ICS515.4 Threat and Environment Manipulation
فهرست مطالب:
Case Study: BlackEnergy2
ICS Threat and Environment Manipulation Goals and Considerations
Analyzing Acquired Evidence
Case Study: Ukraine Power Grid Attack 2015
Malware Analysis Methodologies
Case Study: CRASHOVERRIDE
Documenting Knowledge
Case Study: TRISIS
Information Security Fundamentals
فهرست مطالب کتاب Information Security Fundamentals:
Chapter 1 Overview
Chapter 2 Threats to Information Security
Chapter 3 The Structure of an Information Security Program
Chapter 4 Information Security Policies
Chapter 5 Asset Classification
Chapter 6 Access Control
Chapter 7 Physical Security
Chapter 8 Risk Analysis and Risk Management
Chapter 9 Business Continuity Planning
Glossary
Bibliography
Information Security Management Handbook (Fifth Edition)
فهرست مطالب کتاب Information Security Management Handbook:
Introduction
- 1. ACCESS CONTROL SYSTEMS AND METHODOLOGY
Section 1.1 Access Control Techniques
Section 1.2 Access Control Administration
Section 1.3 Identification and Authentication Techniques
Section 1.4 Access Control Methodologies and Implementation
Section 1.5 Methods of Attack
Section 1.6 Monitoring and Penetration Testing
- 2. TELECOMMUNICATIONS, NETWORK, AND INTERNET SECURITY
Section 2.1 Communications and Network Security
Section 2.2 Internet/Intranet/Extranet
Section 2.3 E-mail Security
Section 2.4 Secure Voice Communications
Section 2.5 Network Attacks and Countermeasures
- 3. INFORMATION SECURITY MANAGEMENT
Section 3.1 Security Management Concepts and Principles
Section 3.2 Change Control Management
Section 3.3 Data Classification
Section 3.4 Risk Management
Section 3.5 Employment Policies and Practices
Section 3.6 Risk Management
Section 3.7 Security Awareness Training
Section 3.8 Security Management Planning
- 4. APPLICATION PROGRAM SECURITY
Section 4.1 Application Issues
Section 4.2 Databases and Data Warehousing
Section 4.3 Systems Development Controls
Section 4.4 Malicious Code
Section 4.5 Methods of Attack
- 5. CRYPTOGRAPHY
Section 5.1 Use of Cryptography
Section 5.2 Cryptographic Concepts, Methodologies, and Practices
Section 5.3 Private Key Algorithms
Section 5.4 Public Key Infrastructure (PKI)
Section 5.5 System Architecture for Implementing Cryptographic Functions
Section 5.6 Methods of Attack
- 6. ENTERPRISE SECURITY ARCHITECTURE
Section 6.1 Principles of Computer and Network Organizations, Architectures, and Designs
Section 6.2 Principles of Security Models, Architectures and Evaluation Criteria
Section 6.3 Common Flaws and Security Issues — System Architecture and Design
- 7. OPERATIONS SECURITY
Section 7.1 Concepts
Section 7.2 Resource Protection Requirements
Section 7.3 Auditing
Section 7.4 Intrusion Detection
Section 7.5 Operations Controls
- 8. BUSINESS CONTINUITY PLANNING
Section 8.1 Business Continuity Planning
Section 8.2 Disaster Recovery Planning
Section 8.3 Elements of Business Continuity Planning
- 9. LAW, INVESTIGATION, AND ETHICS
Section 9.1 Information Law
Section 9.2 Investigations
Section 9.3 Major Categories of Computer Crime
Section 9.4 Incident Handling
Section 9.5 Ethics
- 10. PHYSICAL SECURITY
Section 10.1 Facility Requirements
Section 10.2 Technical Controls
Section 10.3 Environment and Life Safety
Information Security: Principles and Practice
فهرست مطالب کتاب Information Security: Principles and Practice:
INTRODUCTION
CRYPTO
CRYPTO BASICS
SYMMETRIC KEY CRYPTO
PUBLIC KEY CRYPTO
HASH FUNCTIONS AND OTHER TOPICS
ADVANCED CRYPTANALYSIS
ACCESS CONTROL
AUTHENTICATION
AUTHORIZATION
PROTOCOLS
SIMPLE AUTHENTICATION PROTOCOLS
REAL-WORLD SECURITY PROTOCOLS
SOFTWARE
SOFTWARE FLAWS AND MALWARE
INSECURITY IN SOFTWARE
OPERATING SYSTEMS AND SECURITY
APPENDIX
ANNOTATED BIBLIOGRAPHY
INDEX
Kali Linux – Assuring Security by Penetration Testing
فهرست مطالب کتاب Kali Linux – Assuring Security by Penetration Testing:
PART I: Lab Preparation and Testing Procedures
Chapter 1: Beginning with Kali Linux
Chapter 2: Penetration Testing Methodology
PART II: Penetration Testers Armory
Chapter 3: Target Scoping
Chapter 4: Information Gathering
Chapter 5: Target Discovery
Chapter 6: Enumerating Target
Chapter 7: Vulnerability Mapping
Chapter 8: Social Engineering
Chapter 9: Target Exploitation
Chapter 10: Privilege Escalation
Chapter 11: Maintaining Access
Chapter 12: Documentation and Reporting
PART III: Extra Ammunition
Appendix A: Supplementary Tools
Appendix B: Key Resources
Kali Linux Cookbook: Over 70 Recipes to Help You Master Kali Linux for Effective Penetration Security Testing
فهرست مطالب کتاب Kali Linux Cookbook: Over 70 Recipes to Help You Master Kali Linux for Effective Penetration Security Testing:
Chapter 1: Up and Running with Kali Linux
Chapter 2: Customizing Kali Linux
Chapter 3: Advanced Testing Lab
Chapter 4: Information Gathering
Chapter 5: Vulnerability Assessment
Chapter 6: Exploiting Vulnerabilities
Chapter 7: Escalating Privileges
Chapter 8: Password Attacks
Chapter 9: Wireless Attacks
Kali Linux CTF Blueprints
فهرست مطالب کتاب Kali Linux CTF Blueprints:
Preface
Chapter 1: Microsoft Environments
Chapter 2: Linux Environments
Chapter 3: Wireless and Mobile
Chapter 4: Social Engineering
Chapter 5: Cryptographic Projects
Chapter 6: Red Teaming
Appendix
Index
LAN Switch Security What Hackers Know About Your Switches
فهرست مطالب کتاب LAN Switch Security What Hackers Know About Your Switches:
Introduction
Part I Vulnerabilities and Mitigation Techniques
Chapter 1 Introduction to Security
Chapter 2 Defeating a Learning Bridge’s Forwarding Process
Chapter 3 Attacking the Spanning Tree Protocol
Chapter 4 Are VLANS Safe?
