Malware Analysts Cookbook and DVD Tools and Techniques for Fighting Malicious Code

فهرست مطالب کتاب Malware Analysts Cookbook and DVD:

1 Anonymizing Your Activities

2 Honeypots

3 Malware Classification

4 Sandboxes and Multi-AV Scanners

5 Researching Domains and IP Addresses

6 Documents, Shellcode, and URLs

7 Malware Labs

8 Automation

9 Dynamic Analysis

10 Malware Forensics

11 Debugging Malware

12 De-Obfuscation

13 Working with DLLs

14 Kernel Debugging

15 Memory Forensics with Volatility

16 Memory Forensics: Code Injection and Extraction

17 Memory Forensics: Rootkits

18 Memory Forensics: Network and Registry

Mastering Cyber Intelligence Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

فهرست مطالب کتاب Mastering Cyber Intelligence: 

Preface

1 Cyber Threat Intelligence Life Cycle

2 Requirements and Intelligence Team Implementation

3 Cyber Threat Intelligence Frameworks

4 Cyber Threat Intelligence Tradecraft and Standards

5 Goal Setting, Procedures for CTI Strategy, and Practical Use

6 Cyber Threat Modeling and Adversary Analysis

7 Threat Intelligence Data Sources

8 Effective Defense Tactics and Data Protection

9 AI Applications in Cyber Threat Analytics

10 Threat Modeling and Analysis – Practical Use Cases

11 Usable Security: Threat Intelligence as Part of the Process

12 SIEM Solutions and Intelligence-Driven SOCs

13 Threat Intelligence Metrics, Indicators of Compromise, and

14 Threat Intelligence Reporting and Dissemination

15 Threat Intelligence Sharing and Cyber Activity Attribution – Practical Use Cases

Index

Mastering Kali Linux for Advanced Penetration Testing

فهرست مطالب:

Title Page

Copyright and Credits

Dedication

About Packt

Contributors

Preface

Goal-Based Penetration Testing

Open Source Intelligence and Passive Reconnaissance

Active Reconnaissance of External and Internal Networks

Vulnerability Assessment

Advanced Social Engineering and Physical Security

Wireless Attacks

Exploiting Web-Based Applications

Client-Side Exploitation

Bypassing Security Controls

Exploitation

Action on the Objective and Lateral Movement

Privilege Escalation

Command and Control

Embedded Devices and RFID Hacking

Other Books You May Enjoy

Mastering Linux Security and Hardening, Second Edition

فهرست مطالب کتابMastering Linux Security and Hardening:

Section 1: Setting up a Secure Linux System

Chapter 1: Running Linux in a Virtual Environment

Chapter 2: Securing User Accounts

Chapter 3: Securing Your Server with a Firewall – Part 1

Chapter 4: Securing Your Server with a Firewall – Part 2

Chapter 5: Encryption Technologies

Chapter 6: SSH Hardening

Section 2: Mastering File and Directory Access Control (DAC)

Chapter 7: Mastering Discretionary Access Control

Chapter 8: Access Control Lists and Shared Directory Management

Section 3: Advanced System Hardening Techniques

Chapter 9: Implementing Mandatory Access Control with SELinux and AppArmor

Chapter 10: Kernel Hardening and Process Isolation

Chapter 11: Scanning, Auditing, and Hardening

Chapter 12: Logging and Log Security

Chapter 13: Vulnerability Scanning and Intrusion Detection

Chapter 14: Security Tips and Tricks for the Busy Bee

Mastering Modern Web Penetration Testing

فهرست مطالب کتاب Mastering Modern Web Penetration Testing:

Chapter 1: Common Security Protocols

Chapter 2: Information Gathering

Chapter 3: Cross-Site Scripting

Chapter 4: Cross-Site Request Forgery

Chapter 5: Exploiting SQL Injection

Chapter 6: File Upload Vulnerabilities

Chapter 7: Metasploit and Web

Chapter 8: XML Attacks

Chapter 9: Emerging Attack Vectors

Chapter 10: OAuth 2.0 Security

Chapter 11: API Testing Methodology

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide Exam SC-100

فهرست مطالب کتاب MCE Microsoft Certified Expert Cybersecurity Architect Study Guide Exam SC-100:

