MGT514.5 Security Strategic Planning, Policy, and Leadership Strategic Planning Workshop
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Background
Case Study Method
Case Studies
iPremier Case (A)
iPremier Case (B)
iPremier Case (C)
PharmaCo Case (A)
PharmaCo Case (B)
PharmaCo Case (C)
HealthHound Case
Summary
Course Summary
Resources
Mobile Malware Attacks and Defense
فهرست مطالب کتاب Mobile Malware Attacks and Defense:
Chapter 1: Introduction to Mobile Malware
Chapter 2: Visual Payloads
Chapter 3: Timeline of Mobile Malware, Hoaxes, and Threats
Chapter 4: Overview of Mobile Malware Families
Chapter 5: Taxonomy of Mobile Malware
Chapter 6: Phishing, SMishing, and Vishing
Chapter 7: Operating System and Device Vulnerabilities
Chapter 8: Analyzing Mobile Malware
Chapter 9: Forensic Analysis of Mobile Malware
Chapter 10: Debugging and Disassembly of MMC
Chapter 11: Mobile Malware Mitigation Measures
Network Attacks & Exploitation: A Framework
فهرست مطالب کتاب Network Attacks & Exploitation:
Introduction
Chapter 1 Computer Network Exploitation
Chapter 2 The Attacker
Chapter 3 The Defender
Chapter 4 Asymmetries
Chapter 5 Attacker Frictions
Chapter 6 Defender Frictions
Chapter 7 Off ensive Strategy
Chapter 8 Defensive Strategy
Chapter 9 Off ensive Case Studies
Appendix Attack
References
Bibliography
Index
Network Defense and Countermeasures: Principles and Practices (Fourth Edition)
فهرست مطالب کتاب Network Defense and Countermeasures: Principles and Practices (Fourth Edition):
Chapter 1 Introduction to Network Security
Chapter 2 Types of Attacks
Chapter 3 Fundamentals of Firewalls
Chapter 4 Firewall Practical Applications
Chapter 5 Intrusion-Detection Systems
Chapter 6 Encryption Fundamentals
Chapter 7 Virtual Private Networks
Chapter 8 Operating System Hardening
Chapter 9 Defending Against Virus Attacks
Chapter 10 Defending against Trojan Horses and Phishing
Chapter 11 Security Policies
Chapter 12 Assessing System Security
Chapter 13 Security Standards
Chapter 14 Physical Security and Disaster Recovery
Chapter 15 Techniques Used by Attackers
Chapter 16 Introduction to Forensics
Chapter 17 Cyber Warfare and Terrorism
Network Forensics: Tracking Hackers Through Cyberspace
فهرست مطالب کتاب Network Forensics: Tracking Hackers Through Cyberspace:
Part I: Foundation
Chapter 1: Practical Investigative Strategies
Chapter 2: Technical Fundamentals
Chapter 3: Evidence Acquisition
Part II: Traffic Analysis
Chapter 4: Packet Analysis
Chapter 5: Statistical Flow Analysis
Chapter 6: Wireless: Network Forensics Unplugged
Chapter 7: Network Intrusion Detection and Analysis
Part III: Network Devices and Servers
Chapter 8: Event Log Aggregation, Correlation, and Analysis
Chapter 9: Switches, Routers, and Firewalls
Chapter 10: Web Proxies
Part IV: Advanced Topics
Chapter 11: Network Tunneling
Chapter 12: Malware Forensics
Network Security Auditing
فهرست مطالب کتاب Network Security Auditing:
Introduction
Chapter 1 The Principles of Auditing
Chapter 2 Information Security and the Law
Chapter 3 Information Security Governance, Frameworks, and Standards
Chapter 4 Auditing Tools and Techniques
Chapter 5 Auditing Cisco Security Solutions
Chapter 6 Policy, Compliance, and Management
Chapter 7 Infrastructure Security
Chapter 8 Perimeter Intrusion Prevention
Chapter 9 Access Control
Chapter 10 Secure Remote Access
Chapter 11 Endpoint Protection
Chapter 12 Unified Communications
Index
Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1
فهرست مطالب کتاب Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-1:
Chapter 1 Communication in a Connected World
Chapter 2 Network Components, Types, and Connections
Chapter 3 Wireless and Mobile Networks
Chapter 4 Build a Home Network
Chapter 5 Communication Principles
Chapter 6 Network Media
Chapter 7 The Access Layer
Chapter 8 The Internet Protocol
Chapter 9 IPv4 and Network Segmentation
Chapter 10 IPv6 Addressing Formats and Rules
Chapter 11 Dynamic Addressing with DHCP
Chapter 12 Gateways to Other Networks
Chapter 13 The ARP Process
Chapter 14 Routing Between Networks
Chapter 15 TCP and UDP
Chapter 16 Application Layer Services
Chapter 17 Network Testing Utilities
Chapter 18 Network Design
Chapter 19 Cloud and Virtualization
Chapter 20 Number Systems
