|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
Build your organization's cyber defense system by effectively
implementing digital forensics and incident management techniques
Key Features Create a solid incident response framework and manage
cyber incidents effectively Perform malware analysis for effective
incident response Explore real-life scenarios that effectively use
threat intelligence and modeling techniques Book DescriptionAn
understanding of how digital forensics integrates with the overall
response to cybersecurity incidents is key to securing your
organization's infrastructure from attacks. This updated second
edition will help you perform cutting-edge digital forensic
activities and incident response. After focusing on the
fundamentals of incident response that are critical to any
information security team, you'll move on to exploring the incident
response framework. From understanding its importance to creating a
swift and effective response to security incidents, the book will
guide you with the help of useful examples. You'll later get up to
speed with digital forensic techniques, from acquiring evidence and
examining volatile memory through to hard drive examination and
network-based evidence. As you progress, you'll discover the role
that threat intelligence plays in the incident response process.
You'll also learn how to prepare an incident response report that
documents the findings of your analysis. Finally, in addition to
various incident response activities, the book will address malware
analysis, and demonstrate how you can proactively use your digital
forensic skills in threat hunting. By the end of this book, you'll
have learned how to efficiently investigate and report unwanted
security breaches and incidents in your organization. What you will
learn Create and deploy an incident response capability within your
own organization Perform proper evidence acquisition and handling
Analyze the evidence collected and determine the root cause of a
security incident Become well-versed with memory and log analysis
Integrate digital forensic techniques and procedures into the
overall incident response process Understand the different
techniques for threat hunting Write effective incident reports that
document the key findings of your analysis Who this book is forThis
book is for cybersecurity and information security professionals
who want to implement digital forensics and incident response in
their organization. You will also find the book helpful if you are
new to the concept of digital forensics and are looking to get
started with the fundamentals. A basic understanding of operating
systems and some knowledge of networking fundamentals are required
to get started with this book.
Plug the gaps in your network's infrastructure with resilient
network security models Key Features Develop a cost-effective and
end-to-end vulnerability management program Explore best practices
for vulnerability scanning and risk assessment Understand and
implement network enumeration with Nessus and Network Mapper (Nmap)
Book DescriptionDigitization drives technology today, which is why
it's so important for organizations to design security mechanisms
for their network infrastructures. Analyzing vulnerabilities is one
of the best ways to secure your network infrastructure. This
Learning Path begins by introducing you to the various concepts of
network security assessment, workflows, and architectures. You will
learn to employ open source tools to perform both active and
passive network scanning and use these results to analyze and
design a threat model for network security. With a firm
understanding of the basics, you will then explore how to use
Nessus and Nmap to scan your network for vulnerabilities and open
ports and gain back door entry into a network. As you progress
through the chapters, you will gain insights into how to carry out
various key scanning tasks, including firewall detection, OS
detection, and access management to detect vulnerabilities in your
network. By the end of this Learning Path, you will be familiar
with the tools you need for network scanning and techniques for
vulnerability scanning and network protection. This Learning Path
includes content from the following Packt books: Network Scanning
Cookbook by Sairam Jetty Network Vulnerability Assessment by Sagar
Rahalkar What you will learn Explore various standards and
frameworks for vulnerability assessments and penetration testing
Gain insight into vulnerability scoring and reporting Discover the
importance of patching and security hardening Develop metrics to
measure the success of a vulnerability management program Perform
configuration audits for various platforms using Nessus Write
custom Nessus and Nmap scripts on your own Install and configure
Nmap and Nessus in your network infrastructure Perform host
discovery to identify network devices Who this book is forThis
Learning Path is designed for security analysts, threat analysts,
and security professionals responsible for developing a network
threat model for an organization. Professionals who want to be part
of a vulnerability management team and implement an end-to-end
robust vulnerability management program will also find this
Learning Path useful.
