CompTIA Security+ Study Guide: Exam SY0-610
فهرست مطالب:
Section 1: Security Aims and Objectives
Section 2: Monitoring the Security Infrastructure
Section 3: Protecting the Security Environment
Section 4: Mock Tests
CompTIA Security+ SY0-701 Digestible Exam Study Guide 2024
فهرست مطالب کتاب CompTIA Security+ SY0-701:
Introduction
General Security Concepts
Threats, Vulnerabilities, and Mitigations
Security Architecture
Security Operations
Security Program Management and Oversight
END
Computer and Information Security Handbook
فهرست مطالب کتاب Computer and Information Security Handbook:
Part I: Overview of System and Network Security – A Comprehensive Introduction
Building a Secure Organization
A Cryptography Primer
Preventing System Intrusions
Guarding Against Network Intrusions
Unix and Linux Security
Eliminating the Security Weakness of Linux and Unix Operating Systems
Internet Security
The Botnet Problem
Intranet Security
Local Area Network Security
Wireless Network Security
Cellular Network Security
RFID Security
Part II: Managing Information Security
Information Security Essentials for IT Managers, Protecting Mission-Critical Systems
Security Management Systems
Information Technology Security Management
Identity Management
Intrusion Prevention and Detection Systems
Computer Forensics
Network Forensics
Firewalls
Penetration Testing
What Is Vulnerability Assessment?
Part III: Encryption Technology
Data Encryption
Satellite Encryption
Public Key Infrastructure
Instant-Messaging Security
Part IV: Privacy and Access Management
NET Privacy
Personal Privacy Policies
Virtual Private Networks
Identity Theft
VoIP Security
Part V: Storage Security
SAN Security
Storage Area Networking Devices Security
Risk Management
Part VI: Physical Security
Physical Security Essentials
Biometrics
Homeland Security
Information Warfare
Part VII: Advanced Security
Security Through Diversity
Reputation Management
Content Filtering
Data Loss Protection
Part VIII: Appendices
Appendix A
Appendix B
Appendix C
Appendix D
Appendix E
Appendix F
Appendix G
Appendix H
Appendix I
Appendix J
Computer Forensics: Investigating Network Intrusions and Cyber Crime
فهرست مطالب کتاب Computer Forensics: Investigating Network Intrusions and Cyber Crime:
PREFACE
CHAPTER 1: Network Forensics and Investigating Logs
CHAPTER 2: Investigating Network Traffic
CHAPTER 3: Investigating Web Attacks
CHAPTER 4: Router Forensics
CHAPTER 5: Investigating DoS Attacks
CHAPTER 6: Investigating Internet Crime
CHAPTER 7: Tracking E-Mails and Investigating E-Mail Crime
CHAPTER 8: Investigating Corporate Espionage
CHAPTER 9: Investigating Trademark and Copyright Infringement
CHAPTER 10: Investigating Sexual Harassment Incidents
CHAPTER 11: Investigating Child Pornography
INDEX
Computer Security and Cryptography
فهرست مطالب کتاب Computer Security and Cryptography:
CHAPTER 1: APERITIFS
CHAPTER 2: COLUMNAR TRANSPOSITION
CHAPTER 3: MONOALPHABETIC SUBSTITUTION
CHAPTER 4: POLYALPHABETIC SUBSTITUTION
CHAPTER 5: STATISTICAL TESTS
CHAPTER 6: THE EMERGENCE OF CIPHER MACHINES
CHAPTER 7: THE JAPANESE CIPHER MACHINES
CHAPTER 8: STREAM CIPHERS
CHAPTER 9: BLOCK-CIPHERS: LUCIFER, DES, AND AES
CHAPTER 10: THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY
CHAPTER 11: THE KNAPSACK CRYPTOSYSTEM
CHAPTER 12: THE RSA CRYPTOSYSTEM
CHAPTER 13: PRIME NUMBERS AND FACTORIZATION
CHAPTER 14: THE DISCRETE LOGARITHM PROBLEM
CHAPTER 15: ELLIPTIC CURVE CRYPTOGRAPHY
CHAPTER 16: KEY EXCHANGE IN A NETWORK
CHAPTER 17: DIGITAL SIGNATURES AND AUTHENTICATION
CHAPTER 18: APPLICATIONS OF CRYPTOGRAPHY
CHAPTER 19: CRYPTOGRAPHIC PATENTS
Computer Security Fundamentals Fourth Edition
فهرست مطالب کتاب Computer Security Fundamentals:
Chapter 1. Introduction to Computer Security
Chapter 2. Networks and the Internet
Chapter 3. Cyber Stalking, Fraud, and Abuse
Chapter 4. Denial of Service Attacks
Chapter 5. Malware
Chapter 6. Techniques Used by Hackers
Chapter 7. Industrial Espionage in Cyberspace
Chapter 8. Encryption
Chapter 9. Computer Security Technology
Chapter 10. Security Policies
Chapter 11. Network Scanning and Vulnerability Scanning
Chapter 12. Cyber Terrorism and Information Warfare
Chapter 13. Cyber Detective
Chapter 14. Introduction to Forensics
