley-VCH GmbH, Boschstr. 12, D-69469 Weinheim, product-safety@wiley.com
Maße: 235 x 189 x 17 mm
Von/Mit: Nadean H Tanner
Erscheinungsdatum: 30.04.2019
Gewicht: 0,387 kg
Artikel-ID: 114676114
Sicherheitshinweis

Ähnliche Produkte

Ähnliche Produkte