MGT514.2 Security Strategic Planning, Policy, and Leadership Strategic Roadmap Development
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Define Current State
ïVision and Mission
Lab #1: Mission Statement
SWOT Analysis
Lab #2: SWOT Exercise
Develop the Plan
ïVisioning and Innovation
Security Framework
Security Roadmap
Gap Analysis
Lab #3: Roadmap Development
Business Case Development
Deliver the Program
Security Metrics Program
Marketing and Exec Communications
MGT514.3 Security Strategic Planning, Policy, and Leadership Security Policy Development and Assessment
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Purpose of Policy
Policy Pyramid
Develop Policy
Language of Policy
Lab #1: Positive and Negative Voicing
Policy Structure
Policy and Culture
Define Requirements
Development Examples
Lab #2: Vulnerability Management Policy
Manage Policy
Approve, Socialize, and Measure
Assess Policy and Procedure
SMART Approach
Policy Assessment
Lab #3: Cloud Computing Policy
MGT514.4 Security Strategic Planning, Policy, and Leadership Leadership & Management Competencies
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Why Choose Leadership
Understanding Leadership
Lab #1: Management and Leadership
Leadership Essentials
Building Trust
Servant Leadership
Effective Communications
Active Listening
Providing Feedback
Lab #2: Performance Review
Challenging Conversations
Build Effective Teams
Learning to Delegate
Lab #3: Delegation
Coaching, Mentoring, and Sponsorship
Leading Change
MGT514.5 Security Strategic Planning, Policy, and Leadership Strategic Planning Workshop
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Background
Case Study Method
Case Studies
iPremier Case (A)
iPremier Case (B)
iPremier Case (C)
PharmaCo Case (A)
PharmaCo Case (B)
PharmaCo Case (C)
HealthHound Case
Summary
Course Summary
Resources
Network Security Auditing
فهرست مطالب کتاب Network Security Auditing:
Introduction
Chapter 1 The Principles of Auditing
Chapter 2 Information Security and the Law
Chapter 3 Information Security Governance, Frameworks, and Standards
Chapter 4 Auditing Tools and Techniques
Chapter 5 Auditing Cisco Security Solutions
Chapter 6 Policy, Compliance, and Management
Chapter 7 Infrastructure Security
Chapter 8 Perimeter Intrusion Prevention
Chapter 9 Access Control
Chapter 10 Secure Remote Access
Chapter 11 Endpoint Protection
Chapter 12 Unified Communications
Index
Pentesting Active Directory and Windows-based Infrastructure
فهرست مطالب کتاب Pentesting Active Directory and Windows-based Infrastructure:
1 Getting the Lab Ready and Attacking Exchange Server
2 Defense Evasion 25
3 Domain Reconnaissance and Discovery 51
4 Credential Access in Domain 71
5 Lateral Movement in Domain and Across Forests 101
6 Domain Privilege Escalation 141
7 Persistence on Domain Level 179
8 Abusing Active Directory Certificate Services 221
9 Compromising Microsoft SQL Server 267
10 Taking Over WSUS and SCCM
Practical Deployment of Cisco Identity Services Engine
فهرست مطالب کتاب Practical Deployment of Cisco Identity Services Engine:
Chapter 1: Introduction
Chapter 2: ISE Clustering and Basic Setup
Chapter 3: Authentication Methods
Chapter 4: Policy Elements
Chapter 5: Authentication
Chapter 6: Authorization
Chapter 7: Network Access Device Configuration
Chapter 8: ISE Profiling
Chapter 9: ISE Portals and Guest Access
Chapter 10: Deployment Strategies
Chapter 11: ISE Policy Design Practices
Chapter 12: Corporate Authentication Designs
Chapter 13: BYOD Designs
Chapter 14: ISE Posture Assessment
Chapter 15: VPN Integrations
Chapter 16: ISE Reporting and Logging
Chapter 17: ISE CLI
Chapter 18: ISE Administration
Practical Hardware Pentesting Learn attack and defense techniques for embedded sys
فهرست مطالب کتاب Practical Hardware Pentesting:
Practical Hardware Pentesting Second Edition Learn attack and defense
techniques for embedded systems in IoT and other devices
Feedback
Prerequisites the basics you will need
Approach to buying test equipment
The component pantry
Sample labs
Summary
Questions
Feedback
Technical requirements
Introduction to the boards
Why C and not Arduino
The toolchain
Introduction to C
Summary
Questions
Further reading
Feedback
Technical requirements
Understanding I2C
Understanding SPI
Understanding UART
Understanding D1W
Summary
Questions
Feedback
Technical requirements
Finding the data
Extracting the data
Understanding unknown storage structures
Mounting filesystems
Repacking
Summary
Questions
Further reading
Practical Social Engineering A Primer for the Ethical Hacker
فهرست مطالب کتاب Practical Social Engineering:
Acknowledgments
Introduction
PART I: THE BASICS
Chapter 1: What Is Social Engineering?
Chapter 2: Ethical Considerations in Social Engineering
PART II: OFFENSIVE SOCIAL ENGINEERING
Chapter 3: Preparing for an Attack
Chapter 4: Gathering Business OSINT
Chapter 5: Social Media and Public Documents
Chapter 6: Gathering OSINT About People
Chapter 7: Phishing
Chapter 8: Cloning a Landing Page
Chapter 9: Detection, Measurement, and Reporting
PART III: DEFENDING AGAINST SOCIAL ENGINEERING
Chapter 10: Proactive Defense Techniques
Chapter 11: Technical Email Controls
Chapter 12: Producing Threat Intelligence
Appendix A: Scoping Worksheet
Appendix B: Reporting Template
Appendix C: Information-Gathering Worksheet
Appendix D: Pretexting Sample
Appendix E: Exercises to Improve Your Social Engineering
Index
SANS FOR509.1 Microsoft 365 and Graph API
فهرست مطالب کتاب Microsoft 365 and Graph API:
Section 1.1: Introducing SOF-ELK®
Section 1.2: Key Elements of Cloud for DFIR
Section 1.3: Microsoft 365 Unified Audit Log
Section 1.4: Microsoft Graph API
SANS FOR509.2 Microsoft Azure
فهرست مطالب کتاب Microsoft Azure:
Section 2.1: Understanding Azure
Section 2.2: VMs, Networking, and Storage
Section 2.3: Log Sources for IR
Section 2.4: Virtual Machine Logs
Section 2.5: In-Cloud IR