ICS515.1 Threat Intelligence
فهرست مطالب:
Day 1: Threat Intelligence
Day 2: Asset ID’ing and NSM
Day 3: Incident Response
Day 4: Threat and Environment Manipulation
Day 5: Under Attack!
ICS515.2 Asset Identification and Network Security Monitoring
فهرست مطالب:
Case Study: Havex
ICS Asset and Network Visibility
ICS Network Security Monitoring – Collection
ICS Network Security Monitoring – Detection
ICS Network Security Monitoring – Analysis
ICS515.3 Incident Response
فهرست مطالب:
Case Study: German Steelworks Attack
Incident Response and Digital Forensics Overview
Evidence Acquisition
Sources of Forensic Data in ICS Networks
Memory Forensics and Identifying Capabilities
Integrated Timely Analysis
ICS515.4 Threat and Environment Manipulation
فهرست مطالب:
Case Study: BlackEnergy2
ICS Threat and Environment Manipulation Goals and Considerations
Analyzing Acquired Evidence
Case Study: Ukraine Power Grid Attack 2015
Malware Analysis Methodologies
Case Study: CRASHOVERRIDE
Documenting Knowledge
Case Study: TRISIS
IIS 10 Essentials for Administration (IT Pro Solutions)
فهرست مطالب کتاب IIS 10 Essentials for Administration (IT Pro Solutions):
Part 1. Deploying IIS 10
Chapter 1. IIS 10 Running Start
Chapter 2. Planning for IIS 10
Part 2. Core IIS 10 Administration
Chapter 4. Navigating IIS 10 Architecture
Chapter 5. Managing IIS Servers & Services
Chapter 6. Managing IIS 10 from the Prompt
Chapter 7. Using Management Objects for Administration
Chapter 8. Digging into IIS Schema
Chapter 9. Managing Global IIS Configuration
Part 3. Creating Customized IIS Solutions
Chapter 10. Building Dynamic Websites
Chapter 11. Configuring Directories for Websites
Chapter 12. Customizing Web Server Content
Chapter 13. Web Stats 101
Chapter 14. Configuring Logging
Implementing Cisco Networking Solutions Configure, implement, and manage complex network designs
فهرست مطالب کتاب Implementing Cisco Networking Solutions:
Network Building Essentials
Networks for Digital Enterprises
Components of the Enterprise Network
Understanding and Configuring Campus Network Technologies
Understanding and Configuring Wireless Access Technologies
Understanding and Configuring WAN Technologies
Understanding and Configuring Data Center Technologies
Understanding and Configuring Network Security
Understanding and Configuring Quality of Service
A Systematic Approach to Network Management
Basic Troubleshooting Skills and Techniques
Implementing Domain‑Driven Design
فهرست مطالب کتاب Implementing Domain‑Driven Design:
Chapter 1: Getting Started with DDD
Chapter 2: Domains, Subdomains, and Bounded Contexts
Chapter 3: Context Maps
Chapter 4: Architecture
Chapter 5: Entities
Chapter 6: Value Objects
Chapter 7: Services
Chapter 8: Domain Events
Chapter 9: Modules
Chapter 10: Aggregates
Chapter 11: Factories
Chapter 12: Repositories
Chapter 13: Integrating Bounded Contexts
Chapter 14: Application
Implementing VMware Horizon 7.7 – Third Edition
فهرست مطالب:
Preface
VMware Horizon Infrastructure Overview
Implementing Horizon Connection Server
Implementing Horizon Composer
Implementing Horizon Security Server
Implementing Horizon Unified Access Gateway
Implementing a Horizon Cloud Pod
Creating Horizon Desktop Pools
Implementing the Microsoft Remote Desktop Services Application and Desktop Pools
Performing Horizon Pool Maintenance
Creating a Master Virtual Desktop Image
Implementing User Environment Manager
Implementing the Just-in-Time Management Platform (JMP)
Using Horizon PowerCLI
Assessments
Information Security Fundamentals
فهرست مطالب کتاب Information Security Fundamentals:
Chapter 1 Overview
Chapter 2 Threats to Information Security
