CompTIA PenTest+ Study Guide (Exam PT0-001)
فهرست مطالب:
Introduction
Assessment Test
Chapter 1 Penetration Testing
Chapter 2 Planning and Scoping Penetration Tests
Chapter 3 Information Gathering
Chapter 4 Vulnerability Scanning
Chapter 5 Analyzing Vulnerability Scans
Chapter 6 Exploit and Pivot
Chapter 7 Exploiting Network Vulnerabilities
Chapter 8 Exploiting Physical and Social Vulnerabilities
Chapter 9 Exploiting Application Vulnerabilities
Chapter 10 Exploiting Host Vulnerabilities
Chapter 11 Scripting for Penetration Testing
Chapter 12 Reporting and Communication
Appendix Answers to Review Questions
Index
CompTIA PenTest+ Study Guide Exam PT0-001
فهرست مطالب
Introduction
Assessment Test
Chapter 1: Penetration Testing
Chapter 2: Planning and Scoping Penetration Tests
Chapter 3: Information Gathering
Chapter 4: Vulnerability Scanning
Chapter 5: Analyzing Vulnerability Scans
Chapter 6: Exploit and Pivot
Chapter 7: Exploiting Network Vulnerabilities
Chapter 8: Exploiting Physical and Social Vulnerabilities
Chapter 9: Exploiting Application Vulnerabilities
Chapter 10: Exploiting Host Vulnerabilities
Chapter 11: Scripting for Penetration Testing
Chapter 12: Reporting and Communication
Appendix: Answers to Review Questions
Index
CompTIA Security+ All-in-One Exam Guide (Exam SY0-501)
فهرست مطالب:
Part I Threats, Attacks, and Vulnerabilities
Part II Technologies and Tools
Part III Architecture and Design
Part IV Identity and Access Management
Part V Risk Management
Part VI Cryptography and Public Key Infrastructure
Part VII Appendixes and Glossary
Appendix A OSI Model and Internet Protocols
Appendix B About the Download
CompTIA Security+ Review Guide SY0-501
فهرست مطالب:
Introduction
Chapter 1: Threats, Attacks, and Vulnerabilities
Chapter 2: Technologies and Tools
Chapter 3: Architecture and Design
Chapter 4: Identity and Access Management
Chapter 5: Risk Management
Chapter 6: Cryptography and PKI
Appendix: Answers to Review Questions
Index
CompTIA Security+ Study Guide Exam SY0‑701
فهرست مطالب:
Table of Contents
Title Page
Copyright
Dedication
Acknowledgments
About the Authors
About the Technical Editor
About the Technical Proofreader
Introduction
Chapter 1: Today’s Security Professional
Chapter 2: Cybersecurity Threat Landscape
Chapter 3: Malicious Code
Chapter 4: Social Engineering and Password Attacks
Chapter 5: Security Assessment and Testing
Chapter 6: Application Security
Chapter 7: Cryptography and the PKI
Chapter 8: Identity and Access Management
Chapter 9: Resilience and Physical Security
Chapter 10: Cloud and Virtualization Security
Chapter 11: Endpoint Security
Chapter 12: Network Security
Chapter 13: Wireless and Mobile Security
Chapter 14: Monitoring and Incident Response
Chapter 15: Digital Forensics
Chapter 16: Security Governance and Compliance
Chapter 17: Risk Management and Privacy
Index
WILEY END USER LICENSE AGREEMENT
CompTIA Security+ Study Guide: Exam SY0-610
فهرست مطالب:
Section 1: Security Aims and Objectives
Section 2: Monitoring the Security Infrastructure
Section 3: Protecting the Security Environment
Section 4: Mock Tests
CompTIA Security+ SY0-701 Digestible Exam Study Guide 2024
فهرست مطالب کتاب CompTIA Security+ SY0-701:
Introduction
General Security Concepts
Threats, Vulnerabilities, and Mitigations
Security Architecture
Security Operations
Security Program Management and Oversight
END
Cryptography and Network Security: Principles and Practice – Eighth Edition (Global Edition)
فهرست مطالب:
Part One: Background
Part Two: Symmetric Ciphers
Part Three: Asymmetric Ciphers
Part Four: Cryptographic Data Integrity Algorithms
Part Five: Mutual Trust
Part Six: Network and Internet Security