Chapter 15. Cybersecurity Engineering
Cross‑Site Scripting Attacks: XSS Exploits and Defense
فهرست مطالب کتاب Cross‑Site Scripting Attacks: XSS Exploits and Defense:
Chapter 1: Cross-site Scripting Fundamentals
Chapter 2: The XSS Discovery Toolkit
Chapter 3: XSS Theory
Chapter 4: XSS Attack Methods
Chapter 5: Advanced XSS Attack Vectors
Chapter 6: XSS Exploited
Chapter 7: Exploit Frameworks
Chapter 8: XSS Worms
Chapter 9: Preventing XSS Attacks
Cryptography and Network Security: Principles and Practice – Eighth Edition (Global Edition)
فهرست مطالب:
Part One: Background
Part Two: Symmetric Ciphers
Part Three: Asymmetric Ciphers
Part Four: Cryptographic Data Integrity Algorithms
Part Five: Mutual Trust
Part Six: Network and Internet Security
Digital Forensics Essentials Professional Series
فهرست مطالب کتاب Digital Forensics Essentials Professional Series:
Module 01: Computer Forensics Fundamentals
Fundamentals of Computer Forensics
Digital Evidence
Forensic Readiness
Roles and Responsibilities of a Forensic Investigator
Legal Compliance in Computer Forensics
Module 02: Computer Forensics Investigation Process
Forensic Investigation Process and its Importance
Forensic Investigation Process – Pre-investigation Phase
Forensic Investigation Process – Investigation Phase
Forensic Investigation Process – Post-investigation Phase
Module 03: Understanding Hard Disks and File Systems
Different Types of Disk Drives and their Characteristics
Logical Structure of a Disk
Booting Process of Windows, Linux, and Mac Operating Systems
File Systems of Windows, Linux, and Mac Operating Systems
File System Examination
Module 04: Data Acquisition and Duplication
Data Acquisition Fundamentals
Types of Data Acquisition
Data Acquisition Format
Data Acquisition Methodology
Module 05: Defeating Anti-forensics Techniques
Anti-forensics and its Techniques
Anti-forensics Countermeasures
Module 06: Windows Forensics
Volatile and Non-Volatile Information
Windows Memory and Registry Analysis
Cache, Cookie, and History Recorded in Web Browsers
Windows Files and Metadata
Module 07: Linux and Mac Forensics
Volatile and Non-Volatile Data in Linux
Analyze Filesystem Images Using The Sleuth Kit
Memory Forensics
Mac Forensics
Module 08: Network Forensics
Network Forensics Fundamentals
Event Correlation Concepts and Types
Identify Indicators of Compromise (IoCs) from Network Logs
Investigate Network Traffic
Module 09: Investigating Web Attacks
Web Application Forensics
IIS and Apache Web Server Logs
Investigating Web Attacks on Windows-based Servers
Detect and Investigate Attacks on Web Applications
Module 10: Dark Web Forensics
Dark Web
Dark Web Forensics
Tor Browser Forensics
Module 11: Investigating Email Crimes
Email Basics
Email Crime Investigation and its Steps
Module 12: Malware Forensics
Malware, its Components and Distribution Methods
Malware Forensics Fundamentals and Recognize Types of Malware Analysis
Static Malware Analysis
Analyze Suspicious Word Documents
Dynamic Malware Analysis
System Behavior Analysis
Network Behavior Analysis
Glossary
References
Digital Forensics with Open Source Tools
فهرست مطالب کتاب Digital Forensics with Open Source Tools:
About the Authors
Acknowledgments
Introduction
CHAPTER 1: Digital Forensics with Open Source Tools
CHAPTER 2: Open Source Examination Platform
CHAPTER 3: Disk and File System Analysis
CHAPTER 4: Windows Systems and Artifacts
CHAPTER 5: Linux Systems and Artifacts
CHAPTER 6: Mac OS X Systems and Artifacts
CHAPTER 7: Internet Artifacts
CHAPTER 8: File Analysis
CHAPTER 9: Automating Analysis and Extending Capabilities
Appendix A: Free, Non-open Tools of Note
Index
EC-Council Certified Incident Handler v3 – CEI Material
فهرست مطالب کتاب Certified Incident Handler: Building a Culture of Security:
What Is ECIH
ECIH TRAINING SCHEDULE AND EXAM Information
How to Access Course rel ated material
CLASS MINIMUM REQUIREMENTS, Basic Lab Setup
Requirements, and Lab Setup Environment
What Is EC-COUNCIL CYBERQ
What shoul d you ensure before going to Cl ass
How to Teach ECIH
Where to get help
EC‑Council CEH v13 Appendix – Ethical Hacking Essential Concepts – 1
فهرست مطالب کتاب EC‑Council CEH v13 Appendix – Ethical Hacking Essential Concepts – 1:
ندارد