ICS515.1 Threat Intelligence

فهرست مطالب:

Day 1: Threat Intelligence

Day 2: Asset ID’ing and NSM

Day 3: Incident Response

Day 4: Threat and Environment Manipulation

Day 5: Under Attack!

ICS515.2 Asset Identification and Network Security Monitoring

فهرست مطالب:

Case Study: Havex

ICS Asset and Network Visibility

ICS Network Security Monitoring – Collection

ICS Network Security Monitoring – Detection

ICS Network Security Monitoring – Analysis

ICS515.3 Incident Response

فهرست مطالب:

Case Study: German Steelworks Attack

Incident Response and Digital Forensics Overview

Evidence Acquisition

Sources of Forensic Data in ICS Networks

Memory Forensics and Identifying Capabilities

Integrated Timely Analysis

ICS515.4 Threat and Environment Manipulation

فهرست مطالب:

Case Study: BlackEnergy2

ICS Threat and Environment Manipulation Goals and Considerations

Analyzing Acquired Evidence

Case Study: Ukraine Power Grid Attack 2015

Malware Analysis Methodologies

Case Study: CRASHOVERRIDE

Documenting Knowledge

Case Study: TRISIS

IIS 10 Essentials for Administration (IT Pro Solutions)

فهرست مطالب کتاب IIS 10 Essentials for Administration (IT Pro Solutions):

Part 1. Deploying IIS 10

Chapter 1. IIS 10 Running Start

Chapter 2. Planning for IIS 10

Part 2. Core IIS 10 Administration

Chapter 4. Navigating IIS 10 Architecture

Chapter 5. Managing IIS Servers & Services

Chapter 6. Managing IIS 10 from the Prompt

Chapter 7. Using Management Objects for Administration

Chapter 8. Digging into IIS Schema

Chapter 9. Managing Global IIS Configuration

Part 3. Creating Customized IIS Solutions

Chapter 10. Building Dynamic Websites

Chapter 11. Configuring Directories for Websites

Chapter 12. Customizing Web Server Content

Chapter 13. Web Stats 101

Chapter 14. Configuring Logging

Implementing Cisco Networking Solutions Configure, implement, and manage complex network designs

فهرست مطالب کتاب Implementing Cisco Networking Solutions:

Network Building Essentials

Networks for Digital Enterprises

Components of the Enterprise Network

Understanding and Configuring Campus Network Technologies

Understanding and Configuring Wireless Access Technologies

Understanding and Configuring WAN Technologies

Understanding and Configuring Data Center Technologies

Understanding and Configuring Network Security

Understanding and Configuring Quality of Service

A Systematic Approach to Network Management

Basic Troubleshooting Skills and Techniques

Implementing Domain‑Driven Design

فهرست مطالب کتاب Implementing DomainDriven Design:

Chapter 1: Getting Started with DDD

Chapter 2: Domains, Subdomains, and Bounded Contexts

Chapter 3: Context Maps

Chapter 4: Architecture

Chapter 5: Entities

Chapter 6: Value Objects

Chapter 7: Services

Chapter 8: Domain Events

Chapter 9: Modules

Chapter 10: Aggregates

Chapter 11: Factories

Chapter 12: Repositories

Chapter 13: Integrating Bounded Contexts

Chapter 14: Application

Implementing VMware Horizon 7.7 – Third Edition

فهرست مطالب:

Preface

VMware Horizon Infrastructure Overview

Implementing Horizon Connection Server

Implementing Horizon Composer

Implementing Horizon Security Server

Implementing Horizon Unified Access Gateway

Implementing a Horizon Cloud Pod

Creating Horizon Desktop Pools

Implementing the Microsoft Remote Desktop Services Application and Desktop Pools

Performing Horizon Pool Maintenance

Creating a Master Virtual Desktop Image

Implementing User Environment Manager

Implementing the Just-in-Time Management Platform (JMP)

Using Horizon PowerCLI

Assessments

Information Security Fundamentals

فهرست مطالب کتاب Information Security Fundamentals:

Chapter 1 Overview

Chapter 2 Threats to Information Security

Chapter 3 The Structure of an Information Security Program

Chapter 4 Information Security Policies

Chapter 5 Asset Classification

Chapter 6 Access Control

Chapter 7 Physical Security

Chapter 8 Risk Analysis and Risk Management

Chapter 9 Business Continuity Planning

Glossary

Bibliography

Information Security Management Handbook (Fifth Edition)

