Malware Analysts Cookbook and DVD Tools and Techniques for Fighting Malicious Code
فهرست مطالب کتاب Malware Analysts Cookbook and DVD:
1 Anonymizing Your Activities
2 Honeypots
3 Malware Classification
4 Sandboxes and Multi-AV Scanners
5 Researching Domains and IP Addresses
6 Documents, Shellcode, and URLs
7 Malware Labs
8 Automation
9 Dynamic Analysis
10 Malware Forensics
11 Debugging Malware
12 De-Obfuscation
13 Working with DLLs
14 Kernel Debugging
15 Memory Forensics with Volatility
16 Memory Forensics: Code Injection and Extraction
17 Memory Forensics: Rootkits
18 Memory Forensics: Network and Registry
Mastering Cyber Intelligence Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
فهرست مطالب کتاب Mastering Cyber Intelligence:
Preface
1 Cyber Threat Intelligence Life Cycle
2 Requirements and Intelligence Team Implementation
3 Cyber Threat Intelligence Frameworks
4 Cyber Threat Intelligence Tradecraft and Standards
5 Goal Setting, Procedures for CTI Strategy, and Practical Use
6 Cyber Threat Modeling and Adversary Analysis
7 Threat Intelligence Data Sources
8 Effective Defense Tactics and Data Protection
9 AI Applications in Cyber Threat Analytics
10 Threat Modeling and Analysis – Practical Use Cases
11 Usable Security: Threat Intelligence as Part of the Process
12 SIEM Solutions and Intelligence-Driven SOCs
13 Threat Intelligence Metrics, Indicators of Compromise, and
14 Threat Intelligence Reporting and Dissemination
15 Threat Intelligence Sharing and Cyber Activity Attribution – Practical Use Cases
Index
Mastering Kali Linux for Advanced Penetration Testing
فهرست مطالب:
Title Page
Copyright and Credits
Dedication
About Packt
Contributors
Preface
Goal-Based Penetration Testing
Open Source Intelligence and Passive Reconnaissance
Active Reconnaissance of External and Internal Networks
Vulnerability Assessment
Advanced Social Engineering and Physical Security
Wireless Attacks
Exploiting Web-Based Applications
Client-Side Exploitation
Bypassing Security Controls
Exploitation
Action on the Objective and Lateral Movement
Privilege Escalation
Command and Control
Embedded Devices and RFID Hacking
Other Books You May Enjoy
Mastering Linux Security and Hardening, Second Edition
فهرست مطالب کتابMastering Linux Security and Hardening:
Section 1: Setting up a Secure Linux System
Chapter 1: Running Linux in a Virtual Environment
Chapter 2: Securing User Accounts
Chapter 3: Securing Your Server with a Firewall – Part 1
Chapter 4: Securing Your Server with a Firewall – Part 2
Chapter 5: Encryption Technologies
Chapter 6: SSH Hardening
Section 2: Mastering File and Directory Access Control (DAC)
Chapter 7: Mastering Discretionary Access Control
Chapter 8: Access Control Lists and Shared Directory Management
Section 3: Advanced System Hardening Techniques
Chapter 9: Implementing Mandatory Access Control with SELinux and AppArmor
Chapter 10: Kernel Hardening and Process Isolation
Chapter 11: Scanning, Auditing, and Hardening
Chapter 12: Logging and Log Security
Chapter 13: Vulnerability Scanning and Intrusion Detection
Chapter 14: Security Tips and Tricks for the Busy Bee
Mastering Modern Web Penetration Testing
فهرست مطالب کتاب Mastering Modern Web Penetration Testing:
Chapter 1: Common Security Protocols
Chapter 2: Information Gathering
Chapter 3: Cross-Site Scripting
Chapter 4: Cross-Site Request Forgery
Chapter 5: Exploiting SQL Injection
Chapter 6: File Upload Vulnerabilities
Chapter 7: Metasploit and Web
Chapter 8: XML Attacks
Chapter 9: Emerging Attack Vectors
Chapter 10: OAuth 2.0 Security
Chapter 11: API Testing Methodology
MCE Microsoft Certified Expert Cybersecurity Architect Study Guide Exam SC-100
فهرست مطالب کتاب MCE Microsoft Certified Expert Cybersecurity Architect Study Guide Exam SC-100:
Introduction
Assessment Test
Chapter 1 Define and Implement an Overall Security Strategy and Architecture
Chapter 2 Define a Security Operations Strategy
