Metasploit: The Penetration Tester Guide
فهرست مطالب کتاب Metasploit: The Penetration Tester’s Guide:
Foreword: by HD Moore
Preface
Acknowledgments
Introduction
Chapter 1: The Absolute Basics of Penetration Testing
Chapter 2: Metasploit Basics
Chapter 3: Intelligence Gathering
Chapter 4: Vulnerability Scanning
Chapter 5: The Joy of Exploitation
Chapter 6: Meterpreter
Chapter 7: Avoiding Detection
Chapter 8: Exploitation Using Client-Side Attacks
Chapter 9: Metasploit Auxiliary Modules
Chapter 10: The Social-Engineer Toolkit
Chapter 11: Fast-Track
Chapter 12: Karmetasploit
Chapter 13: Building Your Own Module
Chapter 14: Creating Your Own Exploits
Chapter 15: Porting Exploits to the Metasploit Framework
Chapter 16: Meterpreter Scripting
Chapter 17: Simulated Penetration Test
Appendix A: Configuring Your Target Machines
Appendix B: Cheat Sheet
Index
MGT514.1 Security Strategic Planning, Policy, and Leadership Strategic Planning Foundations
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Overview
Need for Strategic Planning
30-60-90 Day Plan
Lab #1: CISO First Impression
Decipher the Business
Historical Analysis
Values and Culture
Stakeholder Management
Lab #2: Relationship Management
Asset Analysis
Business Strategy
Lab #3: Strategy Map
Decipher the Threats
Threat Actors
PEST Analysis
Threat Analysis
MGT514.2 Security Strategic Planning, Policy, and Leadership Strategic Roadmap Development
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Define Current State
ïVision and Mission
Lab #1: Mission Statement
SWOT Analysis
Lab #2: SWOT Exercise
Develop the Plan
ïVisioning and Innovation
Security Framework
Security Roadmap
Gap Analysis
Lab #3: Roadmap Development
Business Case Development
Deliver the Program
Security Metrics Program
Marketing and Exec Communications
MGT514.3 Security Strategic Planning, Policy, and Leadership Security Policy Development and Assessment
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Purpose of Policy
Policy Pyramid
Develop Policy
Language of Policy
Lab #1: Positive and Negative Voicing
Policy Structure
Policy and Culture
Define Requirements
Development Examples
Lab #2: Vulnerability Management Policy
Manage Policy
Approve, Socialize, and Measure
Assess Policy and Procedure
SMART Approach
Policy Assessment
Lab #3: Cloud Computing Policy
MGT514.4 Security Strategic Planning, Policy, and Leadership Leadership & Management Competencies
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Why Choose Leadership
Understanding Leadership
Lab #1: Management and Leadership
Leadership Essentials
Building Trust
Servant Leadership
Effective Communications
Active Listening
Providing Feedback
Lab #2: Performance Review
Challenging Conversations
Build Effective Teams
Learning to Delegate
Lab #3: Delegation
Coaching, Mentoring, and Sponsorship
Leading Change
MGT514.5 Security Strategic Planning, Policy, and Leadership Strategic Planning Workshop
فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:
Background
Case Study Method
Case Studies
iPremier Case (A)
iPremier Case (B)
iPremier Case (C)
PharmaCo Case (A)
PharmaCo Case (B)
PharmaCo Case (C)
HealthHound Case
Summary
Course Summary
Resources
Microservices: Flexible Software Architecture
فهرست مطالب کتاب Microservices: Flexible Software Architecture:
Preface
Part I: Motivation and Basics
Chapter 1: Preliminaries
Chapter 2: Microservice Scenarios
Part II: Microservices: What, Why, and Why Not?
Chapter 3: What Are Microservices?
Chapter 4: Reasons for Using Microservices
Chapter 5: Challenges
Chapter 6: Microservices and SOA
Part III: Implementing Microservices
Chapter 7: Architecture of Microservice-Based Systems
Chapter 8: Integration and Communication
Chapter 9: Architecture of Individual Microservices
Chapter 10: Testing Microservices and Microservice-Based Systems
Chapter 11: Operations and Continuous Delivery of Microservices
Chapter 12: Organizational Effects of a Microservices-Based Architecture
Part IV: Technologies
Chapter 13: Example of a Microservices-Based Architecture
Chapter 14: Technologies for Nanoservices
Chapter 15: Getting Started with Microservices
Index
Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion
فهرست مطالب Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion:
Introduction
Part I A New Era for the Microsoft Firewall
Chapter 1 What’s New in TMG
Chapter 2 What Are the Differences Between TMG and UAG?
