|
Showing 1 - 13 of
13 matches in All Departments
Prepare for Microsoft Exam SC-200-and help demonstrate your
real-world mastery of skills and knowledge required to work with
stakeholders to secure IT systems, and to rapidly remediate active
attacks. Designed for Windows administrators, Exam Ref focuses on
the critical thinking and decision-making acumen needed for success
at the Microsoft Certified Associate level. Focus on the expertise
measured by these objectives: Mitigate threats using Microsoft 365
Defender Mitigate threats using Azure Defender Mitigate threats
using Azure Sentinel This Microsoft Exam Ref: Organizes its
coverage by exam objectives Features strategic, what-if scenarios
to challenge you Assumes you have experience with threat
management, monitoring, and/or response in Microsoft 365
environments About the Exam Exam SC-200 focuses on knowledge needed
to detect, investigate, respond, and remediate threats to
productivity, endpoints, identity, and applications; design and
configure Azure Defender implementations; plan and use data
connectors to ingest data sources into Azure Defender and Azure
Sentinel; manage Azure Defender alert rules; configure automation
and remediation; investigate alerts and incidents; design and
configure Azure Sentinel workspaces; manage Azure Sentinel rules
and incidents; configure SOAR in Azure Sentinel; use workbooks to
analyze and interpret data; and hunt for threats in the Azure
Sentinel portal. About Microsoft Certification Passing this exam
fulfills your requirements for the Microsoft 365 Certified:
Security Operations Analyst Associate certification credential,
demonstrating your ability to collaborate with organizational
stakeholders to reduce organizational risk, advise on threat
protection improvements, and address violations of organizational
policies. See full details at: microsoft.com/learn
This book will explore some of the main problems of existing in a
technologically advanced world that is built for ease and
efficiency while our bodies are built for stamina and endurance.
The book will further examine how this can negatively impact a
person's livelihood as well as work performance. It will then delve
into the important reasons for change in one's eating and
exercising habits and will provide tips and suggestions on how to
embrace this change and to be successful within a fast-paced
environment. This book is not the typical "90-day" or "quick and
easy" approach to fat loss. Instead, the focus will be centered on
longevity and consistency for one's personal fitness lifestyle.
The definitive practical guide to Microsoft Defender for Cloud
covering new components and multi-cloud enhancements! Microsoft
Defender for Cloud offers comprehensive tools for hardening
resources, tracking security posture, protecting against attacks,
and streamlining security management - all in one natively
integrated toolset. Now, leading Microsoft security experts Yuri
Diogenes and Tom Janetscheck help you apply its robust protection,
detection, and response capabilities throughout your operations,
protecting workloads running on all your cloud, hybrid, and
on-premises platforms. This guide shows how to make the most of new
components, enhancements, and deployment scenarios, as you address
today's latest threat vectors. Sharing best practices, expert tips,
and optimizations only available from Microsoft's Defender for
Cloud team, the authors walk through improving everything from
policies and governance to incident response and risk management.
Whatever your role or experience, they'll help you address new
security challenges far more effectively-and save hours, days, or
even weeks. Two of Microsoft's leading cloud security experts show
how to: Assess new threat landscapes, the MITRE ATT&CK
framework, and the implications of ''assume-breach'' Explore
Defender for Cloud architecture, use cases, and adoption
considerations including multicloud with AWS and GCP Plan for
effective governance, successful onboarding, and maximum value
Fully visualize complex cloud estates and systematically reduce
their attack surfaces Prioritize risks with Secure Score, and
leverage at-scale tools to build secure cloud-native apps Establish
consistent policy enforcement to avoid drift Use advanced analytics
and machine learning to identify attacks based on signals from all
cloud workloads Enhance security posture by integrating with the
Microsoft Sentinel SIEM/SOAR, Microsoft Purview, and Microsoft
Defender for Endpoint Leverage just-in-time VM access and other
enhanced security capabilities About This Book For architects,
designers, implementers, SecOps professionals, developers, and
security specialists working in Microsoft Azure environments For
all IT professionals and decision-makers concerned with securing
modern hybrid/multicloud environments, cloud-native apps, and PaaS
services
Implement maximum control, security, and compliance processes in
Azure cloud environments In Microsoft Azure Security
Infrastructure, three leading experts show how to plan, deploy, and
operate Microsoft Azure with outstanding levels of control,
security, and compliance. You'll learn how to prepare
infrastructure with Microsoft's integrated tools, prebuilt
templates, and managed services-and use these to help safely build
and manage any enterprise, mobile, web, or Internet of Things (IoT)
system. The authors guide you through enforcing, managing, and
verifying robust security at physical, network, host, application,
and data layers. You'll learn best practices for security-aware
deployment, operational management, threat mitigation, and
continuous improvement-so you can help protect all your data, make
services resilient to attack, and stay in control no matter how
your cloud systems evolve. Three Microsoft Azure experts show you
how to: * Understand cloud security boundaries and responsibilities
* Plan for compliance, risk management, identity/access management,
operational security, and endpoint and data protection * Explore
Azure's defense-in-depth security architecture * Use Azure network
security patterns and best practices * Help safeguard data via
encryption, storage redundancy, rights management, database
security, and storage security * Help protect virtual machines with
Microsoft Antimalware for Azure Cloud Services and Virtual Machines
* Use the Microsoft Azure Key Vault service to help secure
cryptographic keys and other confidential information * Monitor and
help protect Azure and on-premises resources with Azure Security
Center and Operations Management Suite * Effectively model threats
and plan protection for IoT systems * Use Azure security tools for
operations, incident response, and forensic investigation
Prepare for Microsoft Exam AZ-500: Demonstrate your real-world
knowledge of Microsoft Azure security, including tools and
techniques for protecting identity, access, platforms, data, and
applications, and for effectively managing security operations.