Explore open-source Linux tools and advanced binary analysis
techniques to analyze malware, identify vulnerabilities in code,
and mitigate information security risks Key Features Adopt a
methodological approach to binary ELF analysis on Linux Learn how
to disassemble binaries and understand disassembled code Discover
how and when to patch a malicious binary during analysis Book
DescriptionBinary analysis is the process of examining a binary
program to determine information security actions. It is a complex,
constantly evolving, and challenging topic that crosses over into
several domains of information technology and security. This binary
analysis book is designed to help you get started with the basics,
before gradually advancing to challenging topics. Using a
recipe-based approach, this book guides you through building a lab
of virtual machines and installing tools to analyze binaries
effectively. You'll begin by learning about the IA32 and ELF32 as
well as IA64 and ELF64 specifications. The book will then guide you
in developing a methodology and exploring a variety of tools for
Linux binary analysis. As you advance, you'll learn how to analyze
malicious 32-bit and 64-bit binaries and identify vulnerabilities.
You'll even examine obfuscation and anti-analysis techniques,
analyze polymorphed malicious binaries, and get a high-level
overview of dynamic taint analysis and binary instrumentation
concepts. By the end of the book, you'll have gained comprehensive
insights into binary analysis concepts and have developed the
foundational skills to confidently delve into the realm of binary
analysis. What you will learn Traverse the IA32, IA64, and ELF
specifications Explore Linux tools to disassemble ELF binaries
Identify vulnerabilities in 32-bit and 64-bit binaries Discover
actionable solutions to overcome the limitations in analyzing ELF
binaries Interpret the output of Linux tools to identify security
risks in binaries Understand how dynamic taint analysis works Who
this book is forThis book is for anyone looking to learn how to
dissect ELF binaries using open-source tools available in Linux. If
you're a Linux system administrator or information security
professional, you'll find this guide useful. Basic knowledge of
Linux, familiarity with virtualization technologies and the working
of network sockets, and experience in basic Python or Bash
scripting will assist you with understanding the concepts in this
book
Conversations in Cyberspace is a collection of insights on the
current state of security and privacy in the Internet world. The
book contains a brief introduction to some of the most used
open-source intelligence (OSINT) tools and a selection of
interviews with some of the key figures in industrial control
systems (ICS), advanced persistent threat (APT) and online/deep web
members organizations. It aims to be an introduction to the
relationships between security, OSINT and the vast and complex
world hiding in the deep web. The information provided will be
beneficial to security professionals and system administrators
interested in exploring today's concerns in database design,
privacy and security-by-design, and deep web members organizations,
including Cicada 3301, the Unknowns, Anonymous, and more.
Master the art of penetration testing with Metasploit Framework in
7 days About This Book * A fast-paced guide that will quickly
enhance your penetration testing skills in just 7 days * Carry out
penetration testing in complex and highly-secured environments. *
Learn techniques to Integrate Metasploit with industry's leading
tools Who This Book Is For If you are a penetration tester, ethical
hacker, or security consultant who quickly wants to master the
Metasploit framework and carry out advanced penetration testing in
highly secured environments then, this book is for you. What You
Will Learn * Get hands-on knowledge of Metasploit * Perform
penetration testing on services like Databases, VOIP and much more
* Understand how to Customize Metasploit modules and modify
existing exploits * Write simple yet powerful Metasploit automation
scripts * Explore steps involved in post-exploitation on Android
and mobile platforms. In Detail The book starts with a hands-on Day
1 chapter, covering the basics of the Metasploit framework and
preparing the readers for a self-completion exercise at the end of
every chapter. The Day 2 chapter dives deep into the use of
scanning and fingerprinting services with Metasploit while helping
the readers to modify existing modules according to their needs.
Following on from the previous chapter, Day 3 will focus on
exploiting various types of service and client-side exploitation
while Day 4 will focus on post-exploitation, and writing quick
scripts that helps with gathering the required information from the
exploited systems. The Day 5 chapter presents the reader with the
techniques involved in scanning and exploiting various services,
such as databases, mobile devices, and VOIP. The Day 6 chapter
prepares the reader to speed up and integrate Metasploit with
leading industry tools for penetration testing. Finally, Day 7
brings in sophisticated attack vectors and challenges based on the
user's preparation over the past six days and ends with a
Metasploit challenge to solve. Style and approach This book is all
about fast and intensive learning. That means we don't waste time
in helping readers get started. The new content is basically about
filling in with highly-effective examples to build new things, show
solving problems in newer and unseen ways, and solve real-world
examples.
|
You may like...
Redeemed
Lauren Asher
Paperback
R295
R264
Discovery Miles 2 640
Bloodshed
Molly Doyle
Hardcover
R865
R761
Discovery Miles 7 610
|