CompTIA PenTest+ Study Guide (Exam PT0-001)

فهرست مطالب:

Introduction

Assessment Test

Chapter 1 Penetration Testing

Chapter 2 Planning and Scoping Penetration Tests

Chapter 3 Information Gathering

Chapter 4 Vulnerability Scanning

Chapter 5 Analyzing Vulnerability Scans

Chapter 6 Exploit and Pivot

Chapter 7 Exploiting Network Vulnerabilities

Chapter 8 Exploiting Physical and Social Vulnerabilities

Chapter 9 Exploiting Application Vulnerabilities

Chapter 10 Exploiting Host Vulnerabilities

Chapter 11 Scripting for Penetration Testing

Chapter 12 Reporting and Communication

Appendix Answers to Review Questions

Index

CompTIA PenTest+ Study Guide Exam PT0-001

فهرست مطالب

Introduction

Assessment Test

Chapter 1: Penetration Testing

Chapter 2: Planning and Scoping Penetration Tests

Chapter 3: Information Gathering

Chapter 4: Vulnerability Scanning

Chapter 5: Analyzing Vulnerability Scans

Chapter 6: Exploit and Pivot

Chapter 7: Exploiting Network Vulnerabilities

Chapter 8: Exploiting Physical and Social Vulnerabilities

Chapter 9: Exploiting Application Vulnerabilities

Chapter 10: Exploiting Host Vulnerabilities

Chapter 11: Scripting for Penetration Testing

Chapter 12: Reporting and Communication

Appendix: Answers to Review Questions

Index

CompTIA Security+ All-in-One Exam Guide (Exam SY0-501)

فهرست مطالب:

Part I Threats, Attacks, and Vulnerabilities

Part II Technologies and Tools

Part III Architecture and Design

Part IV Identity and Access Management

Part V Risk Management

Part VI Cryptography and Public Key Infrastructure

Part VII Appendixes and Glossary

Appendix A OSI Model and Internet Protocols

Appendix B About the Download

CompTIA Security+ Review Guide SY0-501

فهرست مطالب:

Introduction

Chapter 1: Threats, Attacks, and Vulnerabilities

Chapter 2: Technologies and Tools

Chapter 3: Architecture and Design

Chapter 4: Identity and Access Management

Chapter 5: Risk Management

Chapter 6: Cryptography and PKI

Appendix: Answers to Review Questions

Index

CompTIA Security+ Study Guide Exam SY0‑701

فهرست مطالب:

Table of Contents

Title Page

Copyright

Dedication

Acknowledgments

About the Authors

About the Technical Editor

About the Technical Proofreader

Introduction

Chapter 1: Today’s Security Professional

Chapter 2: Cybersecurity Threat Landscape

Chapter 3: Malicious Code

Chapter 4: Social Engineering and Password Attacks

Chapter 5: Security Assessment and Testing

Chapter 6: Application Security

Chapter 7: Cryptography and the PKI

Chapter 8: Identity and Access Management

Chapter 9: Resilience and Physical Security

Chapter 10: Cloud and Virtualization Security

Chapter 11: Endpoint Security

Chapter 12: Network Security

Chapter 13: Wireless and Mobile Security

Chapter 14: Monitoring and Incident Response

Chapter 15: Digital Forensics

Chapter 16: Security Governance and Compliance

Chapter 17: Risk Management and Privacy

Index

WILEY END USER LICENSE AGREEMENT

CompTIA Security+ Study Guide: Exam SY0-610

فهرست مطالب:

Section 1: Security Aims and Objectives

Section 2: Monitoring the Security Infrastructure

Section 3: Protecting the Security Environment

Section 4: Mock Tests

CompTIA Security+ SY0-701 Digestible Exam Study Guide 2024

فهرست مطالب کتاب CompTIA Security+ SY0-701:

Introduction

General Security Concepts

Threats, Vulnerabilities, and Mitigations

Security Architecture

Security Operations

Security Program Management and Oversight

END

Cryptography and Network Security: Principles and Practice – Eighth Edition (Global Edition)

فهرست مطالب:

