Exam Ref 70-742 Identity with Windows Server 2016

فهرست مطالب کتاب Exam Ref 70-742 Identity with Windows Server 201:

Introduction

Preparing for the exam

CHAPTER 1 Install and configure Active Directory Domain Services

CHAPTER 2 Manage and maintain AD DS

CHAPTER 3 Create and manage Group Policy

CHAPTER 4 Implement Active Directory Certificate Services

CHAPTER 5 Implement identity federation and access solutions

Index

Exam Ref 70-744 Securing Windows Server 2016

فهرست مطالب کتاب Exam Ref 70-744 Securing Windows Server 2016:

Introduction

Preparing for the exam

CHAPTER 1 Implement server hardening solutions

CHAPTER 2 Secure a Virtualization Infrastructure

CHAPTER 3 Secure a network infrastructure

CHAPTER 4 Manage Privileged Identities

CHAPTER 5 Implement threat detection solutions

CHAPTER 6 Implement workload-specific security

Index

Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals (Second Edition)

فهرست مطالب کتاب Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals:

Acknowledgments

About the authors

Introduction

CHAPTER 1: Describe the concepts of security, compliance, and identity

CHAPTER 2: Microsoft identity and access management solutions

CHAPTER 3: Capabilities of Microsoft security solutions

CHAPTER 4: Describe the capabilities of Microsoft compliance solutions

CHAPTER 5: SC-900 Microsoft Security, Compliance, and Identity Fundamentals exam updates

Index

Hacking with Python The Ultimate Beginners Guide

فهرست مطالب Hacking with Python The Ultimate Beginners Guide:

Chapter 1: Preparation For Hacking

Chapter 2: Python Basics

Chapter 3: Writing Python Programs

Chapter 5: Operators and Expressions

Chapter 6: Functions and Modules

Chapter 7: Setting Up for Hacking

Chapter 8: Network Hacking

Chapter 9: Hacks for the Web

Chapter 10: Understanding Attacks Using Python

Chapter 11: Other Nifty Hacks to Try

Conclusion

Bonus: Preview Of ‘Introduction to Python 3

IAPP CIPM Certified Information Privacy Manager Study Guide

فهرست مطالب کتاب IAPP CIPM Certified Information Privacy Manager Study Guide:

Introduction

Chapter 1: Developing a Privacy Program

Chapter 2: Privacy Program Framework

Chapter 3: Privacy Operational Life Cycle: Assess

Chapter 4: Privacy Operational Life Cycle: Protect

Chapter 5: Privacy Operational Life Cycle: Sustain

Chapter 6: Privacy Operational Life Cycle: Respond

Index

ICS-410-1 ICS Ovenriew

فهرست مطالب:

GICSP Overview

ICS Concepts

EXERCISE l.l: Learningfrom Peers

Purdue Levels 0 and I

ExERcısE l.2: Programming a PLC

Purdue Levels 2 and 3

scADA

ExERcısE l.3: Programmingan HMl

lT and ICS Differences

Physical and Cybersecurity

Secure ICS Network Architectures

EXERCISE 1.4: Architecting a Secure DCS

ICS-410-2: Field Devices and Controllers

فهرست مطالب:

ICS Attack Surhce

Purdue Level 0 and I Attacks

Control Things Platform

ExERcısE 2. l: Finding Passwords in EEPRoM Dumps

Level 0 and I Technologies

ExERcısE 2.2: Exploring Fieldbus Protocols

Purdue Level 0 and I Defenses

Ethernet and TCP/lP

ExERcısE 2.3: Network Capture Analysis

ICS Protocols overTCP/IP

Attack on Networks

ExERcısE 2’4: Enumerating ModbusTCP

ICS-410-3: Supervisory Systems

فهرست مطالب:

Enforcement Zone Devices

Understanding Basic Cryptography

WirelessTechnologies

Wireless Attacks and Defenses

ExERcısE 3.I: Network Forensics of an Attack

Purdue Level 2 and 3 Attacks

Historians and Databases

ExERcIsE 3.2ı BypassingAuthentication with SQL lnjection

HMI and UlAtocks

Password Defenses

ExERcısE 3.3: Password Fuzzing

ICS-410-4: Workstations and Servers

فهرست مطالب:

Patching ICS Systems

Defending Microsoft Windows

EXERCISE 4.1 : Baselining with PowerShell

Defending Unix and Linux

Endpoint Security Software

EXERC I SE 4.2: Configuring Host-Based Firewalls

Event Logging and Analysis

ExERcısE 4.3: Windows Event Logs

Honeypots

Attacks on the Perimeter

ExERcısE 4.4: Finding Remote Access

ICS-410-5 ICS Secutiy Governance

فهرست مطالب:

Building an ICS Cybersecurity Program

Creating ICS Cybersecurit Polic

Disaster Recovery

Measuring Cybersecurity Risk

lncident Response

EXERCISE 5. I : lncident ResponseTabletop Exercise

Final Thoughts and Next Steps

ICS515.1 Threat Intelligence

فهرست مطالب:

Day 1: Threat Intelligence

Day 2: Asset ID’ing and NSM

Day 3: Incident Response

Day 4: Threat and Environment Manipulation

Day 5: Under Attack!