Chapter 3 The Structure of an Information Security Program
Chapter 4 Information Security Policies
Chapter 5 Asset Classification
Chapter 6 Access Control
Chapter 7 Physical Security
Chapter 8 Risk Analysis and Risk Management
Chapter 9 Business Continuity Planning
Glossary
Bibliography
Information Security Management Handbook (Fifth Edition)
فهرست مطالب کتاب Information Security Management Handbook:
Introduction
- 1. ACCESS CONTROL SYSTEMS AND METHODOLOGY
Section 1.1 Access Control Techniques
Section 1.2 Access Control Administration
Section 1.3 Identification and Authentication Techniques
Section 1.4 Access Control Methodologies and Implementation
Section 1.5 Methods of Attack
Section 1.6 Monitoring and Penetration Testing
- 2. TELECOMMUNICATIONS, NETWORK, AND INTERNET SECURITY
Section 2.1 Communications and Network Security
Section 2.2 Internet/Intranet/Extranet
Section 2.3 E-mail Security
Section 2.4 Secure Voice Communications
Section 2.5 Network Attacks and Countermeasures
- 3. INFORMATION SECURITY MANAGEMENT
Section 3.1 Security Management Concepts and Principles
Section 3.2 Change Control Management
Section 3.3 Data Classification
Section 3.4 Risk Management
Section 3.5 Employment Policies and Practices
Section 3.6 Risk Management
Section 3.7 Security Awareness Training
Section 3.8 Security Management Planning
- 4. APPLICATION PROGRAM SECURITY
Section 4.1 Application Issues
Section 4.2 Databases and Data Warehousing
Section 4.3 Systems Development Controls
Section 4.4 Malicious Code
Section 4.5 Methods of Attack
- 5. CRYPTOGRAPHY
Section 5.1 Use of Cryptography
Section 5.2 Cryptographic Concepts, Methodologies, and Practices
Section 5.3 Private Key Algorithms
Section 5.4 Public Key Infrastructure (PKI)
Section 5.5 System Architecture for Implementing Cryptographic Functions
Section 5.6 Methods of Attack
- 6. ENTERPRISE SECURITY ARCHITECTURE
Section 6.1 Principles of Computer and Network Organizations, Architectures, and Designs
Section 6.2 Principles of Security Models, Architectures and Evaluation Criteria
Section 6.3 Common Flaws and Security Issues — System Architecture and Design
- 7. OPERATIONS SECURITY
Section 7.1 Concepts
Section 7.2 Resource Protection Requirements
Section 7.3 Auditing
Section 7.4 Intrusion Detection
Section 7.5 Operations Controls
- 8. BUSINESS CONTINUITY PLANNING
Section 8.1 Business Continuity Planning
Section 8.2 Disaster Recovery Planning
Section 8.3 Elements of Business Continuity Planning
- 9. LAW, INVESTIGATION, AND ETHICS
Section 9.1 Information Law
Section 9.2 Investigations
Section 9.3 Major Categories of Computer Crime
Section 9.4 Incident Handling
Section 9.5 Ethics
- 10. PHYSICAL SECURITY
Section 10.1 Facility Requirements
Section 10.2 Technical Controls
Section 10.3 Environment and Life Safety
Information Security: Principles and Practice
فهرست مطالب کتاب Information Security: Principles and Practice:
INTRODUCTION
CRYPTO
CRYPTO BASICS
SYMMETRIC KEY CRYPTO
PUBLIC KEY CRYPTO
HASH FUNCTIONS AND OTHER TOPICS
ADVANCED CRYPTANALYSIS
ACCESS CONTROL
AUTHENTICATION
AUTHORIZATION
PROTOCOLS
SIMPLE AUTHENTICATION PROTOCOLS
REAL-WORLD SECURITY PROTOCOLS
SOFTWARE
SOFTWARE FLAWS AND MALWARE
INSECURITY IN SOFTWARE
OPERATING SYSTEMS AND SECURITY
APPENDIX
ANNOTATED BIBLIOGRAPHY
INDEX
Installing and Configuring Windows Server 2012 (Exam Ref 70-410)
فهرست مطالب Installing and Configuring Windows Server 2012:
Introduction
CHAPTER 1 Installing and configuring servers
CHAPTER 2 Configure server roles and features
CHAPTER 3 Configure Hyper-V
CHAPTER 4 Deploying and configuring core network services
CHAPTER 5 Install and administer Active Directory
CHAPTER 6 Create and manage Group Policy