|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Secure your Amazon Web Services (AWS) infrastructure with
permission policies, key management, and network security, along
with following cloud security best practices Key Features Explore
useful recipes for implementing robust cloud security solutions on
AWS Monitor your AWS infrastructure and workloads using CloudWatch,
CloudTrail, config, GuardDuty, and Macie Prepare for the AWS
Certified Security-Specialty exam by exploring various security
models and compliance offerings Book DescriptionAs a security
consultant, securing your infrastructure by implementing policies
and following best practices is critical. This cookbook discusses
practical solutions to the most common problems related to
safeguarding infrastructure, covering services and features within
AWS that can help you implement security models such as the CIA
triad (confidentiality, integrity, and availability), and the AAA
triad (authentication, authorization, and availability), along with
non-repudiation. The book begins with IAM and S3 policies and later
gets you up to speed with data security, application security,
monitoring, and compliance. This includes everything from using
firewalls and load balancers to secure endpoints, to leveraging
Cognito for managing users and authentication. Over the course of
this book, you'll learn to use AWS security services such as Config
for monitoring, as well as maintain compliance with GuardDuty,
Macie, and Inspector. Finally, the book covers cloud security best
practices and demonstrates how you can integrate additional
security services such as Glacier Vault Lock and Security Hub to
further strengthen your infrastructure. By the end of this book,
you'll be well versed in the techniques required for securing AWS
deployments, along with having the knowledge to prepare for the AWS
Certified Security - Specialty certification. What you will learn
Create and manage users, groups, roles, and policies across
accounts Use AWS Managed Services for logging, monitoring, and
auditing Check compliance with AWS Managed Services that use
machine learning Provide security and availability for EC2
instances and applications Secure data using symmetric and
asymmetric encryption Manage user pools and identity pools with
federated login Who this book is forIf you are an IT security
professional, cloud security architect, or a cloud application
developer working on security-related roles and are interested in
using AWS infrastructure for secure application deployments, then
this Amazon Web Services book is for you. You will also find this
book useful if you're looking to achieve AWS certification. Prior
knowledge of AWS and cloud computing is required to get the most
out of this book.
This CISA study guide is for those interested in achieving CISA
certification and provides complete coverage of ISACA's latest CISA
Review Manual (2019) with practical examples and over 850
exam-oriented practice questions Key Features Gain tactical skills
in auditing, control, and security to pass the CISA examination Get
up to speed with auditing business IT systems Increase your value
to organizations and be at the forefront of an evolving business
landscape by achieving CISA certification Book DescriptionAre you
looking to prepare for the CISA exam and understand the roles and
responsibilities of an information systems (IS) auditor? The CISA -
Certified Information Systems Auditor Study Guide is here to help
you get started with CISA exam prep. This book covers all the five
CISA domains in detail to help you pass the exam. You'll start by
getting up and running with the practical aspects of an information
systems audit. The book then shows you how to govern and manage IT,
before getting you up to speed with acquiring information systems.
As you progress, you'll gain knowledge of information systems
operations and understand how to maintain business resilience,
which will help you tackle various real-world business problems.
Finally, you'll be able to assist your organization in effectively
protecting and controlling information systems with IT audit
standards. By the end of this CISA book, you'll not only have
covered the essential concepts and techniques you need to know to
pass the CISA certification exam but also have the ability to apply
them in the real world. What you will learn Understand the
information systems auditing process Get to grips with IT
governance and management Gain knowledge of information systems
acquisition Assist your organization in protecting and controlling
information systems with IT audit standards Understand information
systems operations and how to ensure business resilience Evaluate
your organization's security policies, standards, and procedures to
meet its objectives Who this book is forThis CISA exam study guide
is designed for those with a non-technical background who are
interested in achieving CISA certification and are currently
employed or looking to gain employment in IT audit and security
management positions.
Get more from your network by securing its infrastructure and
increasing its effectiveness Key Features Learn to choose the best
network scanning toolset for your system Implement different
concepts of network scanning such as port scanning and OS detection
Adapt a practical approach to securing your network Book
DescriptionNetwork scanning is the process of assessing a network
to identify an active host network; same methods can be used by an
attacker or network administrator for security assessment. This
procedure plays a vital role in risk assessment programs or while
preparing a security plan for your organization. Practical Network
Scanning starts with the concept of network scanning and how
organizations can benefit from it. Then, going forward, we delve
into the different scanning steps, such as service detection,
firewall detection, TCP/IP port detection, and OS detection. We
also implement these concepts using a few of the most prominent
tools on the market, such as Nessus and Nmap. In the concluding
chapters, we prepare a complete vulnerability assessment plan for
your organization. By the end of this book, you will have hands-on
experience in performing network scanning using different tools and
in choosing the best tools for your system. What you will learn
Achieve an effective security posture to design security
architectures Learn vital security aspects before moving to the
Cloud Launch secure applications with Web Application Security and
SQL Injection Explore the basics of threat detection/response/
mitigation with important use cases Learn all about integration
principles for PKI and tips to secure it Design a WAN
infrastructure and ensure security over a public WAN Who this book
is forIf you are a security professional who is responsible for
securing an organization's infrastructure, then this book is for
you.
Take your forensic abilities and investigation skills to the next
level using powerful tools that cater to all aspects of digital
forensic investigations, right from hashing to reporting Key
Features Perform evidence acquisition, preservation, and analysis
using a variety of Kali Linux tools Use PcapXray to perform
timeline analysis of malware and network activity Implement the
concept of cryptographic hashing and imaging using Kali Linux Book
DescriptionKali Linux is a Linux-based distribution that's widely
used for penetration testing and digital forensics. It has a wide
range of tools to help for digital forensics investigations and
incident response mechanisms. This updated second edition of
Digital Forensics with Kali Linux covers the latest version of Kali
Linux and The Sleuth Kit. You'll get to grips with modern
techniques for analysis, extraction, and reporting using advanced
tools such as FTK Imager, hex editor, and Axiom. Updated to cover
digital forensics basics and advancements in the world of modern
forensics, this book will also delve into the domain of operating
systems. Progressing through the chapters, you'll explore various
formats for file storage, including secret hiding places unseen by
the end user or even the operating system. The book will also show
you how to create forensic images of data and maintain integrity
using hashing tools. Finally, you'll cover advanced topics such as
autopsies and acquiring investigation data from networks, operating
system memory, and quantum cryptography. By the end of this book,
you'll have gained hands-on experience of implementing all the
pillars of digital forensics: acquisition, extraction, analysis,
and presentation, all using Kali Linux tools. What you will learn
Get up and running with powerful Kali Linux tools for digital
investigation and analysis Perform internet and memory forensics
with Volatility and Xplico Understand filesystems, storage, and
data fundamentals Become well-versed with incident response
procedures and best practices Perform ransomware analysis using
labs involving actual ransomware Carry out network forensics and
analysis using NetworkMiner and other tools Who this book is
forThis Kali Linux book is for forensics and digital investigators,
security analysts, or anyone interested in learning digital
forensics using Kali Linux. Basic knowledge of Kali Linux will be
helpful to gain a better understanding of the concepts covered.
|
You may like...
Dune: Part 1
Timothee Chalamet, Rebecca Ferguson, …
Blu-ray disc
(4)
R346
Discovery Miles 3 460
|