Hacking Exposed: Network Security Secrets & Solutions (Second Edition)
فهرست مطالب کتاب Hacking Exposed: Network Security Secrets & Solutions (Second Edition):
Part 1: Casing the Establishment
Footprinting
Scanning
Enumeration
Part II: System Hacking
Hacking Windows 95/98 and ME
Hacking Windows NT
Hacking Windows 2000
Novell NetWare Hacking
Hacking UNIX
Part III: Network Hacking
Dial-Up, PBX, Voicemail, and VPN Hacking
Network Devices
Firewalls
Denial of Service (DoS) Attacks
Part IV: Software Hacking
Remote Control Insecurities
Advanced Techniques
Web Hacking
Hacking the Internet User
Part V: Appendixes
Ports
Top 14 Security Vulnerabilities
About the Companion Web Site
Index
Hacking with Python The Ultimate Beginners Guide
فهرست مطالب Hacking with Python The Ultimate Beginners Guide:
Chapter 1: Preparation For Hacking
Chapter 2: Python Basics
Chapter 3: Writing Python Programs
Chapter 5: Operators and Expressions
Chapter 6: Functions and Modules
Chapter 7: Setting Up for Hacking
Chapter 8: Network Hacking
Chapter 9: Hacks for the Web
Chapter 10: Understanding Attacks Using Python
Chapter 11: Other Nifty Hacks to Try
Conclusion
Bonus: Preview Of ‘Introduction to Python 3
IAPP CIPM Certified Information Privacy Manager Study Guide
فهرست مطالب کتاب IAPP CIPM Certified Information Privacy Manager Study Guide:
Introduction
Chapter 1: Developing a Privacy Program
Chapter 2: Privacy Program Framework
Chapter 3: Privacy Operational Life Cycle: Assess
Chapter 4: Privacy Operational Life Cycle: Protect
Chapter 5: Privacy Operational Life Cycle: Sustain
Chapter 6: Privacy Operational Life Cycle: Respond
Index
ICS-410-1 ICS Ovenriew
فهرست مطالب:
GICSP Overview
ICS Concepts
EXERCISE l.l: Learningfrom Peers
Purdue Levels 0 and I
ExERcısE l.2: Programming a PLC
Purdue Levels 2 and 3
scADA
ExERcısE l.3: Programmingan HMl
lT and ICS Differences
Physical and Cybersecurity
Secure ICS Network Architectures
EXERCISE 1.4: Architecting a Secure DCS
ICS-410-2: Field Devices and Controllers
فهرست مطالب:
ICS Attack Surhce
Purdue Level 0 and I Attacks
Control Things Platform
ExERcısE 2. l: Finding Passwords in EEPRoM Dumps
Level 0 and I Technologies
ExERcısE 2.2: Exploring Fieldbus Protocols
Purdue Level 0 and I Defenses
Ethernet and TCP/lP
ExERcısE 2.3: Network Capture Analysis
ICS Protocols overTCP/IP
Attack on Networks
ExERcısE 2’4: Enumerating ModbusTCP
ICS-410-3: Supervisory Systems
فهرست مطالب:
Enforcement Zone Devices
Understanding Basic Cryptography
WirelessTechnologies
Wireless Attacks and Defenses
ExERcısE 3.I: Network Forensics of an Attack
Purdue Level 2 and 3 Attacks
Historians and Databases
ExERcIsE 3.2ı BypassingAuthentication with SQL lnjection
HMI and UlAtocks
Password Defenses
ExERcısE 3.3: Password Fuzzing
ICS-410-4: Workstations and Servers
فهرست مطالب:
Patching ICS Systems
Defending Microsoft Windows
EXERCISE 4.1 : Baselining with PowerShell
Defending Unix and Linux
Endpoint Security Software
EXERC I SE 4.2: Configuring Host-Based Firewalls
Event Logging and Analysis
ExERcısE 4.3: Windows Event Logs
Honeypots
Attacks on the Perimeter
ExERcısE 4.4: Finding Remote Access
ICS-410-5 ICS Secutiy Governance
فهرست مطالب:
Building an ICS Cybersecurity Program
Creating ICS Cybersecurit Polic
Disaster Recovery
Measuring Cybersecurity Risk
lncident Response
EXERCISE 5. I : lncident ResponseTabletop Exercise
Final Thoughts and Next Steps
ICS515.1 Threat Intelligence
فهرست مطالب:
Day 1: Threat Intelligence
Day 2: Asset ID’ing and NSM
Day 3: Incident Response
Day 4: Threat and Environment Manipulation
Day 5: Under Attack!
ICS515.2 Asset Identification and Network Security Monitoring
فهرست مطالب:
Case Study: Havex
ICS Asset and Network Visibility
ICS Network Security Monitoring – Collection
ICS Network Security Monitoring – Detection
ICS Network Security Monitoring – Analysis
ICS515.3 Incident Response
فهرست مطالب:
Case Study: German Steelworks Attack
Incident Response and Digital Forensics Overview
Evidence Acquisition
Sources of Forensic Data in ICS Networks
Memory Forensics and Identifying Capabilities
Integrated Timely Analysis