Part One: Background

Part Two: Symmetric Ciphers

Part Three: Asymmetric Ciphers

Part Four: Cryptographic Data Integrity Algorithms

Part Five: Mutual Trust

Part Six: Network and Internet Security

Digital Forensics Essentials Professional Series

فهرست مطالب کتاب Digital Forensics Essentials Professional Series:

Module 01: Computer Forensics Fundamentals

Fundamentals of Computer Forensics

Digital Evidence

Forensic Readiness

Roles and Responsibilities of a Forensic Investigator

Legal Compliance in Computer Forensics

Module 02: Computer Forensics Investigation Process

Forensic Investigation Process and its Importance

Forensic Investigation Process – Pre-investigation Phase

Forensic Investigation Process – Investigation Phase

Forensic Investigation Process – Post-investigation Phase

Module 03: Understanding Hard Disks and File Systems

Different Types of Disk Drives and their Characteristics

Logical Structure of a Disk

Booting Process of Windows, Linux, and Mac Operating Systems

File Systems of Windows, Linux, and Mac Operating Systems

File System Examination

Module 04: Data Acquisition and Duplication

Data Acquisition Fundamentals

Types of Data Acquisition

Data Acquisition Format

Data Acquisition Methodology

Module 05: Defeating Anti-forensics Techniques

Anti-forensics and its Techniques

Anti-forensics Countermeasures

Module 06: Windows Forensics

Volatile and Non-Volatile Information

Windows Memory and Registry Analysis

Cache, Cookie, and History Recorded in Web Browsers

Windows Files and Metadata

Module 07: Linux and Mac Forensics

Volatile and Non-Volatile Data in Linux

Analyze Filesystem Images Using The Sleuth Kit

Memory Forensics

Mac Forensics

Module 08: Network Forensics

Network Forensics Fundamentals

Event Correlation Concepts and Types

Identify Indicators of Compromise (IoCs) from Network Logs

Investigate Network Traffic

Module 09: Investigating Web Attacks

Web Application Forensics

IIS and Apache Web Server Logs

Investigating Web Attacks on Windows-based Servers

Detect and Investigate Attacks on Web Applications

Module 10: Dark Web Forensics

Dark Web

Dark Web Forensics

Tor Browser Forensics

Module 11: Investigating Email Crimes

Email Basics

Email Crime Investigation and its Steps

Module 12: Malware Forensics

Malware, its Components and Distribution Methods

Malware Forensics Fundamentals and Recognize Types of Malware Analysis

Static Malware Analysis

Analyze Suspicious Word Documents

Dynamic Malware Analysis

System Behavior Analysis

Network Behavior Analysis

Glossary

References

EC-Council Certified Incident Handler v3 – CEI Material

فهرست مطالب کتاب Certified Incident Handler: Building a Culture of Security:

What Is ECIH

ECIH TRAINING SCHEDULE AND EXAM Information

How to Access Course rel ated material

CLASS MINIMUM REQUIREMENTS, Basic Lab Setup

Requirements, and Lab Setup Environment

What Is EC-COUNCIL CYBERQ

What shoul d you ensure before going to Cl ass

How to Teach ECIH

Where to get help

End-to-End Network Security: Defense-in-Depth

فهرست مطالب:

Introduction

Part I Introduction to Network Security Solutions

Part II Security Lifecycle: Frameworks and Methodologies

Part III Defense-In-Depth Applied

Part IV Case Studies

Index

Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems

فهرست مطالب کتاب Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems:

Acknowledgments

Introduction

Chapter 1: EDR-chitecture

Chapter 2: Function-Hooking DLLs

Chapter 3: Process- and Thread-Creation Notifications

Chapter 4: Object Notifications

Chapter 5: Image-Load and Registry Notifications

Chapter 6: Filesystem Minifilter Drivers

Chapter 7: Network Filter Drivers

Chapter 8: Event Tracing for Windows

Chapter 9: Scanners

Chapter 10: Antimalware Scan Interface

Chapter 11: Early Launch Antimalware Drivers

Chapter 12: Microsoft-Windows-Threat-Intelligence

Chapter 13: Case Study: A Detection-Aware Attack

Appendix: Auxiliary Sources

Index