Chapter 21 Ethernet Switching
Chapter 22 Network Layer
Chapter 23 IPv4 Address Structure
Chapter 24 Address Resolution
Chapter 25 IP Addressing Services
Chapter 26 Transport Layer
Chapter 27 The Cisco IOS Command Line
Chapter 28 Build a Small Cisco Network
Chapter 29 ICMP
Chapter 30 Physical Layer
Chapter 31 Data Link Layer
Chapter 32 Routing at the Network Layer
Chapter 33 IPv6 Addressing
Chapter 34 IPv6 Neighbor Discovery
Chapter 35 Cisco Switches and Routers
Chapter 36 Troubleshoot Common Network Problems
Chapter 37 Network Support
Chapter 38 Cybersecurity Threats, Vulnerabilities, and Attacks
Chapter 39 Network Security
Appendix A Answers to “Check Your Understanding”
Questions
Glossary
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
فهرست مطالب کتاب Ninja Hacking:
Chapter 1: The Historical Ninja
Chapter 2: The Modern Ninja
Chapter 3: Strategies and Tactics
Chapter 4: Exploitation of Current Events
Chapter 5: Disguise
Chapter 6: Impersonation
Chapter 7: Infiltration
Chapter 8: Use of Timing to Enter an Area
Chapter 9: Discovering Weak Points in Area Defenses
Chapter 10: Psychological Weaknesses
Chapter 11: Distraction
Chapter 12: Concealment Devices
Chapter 13: Covert Listening Devices
Chapter 14: Intelligence
Chapter 15: Surveillance
Chapter 16: Sabotage
Chapter 17: Hiding and Silent Movement
Offensive Security Wireless Attacks – WiFu (v3.0)
فهرست مطالب کتاب Offensive Security Wireless Attacks – WiFu:
IEEE 802.11
Wireless Networks
Packets and Network Interaction
Getting Started
Linux Wireless Stack and Drivers
Aircrack-ng Essentials
Cracking WEP with Connected Clients
Cracking WEP via a Client
Cracking Clientless WEP Networks
Bypassing WEP Shared Key Authentication
Cracking WPA/WPA2 PSK with Aircrack-ng
Cracking WPA with JTR and Aircrack-ng
Cracking WPA with coWPAtty
Cracking WPA with Pyrit
Additional Aircrack-ng Tools
Wireless Reconnaissance
Rogue Access Points
Appendix A: Cracking WEP via a Client – Alternate Solutions
Appendix B: ARP Amplification
Penetration Testing and Network Defense
فهرست مطالب کتاب Penetration Testing and Network Defense:
Foreword
Introduction
Part I Overview of Penetration Testing
Chapter 1 Understanding Penetration Testing
Chapter 2 Legal and Ethical Considerations
Chapter 3 Creating a Test Plan
Part II Performing the Test
Chapter 4 Performing Social Engineering
Chapter 5 Performing Host Reconnaissance
Chapter 6 Understanding and Attempting Session Hijacking
Chapter 7 Performing Web Server Attacks
Chapter 8 Performing Database Attacks
Chapter 9 Password Cracking
Chapter 10 Attacking the Network
Chapter 11 Scanning and Penetrating Wireless Networks
Chapter 12 Using Trojans and Backdoor Applications
Chapter 13 Penetrating UNIX, Microsoft, and Novell Servers
Chapter 14 Understanding and Attempting Buffer Overflows
Chapter 15 Denial-of-Service Attacks
Chapter 16 Case Study: A Methodical Step-By-Step Penetration Test
Part III Appendixes
Appendix A Preparing a Security Policy
Appendix B Tools
Glossary
Index
Pentesting Active Directory and Windows-based Infrastructure
فهرست مطالب کتاب Pentesting Active Directory and Windows-based Infrastructure:
1 Getting the Lab Ready and Attacking Exchange Server
2 Defense Evasion 25
3 Domain Reconnaissance and Discovery 51
4 Credential Access in Domain 71
5 Lateral Movement in Domain and Across Forests 101
6 Domain Privilege Escalation 141
7 Persistence on Domain Level 179
8 Abusing Active Directory Certificate Services 221
9 Compromising Microsoft SQL Server 267
10 Taking Over WSUS and SCCM
Practical Deployment of Cisco Identity Services Engine
فهرست مطالب کتاب Practical Deployment of Cisco Identity Services Engine:
Chapter 1: Introduction
Chapter 2: ISE Clustering and Basic Setup
Chapter 3: Authentication Methods
Chapter 4: Policy Elements
Chapter 5: Authentication
Chapter 6: Authorization
Chapter 7: Network Access Device Configuration
Chapter 8: ISE Profiling
Chapter 9: ISE Portals and Guest Access
Chapter 10: Deployment Strategies
Chapter 11: ISE Policy Design Practices
Chapter 12: Corporate Authentication Designs
Chapter 13: BYOD Designs
Chapter 14: ISE Posture Assessment
Chapter 15: VPN Integrations
Chapter 16: ISE Reporting and Logging
Chapter 17: ISE CLI
Chapter 18: ISE Administration