|
|
Showing 1 - 7 of
7 matches in All Departments
Developing Cybersecurity Programs and Policies is a complete guide
to establishing a cyber security program and governance in your
organization. In this book, you will learn how to create cyber
security policies, standards, procedures, guidelines, and plans-and
the differences among them. You will also learn how threat actors
are launching attacks against their victims-compromising
confidentiality, integrity, and availability of systems and
networks. Santos starts by providing an overview of cybersecurity
policy and governance, and how to create cybersecurity policies and
develop a cybersecurity framework. He then provides details about
governance, risk management, asset management, and data loss
prevention.  Learn how to: Respond to incidents and
ensure continuity of operations Comply with laws and regulations,
including GLBA, HIPAA/HITECH, FISMA, state data security and
notification rules, and PCI DSS Systematically identify,
prioritize, and manage cyber security risks and reduce social
engineering (human) risks with role-based Security Education,
Awareness, and Training (SETA) Incorporate human resources,
physical, and environmental security as important elements of your
cybersecurity program. Implement appropriate security controls in
the cloud, often using automation Understand Identity and Access
Management (IAM) This book includes: Practical, hands-on exercises
related to several key topics to defend various cloud workloads
operating in the different CSP models: Infrastructure as a Service
(IaaS), Platform as a Service (PaaS), Software as a Service (SaaS),
and Functions as a Service (FaaS) Covers NIST Cyber Security
Framework and ISO/IEC 27000-series standards
Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
presents you with an organised test-preparation routine using
proven series elements and techniques. Do I Know This Already?
quizzes open each chapter and enable you to decide how much time
you need to spend on each section. Exam topic lists make
referencing easy. Chapter-ending Exam Preparation Tasks help you
drill on key concepts you must know thoroughly. Master Cisco
CyberOps Associate CBROPS 200-201 exam topics Assess your knowledge
with chapter-opening quizzes Review key concepts with exam
preparation tasks Practice with realistic exam questions in the
practice test software Cisco CyberOps Associate CBROPS 200-201
Official Cert Guide from Cisco Press enables you to succeed on the
exam the first time and is the only self-study resource approved by
Cisco. Leading Cisco technology expert Omar Santos shares
preparation hints and test-taking tips, helping you identify areas
of weakness and improve both your conceptual knowledge and hands-on
skills. This complete study package includes A test-preparation
routine proven to help you pass the exam Do I Know This Already?
quizzes, which enable you to decide how much time you need to spend
on each section Chapter-ending exercises, which help you drill on
key concepts you must know thoroughly The powerful Pearson Test
Prep Practice Test software, with two full exams comprised of
well-reviewed, exam-realistic questions, customization options, and
detailed performance reports A video mentoring lesson from the
authors Complete Video Course A final preparation chapter, which
guides you through tools and resources to help you craft your
review and test-taking strategies Study plan suggestions and
templates to help you organise and optimise your study time
Trust the best-selling Official Cert Guide series from Cisco Press
to help you learn, prepare, and practice for exam success. They are
built with the objective of providing assessment, review, and
practice to help ensure you are fully prepared for your
certification exam. CCNP and CCIE Security Core SCOR 350-701
Official Cert Guide presents you with an organized test preparation
routine using proven series elements and techniques. "Do I Know
This Already?" quizzes open each chapter and allow you to decide
how much time you need to spend on each section. Exam topic lists
make referencing easy. Chapter-ending Exam Preparation Tasks help
you drill on key concepts you must know thoroughly. Master Cisco
CCNP and CCIE Security Core SCOR 350-701 exam topics Assess your
knowledge with chapter-opening quizzes Review key concepts with
exam preparation tasks Practice with realistic exam questions in
the practice test software CCNP and CCIE Security Core SCOR 350-701