Designed for professionals with Azure security experience, this
Exam Ref focuses on the critical thinking and decision-making
acumen needed for success at the Microsoft Certified: Azure
Security Engineer Associate level. Focus on the expertise measured
by these objectives: Manage identity and access Implement platform
protection Manage security operations Secure data and applications
This Microsoft Exam Ref: Organizes its coverage by exam objectives
Features strategic, what-if scenarios to challenge you Assumes you
have expertise implementing security controls and threat
protection, managing identity and access, and protecting assets in
cloud and hybrid environments About the Exam Exam AZ-500 focuses on
the knowledge needed to manage Azure Active Directory identities;
configure secure access with Azure AD; manage application access
and access control; implement advanced network security; configure
advanced security for compute; monitor security with Azure Monitor,
Azure Firewall manager, Azure Security Center, Azure Defender, and
Azure Sentinel; configure security policies; configure security for
storage and databases; and configure and manage Key Vault. About
Microsoft Certification Passing this exam fulfills your
requirements for the Microsoft Certified: Azure Security Engineer
Associate credential, demonstrating your expertise as an Azure
Security Engineer capable of maintaining security posture,
identifying and remediating vulnerabilities, implementing threat
protection, and responding to incident escalations as part of a
cloud-based management and security team. See full details at:
microsoft.com/learn
Build next-generation security operations with Microsoft Sentinel
Microsoft Sentinel is the scalable, cloud-native, security
information and event management (SIEM) solution for automating and
streamlining threat identification and response across your
enterprise. Now, three leading experts guide you step-by-step
through planning, deployment, and operations, helping you use
Microsoft Sentinel to escape the complexity and scalability
challenges of traditional solutions. Fully updated for the latest
enhancements, this edition introduces new use cases for
investigation, hunting, automation, and orchestration across your
enterprise and all your clouds. The authors clearly introduce each
service, concisely explain all new concepts, and present proven
best practices for maximizing Microsoft Sentinel's value throughout
security operations. Three of Microsoft's leading security
operations experts show how to: Review emerging challenges that
make better cyberdefense an urgent priority See how Microsoft
Sentinel responds by unifying alert detection, threat visibility,
proactive hunting, and threat response Explore components,
architecture, design, and initial configuration Ingest alerts and
raw logs from all sources you need to monitor Define and validate
rules that prevent alert fatigue Use threat intelligence, machine
learning, and automation to triage issues and focus on high-value
tasks Add context with User and Entity Behavior Analytics (UEBA)
and Watchlists Hunt sophisticated new threats to disrupt cyber kill
chains before you're exploited Enrich incident management and
threat hunting with Jupyter notebooks Use Playbooks to automate
more incident handling and investigation tasks Create
visualizations to spot trends, clarify relationships, and speed
decisions Simplify integration with point-and-click data connectors
that provide normalization, detection rules, queries, and Workbooks
About This Book For cybersecurity analysts, security
administrators, threat hunters, support professionals, engineers,
and other IT professionals concerned with security operations For
both Microsoft Azure and non-Azure users at all levels of
experience
Prepare for Microsoft Exam AZ-500: Demonstrate your real-world
knowledge of Microsoft Azure security, including tools and
techniques for protecting identity, access, platforms, data, and
applications, and for effectively managing security operations.