Digital Forensics Essentials Professional Series
فهرست مطالب کتاب Digital Forensics Essentials Professional Series:
Module 01: Computer Forensics Fundamentals
Fundamentals of Computer Forensics
Digital Evidence
Forensic Readiness
Roles and Responsibilities of a Forensic Investigator
Legal Compliance in Computer Forensics
Module 02: Computer Forensics Investigation Process
Forensic Investigation Process and its Importance
Forensic Investigation Process – Pre-investigation Phase
Forensic Investigation Process – Investigation Phase
Forensic Investigation Process – Post-investigation Phase
Module 03: Understanding Hard Disks and File Systems
Different Types of Disk Drives and their Characteristics
Logical Structure of a Disk
Booting Process of Windows, Linux, and Mac Operating Systems
File Systems of Windows, Linux, and Mac Operating Systems
File System Examination
Module 04: Data Acquisition and Duplication
Data Acquisition Fundamentals
Types of Data Acquisition
Data Acquisition Format
Data Acquisition Methodology
Module 05: Defeating Anti-forensics Techniques
Anti-forensics and its Techniques
Anti-forensics Countermeasures
Module 06: Windows Forensics
Volatile and Non-Volatile Information
Windows Memory and Registry Analysis
Cache, Cookie, and History Recorded in Web Browsers
Windows Files and Metadata
Module 07: Linux and Mac Forensics
Volatile and Non-Volatile Data in Linux
Analyze Filesystem Images Using The Sleuth Kit
Memory Forensics
Mac Forensics
Module 08: Network Forensics
Network Forensics Fundamentals
Event Correlation Concepts and Types
Identify Indicators of Compromise (IoCs) from Network Logs
Investigate Network Traffic
Module 09: Investigating Web Attacks
Web Application Forensics
IIS and Apache Web Server Logs
Investigating Web Attacks on Windows-based Servers
Detect and Investigate Attacks on Web Applications
Module 10: Dark Web Forensics
Dark Web
Dark Web Forensics
Tor Browser Forensics
Module 11: Investigating Email Crimes
Email Basics
Email Crime Investigation and its Steps
Module 12: Malware Forensics
Malware, its Components and Distribution Methods
Malware Forensics Fundamentals and Recognize Types of Malware Analysis
Static Malware Analysis
Analyze Suspicious Word Documents
Dynamic Malware Analysis
System Behavior Analysis
Network Behavior Analysis
Glossary
References
EC-Council Certified Incident Handler v3 – CEI Material
فهرست مطالب کتاب Certified Incident Handler: Building a Culture of Security:
What Is ECIH
ECIH TRAINING SCHEDULE AND EXAM Information
How to Access Course rel ated material
CLASS MINIMUM REQUIREMENTS, Basic Lab Setup
Requirements, and Lab Setup Environment
What Is EC-COUNCIL CYBERQ
What shoul d you ensure before going to Cl ass
How to Teach ECIH
Where to get help
End-to-End Network Security: Defense-in-Depth
فهرست مطالب:
Introduction
Part I Introduction to Network Security Solutions
Part II Security Lifecycle: Frameworks and Methodologies
Part III Defense-In-Depth Applied
Part IV Case Studies
Index
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems
فهرست مطالب کتاب Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems:
Acknowledgments
Introduction
Chapter 1: EDR-chitecture
Chapter 2: Function-Hooking DLLs
Chapter 3: Process- and Thread-Creation Notifications
Chapter 4: Object Notifications
Chapter 5: Image-Load and Registry Notifications
Chapter 6: Filesystem Minifilter Drivers
Chapter 7: Network Filter Drivers
Chapter 8: Event Tracing for Windows
Chapter 9: Scanners
Chapter 10: Antimalware Scan Interface
Chapter 11: Early Launch Antimalware Drivers
Chapter 12: Microsoft-Windows-Threat-Intelligence
Chapter 13: Case Study: A Detection-Aware Attack
Appendix: Auxiliary Sources
Index