|
|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
A comprehensive guide for cybersecurity professionals to acquire
unique insights on the evolution of the threat landscape and how
you can address modern cybersecurity challenges in your
organisation Key Features Protect your organization from
cybersecurity threats with field-tested strategies Discover the
most common ways enterprises initially get compromised Measure the
effectiveness of your organization's current cybersecurity program
against cyber attacks Book DescriptionAfter scrutinizing numerous
cybersecurity strategies, Microsoft's former Global Chief Security
Advisor in this book helps you understand the efficacy of popular
cybersecurity strategies and more. Cybersecurity Threats, Malware
Trends, and Strategies offers an unprecedented long-term view of
the global threat landscape by examining the twenty-year trend in
vulnerability disclosures and exploitation, nearly a decade of
regional differences in malware infections, the socio-economic
factors that underpin them, and how global malware has evolved.
This will give you further perspectives into malware protection for
your organization. It also examines internet-based threats that
CISOs should be aware of. The book will provide you with an
evaluation of the various cybersecurity strategies that have
ultimately failed over the past twenty years, along with one or two
that have actually worked. It will help executives and security and
compliance professionals understand how cloud computing is a game
changer for them. By the end of this book, you will know how to
measure the effectiveness of your organization's cybersecurity
strategy and the efficacy of the vendors you employ to help you
protect your organization and yourself. What you will learn
Discover cybersecurity strategies and the ingredients critical to
their success Improve vulnerability management by reducing risks
and costs for your organization Learn how malware and other threats
have evolved over the past decade Mitigate internet-based threats,
phishing attacks, and malware distribution sites Weigh the pros and
cons of popular cybersecurity strategies of the past two decades
Implement and then measure the outcome of a cybersecurity strategy
Learn how the cloud provides better security capabilities than
on-premises IT environments Who this book is forThis book is
designed to benefit engineers, leaders, or any professional with
either a responsibility for cyber security within their
organization, or an interest in working in this ever-growing field.
Learn IT security essentials and prepare for the Security+ exam
with this CompTIA exam guide, complete with additional online
resources-including flashcards, PBQs, and mock exams-at
securityplus.training Key Features Written by Ian Neil, one of the
world's top CompTIA Security+ trainers Test your knowledge of
cybersecurity jargon and acronyms with realistic exam questions
Learn about cryptography, encryption, and security policies to
deliver a robust infrastructure Book DescriptionThe CompTIA
Security+ certification validates the fundamental knowledge
required to perform core security functions and pursue a career in
IT security. Authored by Ian Neil, a world-class CompTIA
certification trainer, this book is a best-in-class study guide
that fully covers the CompTIA Security+ 601 exam objectives.
Complete with chapter review questions, realistic mock exams, and
worked solutions, this guide will help you master the core concepts
to pass the exam the first time you take it. With the help of
relevant examples, you'll learn fundamental security concepts from
certificates and encryption to identity and access management
(IAM). As you progress, you'll delve into the important domains of
the exam, including cloud security, threats, attacks and
vulnerabilities, technologies and tools, architecture and design,
risk management, cryptography, and public key infrastructure (PKI).
You can access extra practice materials, including flashcards,
performance-based questions, practical labs, mock exams, key terms
glossary, and exam tips on the author's website at
securityplus.training. By the end of this Security+ book, you'll
have gained the knowledge and understanding to take the CompTIA
exam with confidence. What you will learn Master cybersecurity
fundamentals, from the CIA triad through to IAM Explore cloud
security and techniques used in penetration testing Use different
authentication methods and troubleshoot security issues Secure the
devices and applications used by your company Identify and protect
against various types of malware and viruses Protect yourself
against social engineering and advanced attacks Understand and
implement PKI concepts Delve into secure application development,
deployment, and automation Who this book is forIf you want to take
and pass the CompTIA Security+ SY0-601 exam, even if you are not
from an IT background, this book is for you. You'll also find this
guide useful if you want to become a qualified security
professional. This CompTIA book is also ideal for US Government and
US Department of Defense personnel seeking cybersecurity
certification.
Develop your red team skills by learning essential foundational
tactics, techniques, and procedures, and boost the overall security
posture of your organization by leveraging the homefield advantage
Key Features Build, manage, and measure an offensive red team
program Leverage the homefield advantage to stay ahead of your
adversaries Understand core adversarial tactics and techniques, and
protect pentesters and pentesting assets Book DescriptionIt's now
more important than ever for organizations to be ready to detect
and respond to security events and breaches. Preventive measures
alone are not enough for dealing with adversaries. A well-rounded
prevention, detection, and response program is required. This book
will guide you through the stages of building a red team program,
including strategies and homefield advantage opportunities to boost
security. The book starts by guiding you through establishing,
managing, and measuring a red team program, including effective
ways for sharing results and findings to raise awareness.
Gradually, you'll learn about progressive operations such as
cryptocurrency mining, focused privacy testing, targeting
telemetry, and even blue team tooling. Later, you'll discover
knowledge graphs and how to build them, then become well-versed
with basic to advanced techniques related to hunting for
credentials, and learn to automate Microsoft Office and browsers to
your advantage. Finally, you'll get to grips with protecting assets
using decoys, auditing, and alerting with examples for major
operating systems. By the end of this book, you'll have learned how
to build, manage, and measure a red team program effectively and be
well-versed with the fundamental operational techniques required to
enhance your existing skills. What you will learn Understand the
risks associated with security breaches Implement strategies for
building an effective penetration testing team Map out the
homefield using knowledge graphs Hunt credentials using indexing
and other practical techniques Gain blue team tooling insights to
enhance your red team skills Communicate results and influence
decision makers with appropriate data Who this book is forThis is
one of the few detailed cybersecurity books for penetration
testers, cybersecurity analysts, security leaders and strategists,
as well as red team members and chief information security officers
(CISOs) looking to secure their organizations from adversaries. The
program management part of this book will also be useful for
beginners in the cybersecurity domain. To get the most out of this
book, some penetration testing experience, and software engineering
and debugging skills are necessary.
|
|