Designed for professionals with Azure security experience, this
Exam Ref focuses on the critical thinking and decision-making
acumen needed for success at the Microsoft Certified: Azure
Security Engineer Associate level. Focus on the expertise measured
by these objectives: * Manage identity and access * Implement
platform protection * Manage security operations * Secure data and
applications This Microsoft Exam Ref: * Organizes its coverage by
exam objectives * Features strategic, what-if scenarios to
challenge you * Assumes you have expertise implementing security
controls and threat protection, managing identity and access, and
protecting assets in cloud and hybrid environments About the Exam
Exam AZ-500 focuses on the knowledge needed to manage Azure Active
Directory identities; configure secure access with Azure AD; manage
application access and access control; implement advanced network
security; configure advanced security for compute; monitor security
with Azure Monitor, Azure Firewall manager, Azure Security Center,
Azure Defender, and Azure Sentinel; configure security policies;
configure security for storage and databases; and configure and
manage Key Vault. About Microsoft Certification Passing this exam
fulfills your requirements for the Microsoft Certified: Azure
Security Engineer Associate credential, demonstrating your
expertise as an Azure Security Engineer capable of maintaining
security posture, identifying and remediating vulnerabilities,
implementing threat protection, and responding to incident
escalations as part of a cloud-based management and security team.
See full details at: microsoft.com/learn
Updated edition of the bestselling guide for planning attack and
defense strategies based on the current threat landscape Key
Features Updated for ransomware prevention, security posture
management in multi-cloud, Microsoft Defender for Cloud, MITRE
ATT&CK Framework, and more Explore the latest tools for ethical
hacking, pentesting, and Red/Blue teaming Includes recent
real-world examples to illustrate the best practices to improve
security posture Book DescriptionCybersecurity - Attack and Defense
Strategies, Third Edition will bring you up to speed with the key
aspects of threat assessment and security hygiene, the current
threat landscape and its challenges, and how to maintain a strong
security posture. In this carefully revised new edition, you will
learn about the Zero Trust approach and the initial Incident
Response process. You will gradually become familiar with Red Team
tactics, where you will learn basic syntax for commonly used tools
to perform the necessary operations. You will also learn how to
apply newer Red Team techniques with powerful tools.
Simultaneously, Blue Team tactics are introduced to help you defend
your system from complex cyber-attacks. This book provides a clear,
in-depth understanding of attack/defense methods as well as
patterns to recognize irregular behavior within your organization.
Finally, you will learn how to analyze your network and address
malware, while becoming familiar with mitigation and threat
detection techniques. By the end of this cybersecurity book, you
will have discovered the latest tools to enhance the security of
your system, learned about the security controls you need, and
understood how to carry out each step of the incident response
process. What you will learn Learn to mitigate, recover from, and
prevent future cybersecurity events Understand security hygiene and
value of prioritizing protection of your workloads Explore physical
and virtual network segmentation, cloud network visibility, and
Zero Trust considerations Adopt new methods to gather cyber
intelligence, identify risk, and demonstrate impact with Red/Blue
Team strategies Explore legendary tools such as Nmap and Metasploit
to supercharge your Red Team Discover identity security and how to
perform policy enforcement Integrate threat detection systems into
your SIEM solutions Discover the MITRE ATT&CK Framework and
open-source tools to gather intelligence Who this book is forIf you
are an IT security professional who wants to venture deeper into
cybersecurity domains, this book is for you. Cloud security
administrators, IT pentesters, security consultants, and ethical
hackers will also find this book useful. Basic understanding of
operating systems, computer networking, and web applications will
be helpful.
Updated and revised edition of the bestselling guide to developing
defense strategies against the latest threats to cybersecurity Key
Features Covers the latest security threats and defense strategies
for 2020 Introduces techniques and skillsets required to conduct
threat hunting and deal with a system breach Provides new
information on Cloud Security Posture Management, Microsoft Azure
Threat Protection, Zero Trust Network strategies, Nation State
attacks, the use of Azure Sentinel as a cloud-based SIEM for
logging and investigation, and much more Book
DescriptionCybersecurity - Attack and Defense Strategies, Second
Edition is a completely revised new edition of the bestselling
book, covering the very latest security threats and defense
mechanisms including a detailed overview of Cloud Security Posture
Management (CSPM) and an assessment of the current threat
landscape, with additional focus on new IoT threats and
cryptomining. Cybersecurity starts with the basics that
organizations need to know to maintain a secure posture against
outside threat and design a robust cybersecurity program. It takes
you into the mindset of a Threat Actor to help you better
understand the motivation and the steps of performing an actual
attack - the Cybersecurity kill chain. You will gain hands-on
experience in implementing cybersecurity using new techniques in
reconnaissance and chasing a user's identity that will enable you
to discover how a system is compromised, and identify and then
exploit the vulnerabilities in your own system. This book also
focuses on defense strategies to enhance the security of a system.
