|
|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
Analyze malicious samples, write reports, and use industry-standard
methodologies to confidently triage and analyze adversarial
software and malware Key Features Investigate, detect, and respond
to various types of malware threat Understand how to use what
you've learned as an analyst to produce actionable IOCs and
reporting Explore complete solutions, detailed walkthroughs, and
case studies of real-world malware samples Book
DescriptionMalicious software poses a threat to every enterprise
globally. Its growth is costing businesses millions of dollars due
to currency theft as a result of ransomware and lost productivity.
With this book, you'll learn how to quickly triage, identify,
attribute, and remediate threats using proven analysis techniques.
Malware Analysis Techniques begins with an overview of the nature
of malware, the current threat landscape, and its impact on
businesses. Once you've covered the basics of malware, you'll move
on to discover more about the technical nature of malicious
software, including static characteristics and dynamic attack
methods within the MITRE ATT&CK framework. You'll also find out
how to perform practical malware analysis by applying all that
you've learned to attribute the malware to a specific threat and
weaponize the adversary's indicators of compromise (IOCs) and
methodology against them to prevent them from attacking. Finally,
you'll get to grips with common tooling utilized by professional
malware analysts and understand the basics of reverse engineering
with the NSA's Ghidra platform. By the end of this malware analysis
book, you'll be able to perform in-depth static and dynamic
analysis and automate key tasks for improved defense against
attacks. What you will learn Discover how to maintain a safe
analysis environment for malware samples Get to grips with static
and dynamic analysis techniques for collecting IOCs
Reverse-engineer and debug malware to understand its purpose
Develop a well-polished workflow for malware analysis Understand
when and where to implement automation to react quickly to threats
Perform malware analysis tasks such as code analysis and API
inspection Who this book is forThis book is for incident response
professionals, malware analysts, and researchers who want to
sharpen their skillset or are looking for a reference for common
static and dynamic analysis techniques. Beginners will also find
this book useful to get started with learning about malware
analysis. Basic knowledge of command-line interfaces, familiarity
with Windows and Unix-like filesystems and registries, and
experience in scripting languages such as PowerShell, Python, or
Ruby will assist with understanding the concepts covered.
A comprehensive guide for cybersecurity professionals to acquire
unique insights on the evolution of the threat landscape and how
you can address modern cybersecurity challenges in your
organisation Key Features Protect your organization from
cybersecurity threats with field-tested strategies Discover the
most common ways enterprises initially get compromised Measure the
effectiveness of your organization's current cybersecurity program
against cyber attacks Book DescriptionAfter scrutinizing numerous
cybersecurity strategies, Microsoft's former Global Chief Security
Advisor in this book helps you understand the efficacy of popular
cybersecurity strategies and more. Cybersecurity Threats, Malware
Trends, and Strategies offers an unprecedented long-term view of
the global threat landscape by examining the twenty-year trend in
vulnerability disclosures and exploitation, nearly a decade of
regional differences in malware infections, the socio-economic
factors that underpin them, and how global malware has evolved.
This will give you further perspectives into malware protection for
your organization. It also examines internet-based threats that
CISOs should be aware of. The book will provide you with an
evaluation of the various cybersecurity strategies that have
ultimately failed over the past twenty years, along with one or two
that have actually worked. It will help executives and security and
compliance professionals understand how cloud computing is a game
changer for them. By the end of this book, you will know how to
measure the effectiveness of your organization's cybersecurity
strategy and the efficacy of the vendors you employ to help you
protect your organization and yourself. What you will learn
Discover cybersecurity strategies and the ingredients critical to
their success Improve vulnerability management by reducing risks
and costs for your organization Learn how malware and other threats
have evolved over the past decade Mitigate internet-based threats,
phishing attacks, and malware distribution sites Weigh the pros and
cons of popular cybersecurity strategies of the past two decades
Implement and then measure the outcome of a cybersecurity strategy
Learn how the cloud provides better security capabilities than
on-premises IT environments Who this book is forThis book is
designed to benefit engineers, leaders, or any professional with
either a responsibility for cyber security within their
organization, or an interest in working in this ever-growing field.
Learn IT security essentials and prepare for the Security+ exam
with this CompTIA exam guide, complete with additional online
resources-including flashcards, PBQs, and mock exams-at
securityplus.training Key Features Written by Ian Neil, one of the
world's top CompTIA Security+ trainers Test your knowledge of
cybersecurity jargon and acronyms with realistic exam questions
Learn about cryptography, encryption, and security policies to
deliver a robust infrastructure Book DescriptionThe CompTIA
Security+ certification validates the fundamental knowledge
required to perform core security functions and pursue a career in
IT security. Authored by Ian Neil, a world-class CompTIA
certification trainer, this book is a best-in-class study guide
that fully covers the CompTIA Security+ 601 exam objectives.
Complete with chapter review questions, realistic mock exams, and
worked solutions, this guide will help you master the core concepts
to pass the exam the first time you take it. With the help of
relevant examples, you'll learn fundamental security concepts from
certificates and encryption to identity and access management
(IAM). As you progress, you'll delve into the important domains of
the exam, including cloud security, threats, attacks and
vulnerabilities, technologies and tools, architecture and design,
risk management, cryptography, and public key infrastructure (PKI).
You can access extra practice materials, including flashcards,
performance-based questions, practical labs, mock exams, key terms
glossary, and exam tips on the author's website at
securityplus.training. By the end of this Security+ book, you'll
have gained the knowledge and understanding to take the CompTIA
exam with confidence. What you will learn Master cybersecurity
fundamentals, from the CIA triad through to IAM Explore cloud
security and techniques used in penetration testing Use different
authentication methods and troubleshoot security issues Secure the
devices and applications used by your company Identify and protect
against various types of malware and viruses Protect yourself
against social engineering and advanced attacks Understand and
implement PKI concepts Delve into secure application development,
deployment, and automation Who this book is forIf you want to take
and pass the CompTIA Security+ SY0-601 exam, even if you are not
from an IT background, this book is for you. You'll also find this
guide useful if you want to become a qualified security
professional. This CompTIA book is also ideal for US Government and
US Department of Defense personnel seeking cybersecurity
certification.
|
|