MGT514.5 Security Strategic Planning, Policy, and Leadership Strategic Planning Workshop

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Background

Case Study Method

Case Studies

iPremier Case (A)

iPremier Case (B)

iPremier Case (C)

PharmaCo Case (A)

PharmaCo Case (B)

PharmaCo Case (C)

HealthHound Case

Summary

Course Summary

Resources

Mobile Malware Attacks and Defense

فهرست مطالب کتاب Mobile Malware Attacks and Defense:

Chapter 1: Introduction to Mobile Malware

Chapter 2: Visual Payloads

Chapter 3: Timeline of Mobile Malware, Hoaxes, and Threats

Chapter 4: Overview of Mobile Malware Families

Chapter 5: Taxonomy of Mobile Malware

Chapter 6: Phishing, SMishing, and Vishing

Chapter 7: Operating System and Device Vulnerabilities

Chapter 8: Analyzing Mobile Malware

Chapter 9: Forensic Analysis of Mobile Malware

Chapter 10: Debugging and Disassembly of MMC

Chapter 11: Mobile Malware Mitigation Measures

Network Attacks & Exploitation: A Framework

فهرست مطالب کتاب Network Attacks & Exploitation:

Introduction

Chapter 1 Computer Network Exploitation

Chapter 2 The Attacker

Chapter 3 The Defender

Chapter 4 Asymmetries

Chapter 5 Attacker Frictions

Chapter 6 Defender Frictions

Chapter 7 Off ensive Strategy

Chapter 8 Defensive Strategy

Chapter 9 Off ensive Case Studies

Appendix Attack

References

Bibliography

Index

Network Defense and Countermeasures: Principles and Practices (Fourth Edition)

فهرست مطالب کتاب Network Defense and Countermeasures: Principles and Practices (Fourth Edition):

Chapter 1 Introduction to Network Security

Chapter 2 Types of Attacks

Chapter 3 Fundamentals of Firewalls

Chapter 4 Firewall Practical Applications

Chapter 5 Intrusion-Detection Systems

Chapter 6 Encryption Fundamentals

Chapter 7 Virtual Private Networks

Chapter 8 Operating System Hardening

Chapter 9 Defending Against Virus Attacks

Chapter 10 Defending against Trojan Horses and Phishing

Chapter 11 Security Policies

Chapter 12 Assessing System Security

Chapter 13 Security Standards

Chapter 14 Physical Security and Disaster Recovery

Chapter 15 Techniques Used by Attackers

Chapter 16 Introduction to Forensics

Chapter 17 Cyber Warfare and Terrorism

Network Forensics: Tracking Hackers Through Cyberspace

فهرست مطالب کتاب Network Forensics: Tracking Hackers Through Cyberspace:

Part I: Foundation

Chapter 1: Practical Investigative Strategies

Chapter 2: Technical Fundamentals

Chapter 3: Evidence Acquisition

Part II: Traffic Analysis

Chapter 4: Packet Analysis

Chapter 5: Statistical Flow Analysis

Chapter 6: Wireless: Network Forensics Unplugged

Chapter 7: Network Intrusion Detection and Analysis

Part III: Network Devices and Servers

Chapter 8: Event Log Aggregation, Correlation, and Analysis

Chapter 9: Switches, Routers, and Firewalls

Chapter 10: Web Proxies

Part IV: Advanced Topics

Chapter 11: Network Tunneling

Chapter 12: Malware Forensics

Network Security Auditing

فهرست مطالب کتاب Network Security Auditing:

Introduction

Chapter 1 The Principles of Auditing

Chapter 2 Information Security and the Law

Chapter 3 Information Security Governance, Frameworks, and Standards

Chapter 4 Auditing Tools and Techniques

Chapter 5 Auditing Cisco Security Solutions

Chapter 6 Policy, Compliance, and Management

Chapter 7 Infrastructure Security

Chapter 8 Perimeter Intrusion Prevention

Chapter 9 Access Control

Chapter 10 Secure Remote Access

Chapter 11 Endpoint Protection

Chapter 12 Unified Communications

Index

Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1

فهرست مطالب کتاب Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1:

