ICS-410-5 ICS Secutiy Governance

فهرست مطالب:

Building an ICS Cybersecurity Program

Creating ICS Cybersecurit Polic

Disaster Recovery

Measuring Cybersecurity Risk

lncident Response

EXERCISE 5. I : lncident ResponseTabletop Exercise

Final Thoughts and Next Steps

ICS515.1 Threat Intelligence

فهرست مطالب:

Day 1: Threat Intelligence

Day 2: Asset ID’ing and NSM

Day 3: Incident Response

Day 4: Threat and Environment Manipulation

Day 5: Under Attack!

ICS515.2 Asset Identification and Network Security Monitoring

فهرست مطالب:

Case Study: Havex

ICS Asset and Network Visibility

ICS Network Security Monitoring – Collection

ICS Network Security Monitoring – Detection

ICS Network Security Monitoring – Analysis

ICS515.3 Incident Response

فهرست مطالب:

Case Study: German Steelworks Attack

Incident Response and Digital Forensics Overview

Evidence Acquisition

Sources of Forensic Data in ICS Networks

Memory Forensics and Identifying Capabilities

Integrated Timely Analysis

ICS515.4 Threat and Environment Manipulation

فهرست مطالب:

Case Study: BlackEnergy2

ICS Threat and Environment Manipulation Goals and Considerations

Analyzing Acquired Evidence

Case Study: Ukraine Power Grid Attack 2015

Malware Analysis Methodologies

Case Study: CRASHOVERRIDE

Documenting Knowledge

Case Study: TRISIS

LAN Switch Security What Hackers Know About Your Switches

فهرست مطالب کتاب LAN Switch Security What Hackers Know About Your Switches:

Introduction

Part I Vulnerabilities and Mitigation Techniques

Chapter 1 Introduction to Security

Chapter 2 Defeating a Learning Bridge’s Forwarding Process

Chapter 3 Attacking the Spanning Tree Protocol

Chapter 4 Are VLANS Safe?

Chapter 5 Leveraging DHCP Weaknesses

Chapter 6 Exploiting IPv4 ARP

Chapter 7 Exploiting IPv6 Neighbor Discovery and Router Advertisement

Chapter 8 What About Power over Ethernet?

Chapter 9 Is HSRP Resilient?

Chapter 10 Can We Bring VRRP Down?

Chapter 11 Information Leaks with Cisco Ancillary Protocols

Part II How Can a Switch Sustain a Denial of Service Attack?

Chapter 12 Introduction to Denial of Service Attacks

Chapter 13 Control Plane Policing

Chapter 14 Disabling Control Plane Protocols

Chapter 15 Using Switches to Detect a Data Plane DoS

Part III Using Switches to Augment the Network Security

Chapter 16 Wire Speed Access Control Lists

Chapter 17 Identity-Based Networking Services with 802.1X

Part IV What Is Next in LAN Security?

Chapter 18 IEEE 802.1AE

Appendix Combining IPsec with L2TPv3 for Secure Pseudowire

Index

 

Learn Kali Linux 2019 Perform powerful penetration testing using Kali Linux

فهرست مطالب کتاب Learn Kali Linux 2019:

Section 1: Kali Linux Basics

Chapter 1: Introduction to Hacking

Chapter 2: Setting Up Kali – Part 1

Chapter 3: Setting Up Kali – Part 2

Chapter 4: Getting Comfortable with Kali Linux 2019

Section 2: Reconnaissance

Chapter 5: Passive Information Gathering

Chapter 6: Active Information Gathering

Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019

Chapter 7: Working with Vulnerability Scanners

Chapter 8: Understanding Network Penetration Testing

Chapter 9: Network Penetration Testing – Pre-Connection Attacks

Chapter 10: Network Penetration Testing – Gaining Access

Chapter 11: Network Penetration Testing – Post-Connection Attacks

Chapter 12: Network Penetration Testing – Detection and Security

Chapter 13: Client-Side Attacks – Social Engineering

Chapter 14: Performing Website Penetration Testing

Chapter 15: Website Penetration Testing – Gaining Access

Chapter 16: Best Practices

Linux Essentials for Cybersecurity

فهرست مطالب:

Introduction

Part I: Introducing Linux

Part II: User and Group Accounts

Part III: File and Data Storage

Part IV: Automation

Part V: Networking

Part VI: Process and Log Administration

Part VII: Software Management

Part VIII: Security Tasks

Appendix A: Answers to Review Questions

Appendix B: Resource Guide

Glossary

Index

LPI Security Essentials Study Guide (Exam 020-100)

فهرست مطالب کتاب LPI Security Essentials Study Guide (Exam 020-100):

Introduction

Chapter 1: Using Digital Resources Responsibly

Chapter 2: What Are Vulnerabilities and Threats?

Chapter 3: Controlling Access to Your Assets

Chapter 4: Controlling Network Connections

Chapter 5: Encrypting Your Data at Rest

Chapter 6: Encrypting Your Moving Data

Chapter 7: Risk Assessment

Chapter 8: Configuring System Backups and Monitoring

Chapter 9: Resource Isolation Design Patterns

Appendix: Answers to Review Questions

Index

End User License Agreement

Mastering Cyber Intelligence Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

فهرست مطالب کتاب Mastering Cyber Intelligence: 

Preface

1 Cyber Threat Intelligence Life Cycle

2 Requirements and Intelligence Team Implementation

3 Cyber Threat Intelligence Frameworks

4 Cyber Threat Intelligence Tradecraft and Standards

5 Goal Setting, Procedures for CTI Strategy, and Practical Use

6 Cyber Threat Modeling and Adversary Analysis

7 Threat Intelligence Data Sources

8 Effective Defense Tactics and Data Protection

9 AI Applications in Cyber Threat Analytics

10 Threat Modeling and Analysis – Practical Use Cases

11 Usable Security: Threat Intelligence as Part of the Process

12 SIEM Solutions and Intelligence-Driven SOCs

13 Threat Intelligence Metrics, Indicators of Compromise, and

14 Threat Intelligence Reporting and Dissemination

15 Threat Intelligence Sharing and Cyber Activity Attribution – Practical Use Cases

Index

Mastering Kali Linux for Advanced Penetration Testing

فهرست مطالب:

Title Page

Copyright and Credits

Dedication

About Packt

Contributors

Preface

Goal-Based Penetration Testing

Open Source Intelligence and Passive Reconnaissance

Active Reconnaissance of External and Internal Networks

Vulnerability Assessment

Advanced Social Engineering and Physical Security

Wireless Attacks

Exploiting Web-Based Applications

Client-Side Exploitation

Bypassing Security Controls

Exploitation

Action on the Objective and Lateral Movement

Privilege Escalation

Command and Control

Embedded Devices and RFID Hacking

Other Books You May Enjoy