Official Cert Guide, from Cisco Press allows you to succeed on the
exam the first time and is the only self-study resource approved by
Cisco. Best-selling author and leading security engineer Omar
Santos shares preparation hints and test-taking tips, helping you
identify areas of weakness and improve both your conceptual
knowledge and hands-on skills. This complete study package includes
A test-preparation routine proven to help you pass the exams Do I
Know This Already? quizzes, which allow you to decide how much time
you need to spend on each section Chapter-ending and part-ending
exercises, which help you drill on key concepts you must know
thoroughly The powerful Pearson Test Prep Practice Test software,
complete with 200 well-reviewed, exam-realistic questions,
customization options, and detailed performance reports More than
an hour of video mentoring from the author A final preparation
chapter, which guides you through tools and resources to help you
craft your review and test-taking strategies Study plan suggestions
and templates to help you organize and optimize your study time
Well regarded for its level of detail, study plans, assessment
features, challenging review questions and exercises, and video
instruction, this official study guide helps you master the
concepts and techniques that ensure your exam success. This
official study guide helps you master all the topics on the CCNP
and CCIE Security SCOR 350-701 exam, including Cybersecurity
fundamentals Cryptography Software-Defined Networking security and
network programmability Authentication, Authorization, Accounting
(AAA) and Identity Management Network visibility and segmentation
Infrastructure security Cisco next-generation firewalls and
intrusion prevention systems Virtual Private Networks (VPNs)
Securing the cloud Content security Endpoint protection and
detection Omar Santos, an active member of the cybersecurity
community, leads several industry-wide initiatives and technology
standard bodies. As Principal Engineer of the Cisco Product
Security Incident Response Team (PSIRT), he mentors and leads
engineers and incident managers in investigating and resolving
security vulnerabilities. He has authored dozens of books, video
courses, white papers, articles, security configuration guidelines,
and best practices. He has been a featured speaker in many
cybersecurity conferences around the world. Companion Website: The
companion website contains 200 practice exam questions and
exercises, more than an hour of video training, and much more.
Includes Exclusive Offers For Up to 80% Off Video Training,
Practice Tests, and more Pearson Test Prep online system
requirements: Browsers: Chrome version 73 and above; Safari version
12 and above; Microsoft Edge 44 and above. Devices: Desktop and
laptop computers, tablets running on Android v8.0 and iOS v13,
smartphones with a minimum screen size of 4.7". Internet access
required. Pearson Test Prep offline system requirements: Windows
10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class
1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus
50 MB for each downloaded practice exam; access to the Internet to
register and download exam databases Also available from Cisco
Press for Cisco CCNP and CCIE Security study is the CCNP and CCIE
Security Core SCOR 350-701 Official Cert Guide Premium Edition
eBook and Practice Test. This digital-only certification
preparation product combines an eBook with enhanced Pearson Test
Prep Practice Test. This integrated learning package: Allows you to
focus on individual topic areas or take complete, timed exams
Includes direct links from each question to detailed tutorials to
help you understand the concepts behind the questions Provides
unique sets of exam-realistic practice questions Tracks your
performance and provides feedback on a module-by-module basis,
laying out a complete assessment of your knowledge to help you
focus your study where it is needed most
All the Knowledge You Need to Build Cybersecurity Programs and
Policies That Work Clearly presents best practices, governance
frameworks, and key standards Includes focused coverage of
healthcare, finance, and PCI DSS compliance An essential and
invaluable guide for leaders, managers, and technical professionals
Today, cyberattacks can place entire organizations at risk.
Cybersecurity can no longer be delegated to specialists: success
requires everyone to work together, from leaders on down.