Chapter 1 Communication in a Connected World

Chapter 2 Network Components, Types, and Connections

Chapter 3 Wireless and Mobile Networks

Chapter 4 Build a Home Network

Chapter 5 Communication Principles

Chapter 6 Network Media

Chapter 7 The Access Layer

Chapter 8 The Internet Protocol

Chapter 9 IPv4 and Network Segmentation

Chapter 10 IPv6 Addressing Formats and Rules

Chapter 11 Dynamic Addressing with DHCP

Chapter 12 Gateways to Other Networks

Chapter 13 The ARP Process

Chapter 14 Routing Between Networks

Chapter 15 TCP and UDP

Chapter 16 Application Layer Services

Chapter 17 Network Testing Utilities

Chapter 18 Network Design

Chapter 19 Cloud and Virtualization

Chapter 20 Number Systems

Chapter 21 Ethernet Switching

Chapter 22 Network Layer

Chapter 23 IPv4 Address Structure

Chapter 24 Address Resolution

Chapter 25 IP Addressing Services

Chapter 26 Transport Layer

Chapter 27 The Cisco IOS Command Line

Chapter 28 Build a Small Cisco Network

Chapter 29 ICMP

Chapter 30 Physical Layer

Chapter 31 Data Link Layer

Chapter 32 Routing at the Network Layer

Chapter 33 IPv6 Addressing

Chapter 34 IPv6 Neighbor Discovery

Chapter 35 Cisco Switches and Routers

Chapter 36 Troubleshoot Common Network Problems

Chapter 37 Network Support

Chapter 38 Cybersecurity Threats, Vulnerabilities, and Attacks

Chapter 39 Network Security

Appendix A Answers to “Check Your Understanding”

Questions

Glossary

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

فهرست مطالب کتاب Ninja Hacking:

Chapter 1: The Historical Ninja

Chapter 2: The Modern Ninja

Chapter 3: Strategies and Tactics

Chapter 4: Exploitation of Current Events

Chapter 5: Disguise

Chapter 6: Impersonation

Chapter 7: Infiltration

Chapter 8: Use of Timing to Enter an Area

Chapter 9: Discovering Weak Points in Area Defenses

Chapter 10: Psychological Weaknesses

Chapter 11: Distraction

Chapter 12: Concealment Devices

Chapter 13: Covert Listening Devices

Chapter 14: Intelligence

Chapter 15: Surveillance

Chapter 16: Sabotage

Chapter 17: Hiding and Silent Movement

Offensive Security Wireless Attacks – WiFu (v3.0)

فهرست مطالب کتاب Offensive Security Wireless Attacks – WiFu:

IEEE 802.11

Wireless Networks

Packets and Network Interaction

Getting Started

Linux Wireless Stack and Drivers

Aircrack-ng Essentials

Cracking WEP with Connected Clients

Cracking WEP via a Client

Cracking Clientless WEP Networks

Bypassing WEP Shared Key Authentication

Cracking WPA/WPA2 PSK with Aircrack-ng

Cracking WPA with JTR and Aircrack-ng

Cracking WPA with coWPAtty

Cracking WPA with Pyrit

Additional Aircrack-ng Tools

Wireless Reconnaissance

Rogue Access Points

Appendix A: Cracking WEP via a Client – Alternate Solutions

Appendix B: ARP Amplification

Penetration Testing and Network Defense

فهرست مطالب کتاب Penetration Testing and Network Defense:

Foreword

Introduction

Part I Overview of Penetration Testing

Chapter 1 Understanding Penetration Testing

Chapter 2 Legal and Ethical Considerations

Chapter 3 Creating a Test Plan

Part II Performing the Test

Chapter 4 Performing Social Engineering

Chapter 5 Performing Host Reconnaissance

Chapter 6 Understanding and Attempting Session Hijacking

Chapter 7 Performing Web Server Attacks

Chapter 8 Performing Database Attacks

Chapter 9 Password Cracking

Chapter 10 Attacking the Network

Chapter 11 Scanning and Penetrating Wireless Networks

Chapter 12 Using Trojans and Backdoor Applications

Chapter 13 Penetrating UNIX, Microsoft, and Novell Servers

Chapter 14 Understanding and Attempting Buffer Overflows

Chapter 15 Denial-of-Service Attacks

Chapter 16 Case Study: A Methodical Step-By-Step Penetration Test

Part III Appendixes

Appendix A Preparing a Security Policy

Appendix B Tools

Glossary

Index

Pentesting Active Directory and Windows-based Infrastructure

فهرست مطالب کتاب Pentesting Active Directory and Windows-based Infrastructure:

1 Getting the Lab Ready and Attacking Exchange Server

2 Defense Evasion 25

3 Domain Reconnaissance and Discovery 51

4 Credential Access in Domain 71

5 Lateral Movement in Domain and Across Forests 101

6 Domain Privilege Escalation 141

7 Persistence on Domain Level 179

8 Abusing Active Directory Certificate Services 221

9 Compromising Microsoft SQL Server 267

10 Taking Over WSUS and SCCM

Practical Deployment of Cisco Identity Services Engine

فهرست مطالب کتاب Practical Deployment of Cisco Identity Services Engine:

Chapter 1: Introduction

Chapter 2: ISE Clustering and Basic Setup

Chapter 3: Authentication Methods

Chapter 4: Policy Elements

Chapter 5: Authentication

Chapter 6: Authorization

Chapter 7: Network Access Device Configuration

Chapter 8: ISE Profiling

Chapter 9: ISE Portals and Guest Access

Chapter 10: Deployment Strategies

Chapter 11: ISE Policy Design Practices

Chapter 12: Corporate Authentication Designs

Chapter 13: BYOD Designs

Chapter 14: ISE Posture Assessment

Chapter 15: VPN Integrations

Chapter 16: ISE Reporting and Logging

Chapter 17: ISE CLI

Chapter 18: ISE Administration