ICS-410-5 ICS Secutiy Governance
فهرست مطالب:
Building an ICS Cybersecurity Program
Creating ICS Cybersecurit Polic
Disaster Recovery
Measuring Cybersecurity Risk
lncident Response
EXERCISE 5. I : lncident ResponseTabletop Exercise
Final Thoughts and Next Steps
ICS515.1 Threat Intelligence
فهرست مطالب:
Day 1: Threat Intelligence
Day 2: Asset ID’ing and NSM
Day 3: Incident Response
Day 4: Threat and Environment Manipulation
Day 5: Under Attack!
ICS515.2 Asset Identification and Network Security Monitoring
فهرست مطالب:
Case Study: Havex
ICS Asset and Network Visibility
ICS Network Security Monitoring – Collection
ICS Network Security Monitoring – Detection
ICS Network Security Monitoring – Analysis
ICS515.3 Incident Response
فهرست مطالب:
Case Study: German Steelworks Attack
Incident Response and Digital Forensics Overview
Evidence Acquisition
Sources of Forensic Data in ICS Networks
Memory Forensics and Identifying Capabilities
Integrated Timely Analysis
ICS515.4 Threat and Environment Manipulation
فهرست مطالب:
Case Study: BlackEnergy2
ICS Threat and Environment Manipulation Goals and Considerations
Analyzing Acquired Evidence
Case Study: Ukraine Power Grid Attack 2015
Malware Analysis Methodologies
Case Study: CRASHOVERRIDE
Documenting Knowledge
Case Study: TRISIS
LAN Switch Security What Hackers Know About Your Switches
فهرست مطالب کتاب LAN Switch Security What Hackers Know About Your Switches:
Introduction
Part I Vulnerabilities and Mitigation Techniques
Chapter 1 Introduction to Security
Chapter 2 Defeating a Learning Bridge’s Forwarding Process
Chapter 3 Attacking the Spanning Tree Protocol
Chapter 4 Are VLANS Safe?
Chapter 5 Leveraging DHCP Weaknesses
Chapter 6 Exploiting IPv4 ARP
Chapter 7 Exploiting IPv6 Neighbor Discovery and Router Advertisement
Chapter 8 What About Power over Ethernet?
Chapter 9 Is HSRP Resilient?
Chapter 10 Can We Bring VRRP Down?
Chapter 11 Information Leaks with Cisco Ancillary Protocols
Part II How Can a Switch Sustain a Denial of Service Attack?
Chapter 12 Introduction to Denial of Service Attacks
Chapter 13 Control Plane Policing
Chapter 14 Disabling Control Plane Protocols
Chapter 15 Using Switches to Detect a Data Plane DoS
Part III Using Switches to Augment the Network Security
Chapter 16 Wire Speed Access Control Lists
Chapter 17 Identity-Based Networking Services with 802.1X
Part IV What Is Next in LAN Security?
Chapter 18 IEEE 802.1AE
Appendix Combining IPsec with L2TPv3 for Secure Pseudowire
Index
Learn Kali Linux 2019 Perform powerful penetration testing using Kali Linux
فهرست مطالب کتاب Learn Kali Linux 2019:
Section 1: Kali Linux Basics
Chapter 1: Introduction to Hacking
Chapter 2: Setting Up Kali – Part 1
Chapter 3: Setting Up Kali – Part 2
Chapter 4: Getting Comfortable with Kali Linux 2019
Section 2: Reconnaissance
Chapter 5: Passive Information Gathering
Chapter 6: Active Information Gathering
Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019
Chapter 7: Working with Vulnerability Scanners
Chapter 8: Understanding Network Penetration Testing
Chapter 9: Network Penetration Testing – Pre-Connection Attacks
Chapter 10: Network Penetration Testing – Gaining Access
Chapter 11: Network Penetration Testing – Post-Connection Attacks
Chapter 12: Network Penetration Testing – Detection and Security
Chapter 13: Client-Side Attacks – Social Engineering
Chapter 14: Performing Website Penetration Testing
Chapter 15: Website Penetration Testing – Gaining Access
Chapter 16: Best Practices
Linux Essentials for Cybersecurity
فهرست مطالب:
Introduction
Part I: Introducing Linux
Part II: User and Group Accounts
Part III: File and Data Storage
Part IV: Automation
Part V: Networking
Part VI: Process and Log Administration
Part VII: Software Management
Part VIII: Security Tasks
Appendix A: Answers to Review Questions
Appendix B: Resource Guide
Glossary
Index
LPI Security Essentials Study Guide (Exam 020-100)
فهرست مطالب کتاب LPI Security Essentials Study Guide (Exam 020-100):
Introduction
Chapter 1: Using Digital Resources Responsibly
Chapter 2: What Are Vulnerabilities and Threats?
Chapter 3: Controlling Access to Your Assets
Chapter 4: Controlling Network Connections
Chapter 5: Encrypting Your Data at Rest
Chapter 6: Encrypting Your Moving Data
Chapter 7: Risk Assessment
Chapter 8: Configuring System Backups and Monitoring
Chapter 9: Resource Isolation Design Patterns
Appendix: Answers to Review Questions
Index
End User License Agreement
Mastering Cyber Intelligence Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
فهرست مطالب کتاب Mastering Cyber Intelligence:
Preface
1 Cyber Threat Intelligence Life Cycle
2 Requirements and Intelligence Team Implementation
3 Cyber Threat Intelligence Frameworks
4 Cyber Threat Intelligence Tradecraft and Standards
5 Goal Setting, Procedures for CTI Strategy, and Practical Use
6 Cyber Threat Modeling and Adversary Analysis
7 Threat Intelligence Data Sources
8 Effective Defense Tactics and Data Protection
9 AI Applications in Cyber Threat Analytics
10 Threat Modeling and Analysis – Practical Use Cases
11 Usable Security: Threat Intelligence as Part of the Process
12 SIEM Solutions and Intelligence-Driven SOCs
13 Threat Intelligence Metrics, Indicators of Compromise, and
14 Threat Intelligence Reporting and Dissemination
15 Threat Intelligence Sharing and Cyber Activity Attribution – Practical Use Cases
Index
Mastering Kali Linux for Advanced Penetration Testing
فهرست مطالب:
Title Page
Copyright and Credits
Dedication
About Packt
Contributors
Preface
Goal-Based Penetration Testing
Open Source Intelligence and Passive Reconnaissance
Active Reconnaissance of External and Internal Networks
Vulnerability Assessment
Advanced Social Engineering and Physical Security
Wireless Attacks
Exploiting Web-Based Applications
Client-Side Exploitation
Bypassing Security Controls
Exploitation
Action on the Objective and Lateral Movement
Privilege Escalation
Command and Control
Embedded Devices and RFID Hacking
Other Books You May Enjoy