MGT514.2 Security Strategic Planning, Policy, and Leadership Strategic Roadmap Development

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Define Current State

ïVision and Mission

Lab #1: Mission Statement

SWOT Analysis

Lab #2: SWOT Exercise

Develop the Plan

ïVisioning and Innovation

Security Framework

Security Roadmap

Gap Analysis

Lab #3: Roadmap Development

Business Case Development

Deliver the Program

Security Metrics Program

Marketing and Exec Communications

MGT514.3 Security Strategic Planning, Policy, and Leadership Security Policy Development and Assessment

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Purpose of Policy

Policy Pyramid

Develop Policy

Language of Policy

Lab #1: Positive and Negative Voicing

Policy Structure

Policy and Culture

Define Requirements

Development Examples

Lab #2: Vulnerability Management Policy

Manage Policy

Approve, Socialize, and Measure

Assess Policy and Procedure

SMART Approach

Policy Assessment

Lab #3: Cloud Computing Policy

MGT514.4 Security Strategic Planning, Policy, and Leadership Leadership & Management Competencies

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Why Choose Leadership

Understanding Leadership

Lab #1: Management and Leadership

Leadership Essentials

Building Trust

Servant Leadership

Effective Communications

Active Listening

Providing Feedback

Lab #2: Performance Review

Challenging Conversations

Build Effective Teams

Learning to Delegate

Lab #3: Delegation

Coaching, Mentoring, and Sponsorship

Leading Change

MGT514.5 Security Strategic Planning, Policy, and Leadership Strategic Planning Workshop

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Background

Case Study Method

Case Studies

iPremier Case (A)

iPremier Case (B)

iPremier Case (C)

PharmaCo Case (A)

PharmaCo Case (B)

PharmaCo Case (C)

HealthHound Case

Summary

Course Summary

Resources

Network Security Auditing

فهرست مطالب کتاب Network Security Auditing:

Introduction

Chapter 1 The Principles of Auditing

Chapter 2 Information Security and the Law

Chapter 3 Information Security Governance, Frameworks, and Standards

Chapter 4 Auditing Tools and Techniques

Chapter 5 Auditing Cisco Security Solutions

Chapter 6 Policy, Compliance, and Management

Chapter 7 Infrastructure Security

Chapter 8 Perimeter Intrusion Prevention

Chapter 9 Access Control

Chapter 10 Secure Remote Access

Chapter 11 Endpoint Protection

Chapter 12 Unified Communications

Index

Pentesting Active Directory and Windows-based Infrastructure

فهرست مطالب کتاب Pentesting Active Directory and Windows-based Infrastructure:

1 Getting the Lab Ready and Attacking Exchange Server

2 Defense Evasion 25

3 Domain Reconnaissance and Discovery 51

4 Credential Access in Domain 71

5 Lateral Movement in Domain and Across Forests 101

6 Domain Privilege Escalation 141

7 Persistence on Domain Level 179

8 Abusing Active Directory Certificate Services 221

9 Compromising Microsoft SQL Server 267

10 Taking Over WSUS and SCCM

Practical Deployment of Cisco Identity Services Engine

فهرست مطالب کتاب Practical Deployment of Cisco Identity Services Engine:

Chapter 1: Introduction

Chapter 2: ISE Clustering and Basic Setup

Chapter 3: Authentication Methods

Chapter 4: Policy Elements

Chapter 5: Authentication

Chapter 6: Authorization

Chapter 7: Network Access Device Configuration

Chapter 8: ISE Profiling

Chapter 9: ISE Portals and Guest Access

Chapter 10: Deployment Strategies

Chapter 11: ISE Policy Design Practices

Chapter 12: Corporate Authentication Designs

Chapter 13: BYOD Designs

Chapter 14: ISE Posture Assessment

Chapter 15: VPN Integrations

Chapter 16: ISE Reporting and Logging

Chapter 17: ISE CLI

Chapter 18: ISE Administration

Practical Hardware Pentesting Learn attack and defense techniques for embedded sys

فهرست مطالب کتاب Practical Hardware Pentesting:

Practical Hardware Pentesting Second Edition Learn attack and defense

techniques for embedded systems in IoT and other devices

Feedback

Prerequisites the basics you will need

Approach to buying test equipment

The component pantry

Sample labs

Summary

Questions

Feedback

Technical requirements

Introduction to the boards

Why C and not Arduino

The toolchain

Introduction to C

Summary

Questions

Further reading

Feedback

Technical requirements

Understanding I2C

Understanding SPI

Understanding UART

Understanding D1W

Summary

Questions

Feedback

Technical requirements

Finding the data

Extracting the data

Understanding unknown storage structures

Mounting filesystems

Repacking

Summary

Questions

Further reading

Practical Social Engineering A Primer for the Ethical Hacker

فهرست مطالب کتاب Practical Social Engineering:

Acknowledgments

Introduction

PART I: THE BASICS

Chapter 1: What Is Social Engineering?

Chapter 2: Ethical Considerations in Social Engineering

PART II: OFFENSIVE SOCIAL ENGINEERING

Chapter 3: Preparing for an Attack

Chapter 4: Gathering Business OSINT

Chapter 5: Social Media and Public Documents

Chapter 6: Gathering OSINT About People

Chapter 7: Phishing

Chapter 8: Cloning a Landing Page

Chapter 9: Detection, Measurement, and Reporting

PART III: DEFENDING AGAINST SOCIAL ENGINEERING

Chapter 10: Proactive Defense Techniques

Chapter 11: Technical Email Controls

Chapter 12: Producing Threat Intelligence

Appendix A: Scoping Worksheet

Appendix B: Reporting Template

Appendix C: Information-Gathering Worksheet

Appendix D: Pretexting Sample

Appendix E: Exercises to Improve Your Social Engineering

Index

SANS FOR509.1 Microsoft 365 and Graph API

فهرست مطالب کتاب Microsoft 365 and Graph API:

Section 1.1: Introducing SOF-ELK®

Section 1.2: Key Elements of Cloud for DFIR

Section 1.3: Microsoft 365 Unified Audit Log

Section 1.4: Microsoft Graph API

SANS FOR509.2 Microsoft Azure

فهرست مطالب کتاب Microsoft Azure:

Section 2.1: Understanding Azure

Section 2.2: VMs, Networking, and Storage

Section 2.3: Log Sources for IR

Section 2.4: Virtual Machine Logs

Section 2.5: In-Cloud IR