Developing Cybersecurity Programs and Policies offers
start-to-finish guidance for establishing effective cybersecurity
in any organization. Drawing on more than 20 years of real-world
experience, Omar Santos presents realistic best practices for
defining policy and governance, ensuring compliance, and
collaborating to harden the entire organization. First, Santos
shows how to develop workable cybersecurity policies and an
effective framework for governing them. Next, he addresses risk
management, asset management, and data loss prevention, showing how
to align functions from HR to physical security. You'll discover
best practices for securing communications, operations, and access;
acquiring, developing, and maintaining technology; and responding
to incidents. Santos concludes with detailed coverage of compliance
in finance and healthcare, the crucial Payment Card Industry Data
Security Standard (PCI DSS) standard, and the NIST Cybersecurity
Framework. Whatever your current responsibilities, this guide will
help you plan, manage, and lead cybersecurity-and safeguard all the
assets that matter. Learn How To * Establish cybersecurity policies
and governance that serve your organization's needs * Integrate
cybersecurity program components into a coherent framework for
action * Assess, prioritize, and manage security risk throughout
the organization * Manage assets and prevent data loss * Work with
HR to address human factors in cybersecurity * Harden your
facilities and physical environment * Design effective policies for
securing communications, operations, and access * Strengthen
security throughout the information systems lifecycle * Plan for
quick, effective incident response and ensure business continuity *
Comply with rigorous regulations in finance and healthcare * Plan
for PCI compliance to safely process payments * Explore and apply
the guidance provided by the NIST Cybersecurity Framework
In this best-of-breed study guide, leading experts Michael Gregg
and Omar Santos help you master all the topics you need to know to
succeed on your Certified Ethical Hacker exam and advance your
career in IT security. The authors' concise, focused approach
explains every exam objective from a real-world perspective,
helping you quickly identify weaknesses and retain everything you
need to know. Every feature of this book supports both efficient
exam preparation and long-term mastery: * Opening topics lists
identify the topics you need to learn in each chapter and list
EC-Council's official exam objectives * Key Topics figures, tables,
and lists call attention to the information that's most crucial for
exam success * Exam Preparation Tasks enable you to review key
topics, define key terms, work through scenarios, and answer review
questions...going beyond mere facts to master the concepts that are
crucial to passing the exam and enhancing your career * Key Terms
are listed in each chapter and defined in a complete glossary,
explaining all the field's essential terminology This study guide
helps you master all the topics on the latest CEH exam, including *
Ethical hacking basics * Technical foundations of hacking *
Footprinting and scanning * Enumeration and system hacking * Social
engineering, malware threats, and vulnerability analysis *
Sniffers, session hijacking, and denial of service * Web server
hacking, web applications, and database attacks * Wireless
technologies, mobile security, and mobile attacks * IDS, firewalls,
and honeypots * Cryptographic attacks and defenses * Cloud
computing, IoT, and botnets
Cisco (R) ASA All-in-One Next-Generation Firewall, IPS, and VPN
Services, Third Edition Identify, mitigate, and respond to today's
highly-sophisticated network attacks. Today, network attackers are
far more sophisticated, relentless, and dangerous. In response,
Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN
Services has been fully updated to cover the newest techniques and
Cisco technologies for maximizing end-to-end security in your
environment. Three leading Cisco security experts guide you through
every step of creating a complete security plan with Cisco ASA, and
then deploying, configuring, operating, and troubleshooting your
solution. Fully updated for today's newest ASA releases, this
edition adds new coverage of ASA 5500-X, ASA 5585-X, ASA Services
Module, ASA next-generation firewall services, EtherChannel, Global
ACLs, clustering, IPv6 improvements, IKEv2, AnyConnect Secure
Mobility VPN clients, and more. The authors explain significant
recent licensing changes; introduce enhancements to ASA IPS; and
walk you through configuring IPsec, SSL VPN, and NAT/PAT. You'll
learn how to apply Cisco ASA adaptive identification and mitigation
services to systematically strengthen security in network
environments of all sizes and types. The authors present up-to-date
sample configurations, proven design scenarios, and actual debugs-
all designed to help you make the most of Cisco ASA in your rapidly
evolving network. Jazib Frahim, CCIE (R) No. 5459 (Routing and
Switching; Security), Principal Engineer in the Global Security
Solutions team, guides top-tier Cisco customers in security-focused
network design and implementation. He architects, develops, and
launches new security services concepts. His books include Cisco
SSL VPN Solutions and Cisco Network Admission Control, Volume II:
NAC Deployment and Troubleshooting. Omar Santos, CISSP No. 463598,
Cisco Product Security Incident Response Team (PSIRT) technical
leader, leads and mentors engineers and incident managers in
investigating and resolving vulnerabilities in Cisco products and
protecting Cisco customers. Through 18 years in IT and
cybersecurity, he has designed, implemented, and supported numerous
secure networks for Fortune (R) 500 companies and the U.S.