Introduction

Assessment Test

Chapter 1 Define and Implement an Overall Security Strategy and Architecture

Chapter 2 Define a Security Operations Strategy

Chapter 3 Define an Identity Security Strategy

Chapter 4 Identify a Regulatory Compliance Strategy

Chapter 5 Identify Security Posture and Recommend Technical Strategies to Manage Risk

Chapter 6 Define a Strategy for Securing Infrastructure

Chapter 7 Define a Strategy and Requirements for Securing PaaS, IaaS, and SaaS Services

Chapter 8 Define a Strategy and Requirements for Applications and Data

Chapter 9 Recommend Security Best Practices and Priorities

Appendix Answers to Review Questions

Index

Metasploit Penetration Testing Cookbook

فهرست مطالب کتاب Metasploit Penetration Testing Cookbook:

Preface

Chapter 1: Metasploit Quick Tips for Security Professionals

Chapter 2: Information Gathering and Scanning

Chapter 3: Operating System-based Vulnerability Assessment

Chapter 4: Client-side Exploitation and Antivirus Bypass

Chapter 5: Using Meterpreter to Explore the Compromised Target

Chapter 6: Advanced Meterpreter Scripting

Chapter 7: Working with Modules for Penetration Testing

Chapter 8: Working with Exploits

Chapter 9: Working with Armitage

Chapter 10: Social Engineer Toolkit

Index

Metasploit: The Penetration Tester Guide

فهرست مطالب کتاب Metasploit: The Penetration Tester’s Guide:

Foreword: by HD Moore

Preface

Acknowledgments

Introduction

Chapter 1: The Absolute Basics of Penetration Testing

Chapter 2: Metasploit Basics

Chapter 3: Intelligence Gathering

Chapter 4: Vulnerability Scanning

Chapter 5: The Joy of Exploitation

Chapter 6: Meterpreter

Chapter 7: Avoiding Detection

Chapter 8: Exploitation Using Client-Side Attacks

Chapter 9: Metasploit Auxiliary Modules

Chapter 10: The Social-Engineer Toolkit

Chapter 11: Fast-Track

Chapter 12: Karmetasploit

Chapter 13: Building Your Own Module

Chapter 14: Creating Your Own Exploits

Chapter 15: Porting Exploits to the Metasploit Framework

Chapter 16: Meterpreter Scripting

Chapter 17: Simulated Penetration Test

Appendix A: Configuring Your Target Machines

Appendix B: Cheat Sheet

Index

 

MGT514.1 Security Strategic Planning, Policy, and Leadership Strategic Planning Foundations

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Overview

Need for Strategic Planning

30-60-90 Day Plan

Lab #1: CISO First Impression

Decipher the Business

Historical Analysis

Values and Culture

Stakeholder Management

Lab #2: Relationship Management

Asset Analysis

Business Strategy

Lab #3: Strategy Map

Decipher the Threats

Threat Actors

PEST Analysis

Threat Analysis

MGT514.2 Security Strategic Planning, Policy, and Leadership Strategic Roadmap Development

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Define Current State

ïVision and Mission

Lab #1: Mission Statement

SWOT Analysis

Lab #2: SWOT Exercise

Develop the Plan

ïVisioning and Innovation

Security Framework

Security Roadmap

Gap Analysis

Lab #3: Roadmap Development

Business Case Development

Deliver the Program

Security Metrics Program

Marketing and Exec Communications

MGT514.3 Security Strategic Planning, Policy, and Leadership Security Policy Development and Assessment

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Purpose of Policy

Policy Pyramid

Develop Policy

Language of Policy

Lab #1: Positive and Negative Voicing

Policy Structure

Policy and Culture

Define Requirements

Development Examples

Lab #2: Vulnerability Management Policy

Manage Policy

Approve, Socialize, and Measure

Assess Policy and Procedure

SMART Approach

Policy Assessment

Lab #3: Cloud Computing Policy

MGT514.4 Security Strategic Planning, Policy, and Leadership Leadership & Management Competencies

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Why Choose Leadership

Understanding Leadership

Lab #1: Management and Leadership

Leadership Essentials

Building Trust

Servant Leadership

Effective Communications

Active Listening

Providing Feedback

Lab #2: Performance Review

Challenging Conversations

Build Effective Teams

Learning to Delegate

Lab #3: Delegation

Coaching, Mentoring, and Sponsorship

Leading Change