فهرست مطالب کتاب Information Security Management Handbook:

Introduction

  1. 1. ACCESS CONTROL SYSTEMS AND METHODOLOGY

Section 1.1 Access Control Techniques

Section 1.2 Access Control Administration

Section 1.3 Identification and Authentication Techniques

Section 1.4 Access Control Methodologies and Implementation

Section 1.5 Methods of Attack

Section 1.6 Monitoring and Penetration Testing

  1. 2. TELECOMMUNICATIONS, NETWORK, AND INTERNET SECURITY

Section 2.1 Communications and Network Security

Section 2.2 Internet/Intranet/Extranet

Section 2.3 E-mail Security

Section 2.4 Secure Voice Communications

Section 2.5 Network Attacks and Countermeasures

  1. 3. INFORMATION SECURITY MANAGEMENT

Section 3.1 Security Management Concepts and Principles

Section 3.2 Change Control Management

Section 3.3 Data Classification

Section 3.4 Risk Management

Section 3.5 Employment Policies and Practices

Section 3.6 Risk Management

Section 3.7 Security Awareness Training

Section 3.8 Security Management Planning

  1. 4. APPLICATION PROGRAM SECURITY

Section 4.1 Application Issues

Section 4.2 Databases and Data Warehousing

Section 4.3 Systems Development Controls

Section 4.4 Malicious Code

Section 4.5 Methods of Attack

  1. 5. CRYPTOGRAPHY

Section 5.1 Use of Cryptography

Section 5.2 Cryptographic Concepts, Methodologies, and Practices

Section 5.3 Private Key Algorithms

Section 5.4 Public Key Infrastructure (PKI)

Section 5.5 System Architecture for Implementing Cryptographic Functions

Section 5.6 Methods of Attack

  1. 6. ENTERPRISE SECURITY ARCHITECTURE

Section 6.1 Principles of Computer and Network Organizations, Architectures, and Designs

Section 6.2 Principles of Security Models, Architectures and Evaluation Criteria

Section 6.3 Common Flaws and Security Issues — System Architecture and Design

  1. 7. OPERATIONS SECURITY

Section 7.1 Concepts

Section 7.2 Resource Protection Requirements

Section 7.3 Auditing

Section 7.4 Intrusion Detection

Section 7.5 Operations Controls

  1. 8. BUSINESS CONTINUITY PLANNING

Section 8.1 Business Continuity Planning

Section 8.2 Disaster Recovery Planning

Section 8.3 Elements of Business Continuity Planning

  1. 9. LAW, INVESTIGATION, AND ETHICS

Section 9.1 Information Law

Section 9.2 Investigations

Section 9.3 Major Categories of Computer Crime

Section 9.4 Incident Handling

Section 9.5 Ethics

  1. 10. PHYSICAL SECURITY

Section 10.1 Facility Requirements

Section 10.2 Technical Controls

Section 10.3 Environment and Life Safety

Information Security: Principles and Practice

فهرست مطالب کتاب Information Security: Principles and Practice:

INTRODUCTION

CRYPTO

CRYPTO BASICS

SYMMETRIC KEY CRYPTO

PUBLIC KEY CRYPTO

HASH FUNCTIONS AND OTHER TOPICS

ADVANCED CRYPTANALYSIS

ACCESS CONTROL

AUTHENTICATION

AUTHORIZATION

PROTOCOLS

SIMPLE AUTHENTICATION PROTOCOLS

REAL-WORLD SECURITY PROTOCOLS

SOFTWARE

SOFTWARE FLAWS AND MALWARE

INSECURITY IN SOFTWARE

OPERATING SYSTEMS AND SECURITY

APPENDIX

ANNOTATED BIBLIOGRAPHY

INDEX

Installing and Configuring Windows Server 2012 (Exam Ref 70-410)

فهرست مطالب Installing and Configuring Windows Server 2012:

Introduction

CHAPTER 1 Installing and configuring servers

CHAPTER 2 Configure server roles and features

CHAPTER 3 Configure Hyper-V

CHAPTER 4 Deploying and configuring core network services

CHAPTER 5 Install and administer Active Directory

CHAPTER 6 Create and manage Group Policy