Mastering Linux Security and Hardening, Second Edition

فهرست مطالب کتابMastering Linux Security and Hardening:

Section 1: Setting up a Secure Linux System

Chapter 1: Running Linux in a Virtual Environment

Chapter 2: Securing User Accounts

Chapter 3: Securing Your Server with a Firewall – Part 1

Chapter 4: Securing Your Server with a Firewall – Part 2

Chapter 5: Encryption Technologies

Chapter 6: SSH Hardening

Section 2: Mastering File and Directory Access Control (DAC)

Chapter 7: Mastering Discretionary Access Control

Chapter 8: Access Control Lists and Shared Directory Management

Section 3: Advanced System Hardening Techniques

Chapter 9: Implementing Mandatory Access Control with SELinux and AppArmor

Chapter 10: Kernel Hardening and Process Isolation

Chapter 11: Scanning, Auditing, and Hardening

Chapter 12: Logging and Log Security

Chapter 13: Vulnerability Scanning and Intrusion Detection

Chapter 14: Security Tips and Tricks for the Busy Bee

MCE Microsoft Certified Expert Cybersecurity Architect Study Guide Exam SC-100

فهرست مطالب کتاب MCE Microsoft Certified Expert Cybersecurity Architect Study Guide Exam SC-100:

Introduction

Assessment Test

Chapter 1 Define and Implement an Overall Security Strategy and Architecture

Chapter 2 Define a Security Operations Strategy

Chapter 3 Define an Identity Security Strategy

Chapter 4 Identify a Regulatory Compliance Strategy

Chapter 5 Identify Security Posture and Recommend Technical Strategies to Manage Risk

Chapter 6 Define a Strategy for Securing Infrastructure

Chapter 7 Define a Strategy and Requirements for Securing PaaS, IaaS, and SaaS Services

Chapter 8 Define a Strategy and Requirements for Applications and Data

Chapter 9 Recommend Security Best Practices and Priorities

Appendix Answers to Review Questions

Index

Network Security Auditing

فهرست مطالب کتاب Network Security Auditing:

Introduction

Chapter 1 The Principles of Auditing

Chapter 2 Information Security and the Law

Chapter 3 Information Security Governance, Frameworks, and Standards

Chapter 4 Auditing Tools and Techniques

Chapter 5 Auditing Cisco Security Solutions

Chapter 6 Policy, Compliance, and Management

Chapter 7 Infrastructure Security

Chapter 8 Perimeter Intrusion Prevention

Chapter 9 Access Control

Chapter 10 Secure Remote Access

Chapter 11 Endpoint Protection

Chapter 12 Unified Communications

Index

Pentesting Active Directory and Windows-based Infrastructure

فهرست مطالب کتاب Pentesting Active Directory and Windows-based Infrastructure:

1 Getting the Lab Ready and Attacking Exchange Server

2 Defense Evasion 25

3 Domain Reconnaissance and Discovery 51

4 Credential Access in Domain 71

5 Lateral Movement in Domain and Across Forests 101

6 Domain Privilege Escalation 141

7 Persistence on Domain Level 179

8 Abusing Active Directory Certificate Services 221

9 Compromising Microsoft SQL Server 267

10 Taking Over WSUS and SCCM

Practical Deployment of Cisco Identity Services Engine

فهرست مطالب کتاب Practical Deployment of Cisco Identity Services Engine:

Chapter 1: Introduction

Chapter 2: ISE Clustering and Basic Setup

Chapter 3: Authentication Methods

Chapter 4: Policy Elements

Chapter 5: Authentication

Chapter 6: Authorization

Chapter 7: Network Access Device Configuration

Chapter 8: ISE Profiling

Chapter 9: ISE Portals and Guest Access

Chapter 10: Deployment Strategies

Chapter 11: ISE Policy Design Practices

Chapter 12: Corporate Authentication Designs

Chapter 13: BYOD Designs

Chapter 14: ISE Posture Assessment

Chapter 15: VPN Integrations

Chapter 16: ISE Reporting and Logging

Chapter 17: ISE CLI

Chapter 18: ISE Administration