You will also discover in-depth tools, including Azure Sentinel, to
ensure there are security controls in each network layer, and how
to carry out the recovery process of a compromised system. What you
will learn The importance of having a solid foundation for your
security posture Use cyber security kill chain to understand the
attack strategy Boost your organization's cyber resilience by
improving your security policies, hardening your network,
implementing active sensors, and leveraging threat intelligence
Utilize the latest defense tools, including Azure Sentinel and Zero
Trust Network strategy Identify different types of cyberattacks,
such as SQL injection, malware and social engineering threats such
as phishing emails Perform an incident investigation using Azure
Security Center and Azure Sentinel Get an in-depth understanding of
the disaster recovery process Understand how to consistently
monitor security and implement a vulnerability management strategy
for on-premises and hybrid cloud Learn how to perform log analysis
using the cloud to identify suspicious activities, including logs
from Amazon Web Services and Azure Who this book is forFor the IT
professional venturing into the IT security domain, IT pentesters,
security consultants, or those looking to perform ethical hacking.
Prior knowledge of penetration testing is beneficial.
Enhance your organization's secure posture by improving your attack
and defense strategies Key Features Gain a clear understanding of
the attack methods, and patterns to recognize abnormal behavior
within your organization with Blue Team tactics. Learn to unique
techniques to gather exploitation intelligence, identify risk and
demonstrate impact with Red Team and Blue Team strategies. A
practical guide that will give you hands-on experience to mitigate
risks and prevent attackers from infiltrating your system. Book
DescriptionThe book will start talking about the security posture
before moving to Red Team tactics, where you will learn the basic
syntax for the Windows and Linux tools that are commonly used to
perform the necessary operations. You will also gain hands-on
experience of using new Red Team techniques with powerful tools
such as python and PowerShell, which will enable you to discover
vulnerabilities in your system and how to exploit them. Moving on,
you will learn how a system is usually compromised by adversaries,
and how they hack user's identity, and the various tools used by
the Red Team to find vulnerabilities in a system. In the next
section, you will learn about the defense strategies followed by
the Blue Team to enhance the overall security of a system. You will
also learn about an in-depth strategy to ensure that there are
security controls in each network layer, and how you can carry out
the recovery process of a compromised system. Finally, you will
learn how to create a vulnerability management strategy and the
different techniques for manual log analysis. By the end of this
book, you will be well-versed with Red Team and Blue Team
techniques and will have learned the techniques used nowadays to
attack and defend systems. What you will learn Learn the importance
of having a solid foundation for your security posture Understand
the attack strategy using cyber security kill chain Learn how to
enhance your defense strategy by improving your security policies,
hardening your network, implementing active sensors, and leveraging
threat intelligence Learn how to perform an incident investigation
Get an in-depth understanding of the recovery process Understand
continuous security monitoring and how to implement a vulnerability
management strategy Learn how to perform log analysis to identify
suspicious activities Who this book is forThis book aims at IT
professional who want to venture the IT security domain. IT
pentester, Security consultants, and ethical hackers will also find
this course useful. Prior knowledge of penetration testing would be
beneficial.
"Windows Server 2012 Security from End to Edge and Beyond" shows
you how to architect, design, plan, and deploy Microsoft security
technologies for Windows 8/Server 2012 in the enterprise. The book
covers security technologies that apply to both client and server
and enables you to identify and deploy Windows 8 security features
in your systems based on different business and deployment
scenarios. The book is a single source for learning how to secure
Windows 8 in many systems, including core, endpoint, and anywhere
access.
Authors Tom Shinder and Yuri Diogenes, both Microsoft employees,
bring you insider knowledge of the Windows 8 platform, discussing
how to deploy Windows security technologies effectively in both the
traditional datacenter and in new cloud-based solutions. With this
book, you will understand the conceptual underpinnings of Windows 8
security and how to deploy these features in a test lab and in
pilot and production environments.
The book's revolutionary "Test Lab Guide" approach lets you test
every subject in a predefined test lab environment. This, combined
with conceptual and deployment guidance, enables you to understand
the technologies and move from lab to production faster than ever
before. Critical material is also presented in key concepts and
scenario-based approaches to evaluation, planning, deployment, and
management. Videos illustrating the functionality in the Test Lab
can be downloaded from the authors blog http:
//blogs.technet.com.b.security_talk/. Each chapter wraps up with a
bullet list summary of key concepts discussed in the chapter.
Provides practical examples of how to design and deploy a
world-class security infrastructure to protect both Windows 8 and
non-Microsoft assets on your systemWritten by two Microsoft
employees who provide an inside look at the security features of
Windows 8 Test Lab Guides enable you to test everything before
deploying live to your system"
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R391
R362
Discovery Miles 3 620
|