Chapter 5 Leveraging DHCP Weaknesses
Chapter 6 Exploiting IPv4 ARP
Chapter 7 Exploiting IPv6 Neighbor Discovery and Router Advertisement
Chapter 8 What About Power over Ethernet?
Chapter 9 Is HSRP Resilient?
Chapter 10 Can We Bring VRRP Down?
Chapter 11 Information Leaks with Cisco Ancillary Protocols
Part II How Can a Switch Sustain a Denial of Service Attack?
Chapter 12 Introduction to Denial of Service Attacks
Chapter 13 Control Plane Policing
Chapter 14 Disabling Control Plane Protocols
Chapter 15 Using Switches to Detect a Data Plane DoS
Part III Using Switches to Augment the Network Security
Chapter 16 Wire Speed Access Control Lists
Chapter 17 Identity-Based Networking Services with 802.1X
Part IV What Is Next in LAN Security?
Chapter 18 IEEE 802.1AE
Appendix Combining IPsec with L2TPv3 for Secure Pseudowire
Index
Learn Kali Linux 2019 Perform powerful penetration testing using Kali Linux
فهرست مطالب کتاب Learn Kali Linux 2019:
Section 1: Kali Linux Basics
Chapter 1: Introduction to Hacking
Chapter 2: Setting Up Kali – Part 1
Chapter 3: Setting Up Kali – Part 2
Chapter 4: Getting Comfortable with Kali Linux 2019
Section 2: Reconnaissance
Chapter 5: Passive Information Gathering
Chapter 6: Active Information Gathering
Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019
Chapter 7: Working with Vulnerability Scanners
Chapter 8: Understanding Network Penetration Testing
Chapter 9: Network Penetration Testing – Pre-Connection Attacks
Chapter 10: Network Penetration Testing – Gaining Access
Chapter 11: Network Penetration Testing – Post-Connection Attacks
Chapter 12: Network Penetration Testing – Detection and Security
Chapter 13: Client-Side Attacks – Social Engineering
Chapter 14: Performing Website Penetration Testing
Chapter 15: Website Penetration Testing – Gaining Access
Chapter 16: Best Practices
Linux Essentials for Cybersecurity
فهرست مطالب:
Introduction
Part I: Introducing Linux
Part II: User and Group Accounts
Part III: File and Data Storage
Part IV: Automation
Part V: Networking
Part VI: Process and Log Administration
Part VII: Software Management
Part VIII: Security Tasks
Appendix A: Answers to Review Questions
Appendix B: Resource Guide
Glossary
Index
LPI Security Essentials Study Guide (Exam 020-100)
فهرست مطالب کتاب LPI Security Essentials Study Guide (Exam 020-100):
Introduction
Chapter 1: Using Digital Resources Responsibly
Chapter 2: What Are Vulnerabilities and Threats?
Chapter 3: Controlling Access to Your Assets
Chapter 4: Controlling Network Connections
Chapter 5: Encrypting Your Data at Rest
Chapter 6: Encrypting Your Moving Data
Chapter 7: Risk Assessment
Chapter 8: Configuring System Backups and Monitoring
Chapter 9: Resource Isolation Design Patterns
Appendix: Answers to Review Questions
Index
End User License Agreement
LPI Security Essentials Study Guide Exam 020-100
فهرست مطالب کتاب LPI Security Essentials Study Guide Exam 020-100:
Chapter 1: Using Digital Resources Responsibly
Chapter 2: What Are Vulnerabilities and Threats?
Chapter 3: Controlling Access to Your Assets
Chapter 4: Controlling Network Connections
Chapter 5: Encrypting Your Data at Rest
Chapter 6: Encrypting Your Moving Data
Chapter 7: Risk Assessment
Chapter 8: Configuring System Backups and Monitoring
Chapter 9: Resource Isolation Design Patterns