Mastering Linux Security and Hardening, Second Edition
فهرست مطالب کتابMastering Linux Security and Hardening:
Section 1: Setting up a Secure Linux System
Chapter 1: Running Linux in a Virtual Environment
Chapter 2: Securing User Accounts
Chapter 3: Securing Your Server with a Firewall – Part 1
Chapter 4: Securing Your Server with a Firewall – Part 2
Chapter 5: Encryption Technologies
Chapter 6: SSH Hardening
Section 2: Mastering File and Directory Access Control (DAC)
Chapter 7: Mastering Discretionary Access Control
Chapter 8: Access Control Lists and Shared Directory Management
Section 3: Advanced System Hardening Techniques
Chapter 9: Implementing Mandatory Access Control with SELinux and AppArmor
Chapter 10: Kernel Hardening and Process Isolation
Chapter 11: Scanning, Auditing, and Hardening
Chapter 12: Logging and Log Security
Chapter 13: Vulnerability Scanning and Intrusion Detection
Chapter 14: Security Tips and Tricks for the Busy Bee
MCE Microsoft Certified Expert Cybersecurity Architect Study Guide Exam SC-100
فهرست مطالب کتاب MCE Microsoft Certified Expert Cybersecurity Architect Study Guide Exam SC-100:
Introduction
Assessment Test
Chapter 1 Define and Implement an Overall Security Strategy and Architecture
Chapter 2 Define a Security Operations Strategy
Chapter 3 Define an Identity Security Strategy
Chapter 4 Identify a Regulatory Compliance Strategy
Chapter 5 Identify Security Posture and Recommend Technical Strategies to Manage Risk
Chapter 6 Define a Strategy for Securing Infrastructure
Chapter 7 Define a Strategy and Requirements for Securing PaaS, IaaS, and SaaS Services
Chapter 8 Define a Strategy and Requirements for Applications and Data
Chapter 9 Recommend Security Best Practices and Priorities
Appendix Answers to Review Questions
Index
Network Security Auditing
فهرست مطالب کتاب Network Security Auditing:
Introduction
Chapter 1 The Principles of Auditing
Chapter 2 Information Security and the Law
Chapter 3 Information Security Governance, Frameworks, and Standards
Chapter 4 Auditing Tools and Techniques
Chapter 5 Auditing Cisco Security Solutions
Chapter 6 Policy, Compliance, and Management
Chapter 7 Infrastructure Security
Chapter 8 Perimeter Intrusion Prevention
Chapter 9 Access Control
Chapter 10 Secure Remote Access
Chapter 11 Endpoint Protection
Chapter 12 Unified Communications
Index
Pentesting Active Directory and Windows-based Infrastructure
فهرست مطالب کتاب Pentesting Active Directory and Windows-based Infrastructure:
1 Getting the Lab Ready and Attacking Exchange Server
2 Defense Evasion 25
3 Domain Reconnaissance and Discovery 51
4 Credential Access in Domain 71
5 Lateral Movement in Domain and Across Forests 101
6 Domain Privilege Escalation 141
7 Persistence on Domain Level 179
8 Abusing Active Directory Certificate Services 221
9 Compromising Microsoft SQL Server 267
10 Taking Over WSUS and SCCM
Practical Deployment of Cisco Identity Services Engine
فهرست مطالب کتاب Practical Deployment of Cisco Identity Services Engine:
Chapter 1: Introduction
Chapter 2: ISE Clustering and Basic Setup
Chapter 3: Authentication Methods
Chapter 4: Policy Elements
Chapter 5: Authentication
Chapter 6: Authorization
Chapter 7: Network Access Device Configuration
Chapter 8: ISE Profiling
Chapter 9: ISE Portals and Guest Access
Chapter 10: Deployment Strategies
Chapter 11: ISE Policy Design Practices
Chapter 12: Corporate Authentication Designs
Chapter 13: BYOD Designs
Chapter 14: ISE Posture Assessment
Chapter 15: VPN Integrations
Chapter 16: ISE Reporting and Logging
Chapter 17: ISE CLI
Chapter 18: ISE Administration