government. He is also the author of several other books and
numerous whitepapers and articles. Andrew Ossipov, CCIE (R) No.
18483 and CISSP No. 344324, is a Cisco Technical Marketing Engineer
focused on firewalls, intrusion prevention, and data center
security. Drawing on more than 16 years in networking, he works to
solve complex customer technical problems, architect new features
and products, and define future directions for Cisco's product
portfolio. He holds several pending patents. Understand, install,
configure, license, maintain, and troubleshoot the newest ASA
devices Efficiently implement Authentication, Authorization, and
Accounting (AAA) services Control and provision network access with
packet filtering, context-aware Cisco ASA next-generation firewall
services, and new NAT/PAT concepts Configure IP routing,
application inspection, and QoS Create firewall contexts with
unique configurations, interfaces, policies, routing tables, and
administration Enable integrated protection against many types of
malware and advanced persistent threats (APTs) via Cisco Cloud Web
Security and Cisco Security Intelligence Operations (SIO) Implement
high availability with failover and elastic scalability with
clustering Deploy, troubleshoot, monitor, tune, and manage
Intrusion Prevention System (IPS) features Implement site-to-site
IPsec VPNs and all forms of remote-access VPNs (IPsec, clientless
SSL, and client-based SSL) Configure and troubleshoot Public Key
Infrastructure (PKI) Use IKEv2 to more effectively resist attacks
against VPNs Leverage IPv6 support for IPS, packet inspection,
transparent firewalls, and site-to-site IPsec VPNs
A comprehensive guide for deploying, configuring, and
troubleshooting NetFlow and learning big data analytics
technologies for cyber security Today's world of network security
is full of cyber security vulnerabilities, incidents, breaches, and
many headaches. Visibility into the network is an indispensable
tool for network and security professionals and Cisco NetFlow
creates an environment where network administrators and security
professionals have the tools to understand who, what, when, where,
and how network traffic is flowing. Network Security with NetFlow
and IPFIX is a key resource for introducing yourself to and
understanding the power behind the Cisco NetFlow solution. Omar
Santos, a Cisco Product Security Incident Response Team (PSIRT)
technical leader and author of numerous books including the CCNA
Security 210-260 Official Cert Guide, details the importance of
NetFlow and demonstrates how it can be used by large enterprises
and small-to-medium-sized businesses to meet critical network
challenges. This book also examines NetFlow's potential as a
powerful network security tool. Network Security with NetFlow and
IPFIX explores everything you need to know to fully understand and
implement the Cisco Cyber Threat Defense Solution. It also provides
detailed configuration and troubleshooting guidance, sample
configurations with depth analysis of design scenarios in every
chapter, and detailed case studies with real-life scenarios. You
can follow Omar on Twitter: @santosomar NetFlow and IPFIX basics
Cisco NetFlow versions and features Cisco Flexible NetFlow NetFlow
Commercial and Open Source Software Packages Big Data Analytics
tools and technologies such as Hadoop, Flume, Kafka, Storm, Hive,
HBase, Elasticsearch, Logstash, Kibana (ELK) Additional Telemetry
Sources for Big Data Analytics for Cyber Security Understanding big
data scalability Big data analytics in the Internet of everything
Cisco Cyber Threat Defense and NetFlow Troubleshooting NetFlow
Real-world case studies
|
|