Know how to set up, defend, and attack computer networks with this
revised and expanded second edition. You will learn to configure
your network from the ground up, beginning with developing your own
private virtual test environment, then setting up your own DNS
server and AD infrastructure. You will continue with more advanced
network services, web servers, and database servers and you will
end by building your own web applications servers, including
WordPress and Joomla!. Systems from 2011 through 2017 are covered,
including Windows 7, Windows 8, Windows 10, Windows Server 2012,
and Windows Server 2016 as well as a range of Linux distributions,
including Ubuntu, CentOS, Mint, and OpenSUSE. Key defensive
techniques are integrated throughout and you will develop
situational awareness of your network and build a complete
defensive infrastructure, including log servers, network firewalls,
web application firewalls, and intrusion detection systems.Of
course, you cannot truly understand how to defend a network if you
do not know how to attack it, so you will attack your test systems
in a variety of ways. You will learn about Metasploit, browser
attacks, privilege escalation, pass-the-hash attacks, malware,
man-in-the-middle attacks, database attacks, and web application
attacks. What You'll Learn Construct a testing laboratory to
experiment with software and attack techniques Build realistic
networks that include active directory, file servers, databases,
web servers, and web applications such as WordPress and Joomla!
Manage networks remotely with tools, including PowerShell, WMI, and
WinRM Use offensive tools such as Metasploit, Mimikatz, Veil, Burp
Suite, and John the Ripper Exploit networks starting from malware
and initial intrusion to privilege escalation through password
cracking and persistence mechanisms Defend networks by developing
operational awareness using auditd and Sysmon to analyze logs, and
deploying defensive tools such as the Snort intrusion detection
system, IPFire firewalls, and ModSecurity web application firewalls
Who This Book Is For This study guide is intended for everyone
involved in or interested in cybersecurity operations (e.g.,
cybersecurity professionals, IT professionals, business
professionals, and students)
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!