Chapter 3 Define an Identity Security Strategy
Chapter 4 Identify a Regulatory Compliance Strategy
Chapter 5 Identify Security Posture and Recommend Technical Strategies to Manage Risk
Chapter 6 Define a Strategy for Securing Infrastructure
Chapter 7 Define a Strategy and Requirements for Securing PaaS, IaaS, and SaaS Services
Chapter 8 Define a Strategy and Requirements for Applications and Data
Chapter 9 Recommend Security Best Practices and Priorities
Appendix Answers to Review Questions
Index
Metasploit Penetration Testing Cookbook
فهرست مطالب کتاب Metasploit Penetration Testing Cookbook:
Preface
Chapter 1: Metasploit Quick Tips for Security Professionals
Chapter 2: Information Gathering and Scanning
Chapter 3: Operating System-based Vulnerability Assessment
Chapter 4: Client-side Exploitation and Antivirus Bypass
Chapter 5: Using Meterpreter to Explore the Compromised Target
Chapter 6: Advanced Meterpreter Scripting
Chapter 7: Working with Modules for Penetration Testing
Chapter 8: Working with Exploits
Chapter 9: Working with Armitage
Chapter 10: Social Engineer Toolkit
Index
Metasploit: The Penetration Tester Guide
فهرست مطالب کتاب Metasploit: The Penetration Tester’s Guide:
Foreword: by HD Moore
Preface
Acknowledgments
Introduction
Chapter 1: The Absolute Basics of Penetration Testing
Chapter 2: Metasploit Basics
Chapter 3: Intelligence Gathering
Chapter 4: Vulnerability Scanning
Chapter 5: The Joy of Exploitation
Chapter 6: Meterpreter
Chapter 7: Avoiding Detection
Chapter 8: Exploitation Using Client-Side Attacks
Chapter 9: Metasploit Auxiliary Modules
Chapter 10: The Social-Engineer Toolkit
Chapter 11: Fast-Track
Chapter 12: Karmetasploit
Chapter 13: Building Your Own Module
Chapter 14: Creating Your Own Exploits
Chapter 15: Porting Exploits to the Metasploit Framework
Chapter 16: Meterpreter Scripting
Chapter 17: Simulated Penetration Test
Appendix A: Configuring Your Target Machines
Appendix B: Cheat Sheet
Index
MGT514.1 Security Strategic Planning, Policy, and Leadership Strategic Planning Foundations
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Overview
Need for Strategic Planning
30-60-90 Day Plan
Lab #1: CISO First Impression
Decipher the Business
Historical Analysis
Values and Culture
Stakeholder Management
Lab #2: Relationship Management
Asset Analysis
Business Strategy
Lab #3: Strategy Map
Decipher the Threats
Threat Actors
PEST Analysis
Threat Analysis
MGT514.2 Security Strategic Planning, Policy, and Leadership Strategic Roadmap Development
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Define Current State
ïVision and Mission
Lab #1: Mission Statement
SWOT Analysis
Lab #2: SWOT Exercise
Develop the Plan
ïVisioning and Innovation
Security Framework
Security Roadmap
Gap Analysis
Lab #3: Roadmap Development
Business Case Development
Deliver the Program
Security Metrics Program
Marketing and Exec Communications
MGT514.3 Security Strategic Planning, Policy, and Leadership Security Policy Development and Assessment
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Purpose of Policy
Policy Pyramid
Develop Policy
Language of Policy
Lab #1: Positive and Negative Voicing
Policy Structure
Policy and Culture
Define Requirements
Development Examples
Lab #2: Vulnerability Management Policy
Manage Policy
Approve, Socialize, and Measure
Assess Policy and Procedure
SMART Approach
Policy Assessment
Lab #3: Cloud Computing Policy
MGT514.4 Security Strategic Planning, Policy, and Leadership Leadership & Management Competencies
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Why Choose Leadership
Understanding Leadership
Lab #1: Management and Leadership
Leadership Essentials
Building Trust
Servant Leadership
Effective Communications
Active Listening
Providing Feedback
Lab #2: Performance Review
Challenging Conversations
Build Effective Teams
Learning to Delegate
Lab #3: Delegation
Coaching, Mentoring, and Sponsorship
Leading Change