Part II Planning for TMG
Chapter 3 System Requirements
Chapter 4 Analyzing Network Requirements
Chapter 5 Choosing the Right Network Topology
Chapter 6 Migrating to TMG
Chapter 7 Choosing a TMG Client Type
Part III Implementing a TMG Deployment
Chapter 8 Installing TMG
Chapter 9 Troubleshooting TMG Setup
Chapter 10 Exploring the TMG Console
Part IV TMG as Your Firewall
Chapter 11 Configuring TMG Networks
Chapter 12 Understanding Access Rules
Chapter 13 Configuring Load-Balancing Capabilities
Chapter 14 Network Inspection System
Part V TMG as Your Caching Proxy
Chapter 15 Web Proxy Auto Discovery for TMG
Chapter 16 Caching Concepts and Configuration
Part VI TMG Client Protection
Chapter 17 Malware Inspection
Chapter 18 URL Filtering
Chapter 19 Enhancing E-Mail Protection
Chapter 20 HTTP and HTTPS Inspection
Part VII TMG Publishing Scenarios
Chapter 21 Understanding Publishing Concepts
Chapter 22 Publishing Servers
Chapter 23 Publishing Microsoft Office SharePoint Server
Chapter 24 Publishing Exchange Server
Part VIII Remote Access
Chapter 25 Understanding Remote Access
Chapter 26 Implementing Dial-in Client VPN
Chapter 27 Implementing Site-to-Site VPN
Part IX Logging and Reporting
Chapter 28 Logging
Chapter 29 Enhanced NAT
Chapter 30 Scripting TMG
Part X Troubleshooting
Chapter 31 Mastering the Art of Troubleshooting
Chapter 32 Exploring HTTP Protocol
Chapter 33 Using Network Monitor 3 for Troubleshooting TMG
Microsoft® Exchange Server 2010 UNLEASHED
فهرست مطالب کتاب Microsoft® Exchange Server 2010 UNLEASHED:
Introduction
Part I: Microsoft Exchange Server 2010 Overview
1 Exchange Server 2010 Technology Primer
2 Planning, Prototyping, Migrating, and Deploying Exchange Server 2010
Part II: Planning and Designing an Exchange Server 2010 Environment
3 Understanding Core Exchange Server 2010 Design Plans
4 Architecting an Enterprise-Level Exchange Server Environment
5 Integrating Exchange Server 2010 in a Non-Windows Environment
6 Understanding Network Services and Active Directory Domain
Controller Placement for Exchange Server 2010
Part III: Implementing Exchange Server 2010 Services
7 Installing Exchange Server 2010
8 Implementing Edge Services for an Exchange Server
2010 Environment
9 Using Windows PowerShell in an Exchange Server 2010 Environment
Part IV: Securing an Exchange Server 2010 Environment
10 Client-Level Secured Messaging
11 Server and Transport-Level Security
12 Integrating Certificate-Based Public Key Infrastructure (PKI) in
Exchange Server 2010
13 Securing Exchange Server 2010 with ISA Server
14 Understanding Exchange Server Policy Enforcement Security
Part V: Migrations and Coexistence with Exchange Server 2010
15 Migrating from Active Directory 2000/2003 to Active Directory 2008
16 Transitioning from Exchange Server 2003/2007 to Exchange
Server 2010
17 Implementing Client Access and Hub Transport Servers
Part VI: Exchange Server 2010 Administration and Management
18 Administering an Exchange Server 2010 Environment
19 Exchange Server 2010 Management and Maintenance Practices
20 Using Operations Manager to Monitor Exchange Server 2010
21 Remote Administration of Exchange Server 2010 Servers
22 Documenting an Exchange Server 2010 Environment
Part VII: Unified Communications in an Exchange Server 2010 Environment
23 Designing and Implementing Mobility in Exchange Server 2010
24 Designing and Configuring Unified Messaging in Exchange
Server 2010
25 Collaborating Within an Exchange Server Environment Using
Microsoft Office SharePoint Server 2007
26 Integrating Office Communications Server 2007 in an Exchange
Server 2010 Environment
Part VIII: Client Access to Exchange Server 2010
27 Getting the Most Out of the Microsoft Outlook Client
28 Leveraging the Capabilities of the Outlook Web App (OWA) Client
29 Using Non-Windows Systems to Access Exchange Server 2010
30 Deploying the Client for Microsoft Exchange Server 2010
Part IX: Data Protection and Disaster Recovery of Exchange Server
31 Database Availability Group Replication in Exchange Server
32 Backing Up the Exchange Server 2010 Environment
33 Recovering from a Disaster in an Exchange Server
2010 Environment
Part X: Optimizing Exchange Server 2010 Environments
34 Optimizing an Exchange Server 2010 Environment
35 Designing and Optimizing Storage in an Exchange Server
2010 Environment
MySQL Notes For Professionals
فهرست مطالب کتاب MySQL Notes For Professionals:
Getting started with MySQL
Data Types
SELECT
Backticks
NULL
Limit and Offset
Creating databases
Using Variables
Comment MySQL
INSERT
DELETE
UPDATE
ORDER BY
Group By
Error 1055: ONLY_FULL_GROUP_BY: something is not in GROUP BY clause …
Joins
JOINS: Join 3 table with the same name of id.
UNION
Arithmetic
String operations
Date and Time Operations
Handling Time Zones
Regular Expressions
VIEW
Table Creation
ALTER TABLE
Drop Table
MySQL LOCK TABLE
Error codes
Stored routines (procedures and functions)
Indexes and Keys
Full-Text search
PREPARE Statements
JSON
Extract values from JSON type
MySQL Admin
TRIGGERS
Configuration and tuning
Events
ENUM
Install Mysql container with Docker-Compose
Character Sets and Collations
MyISAM Engine
Converting from MyISAM to InnoDB
Transaction
Log files
Clustering
Partitioning
Replication
Backup using mysqldump
mysqlimport
LOAD DATA INFILE
MySQL Unions
MySQL client
Temporary Tables
Customize PS1
Dealing with sparse or missing data
Connecting with UTF-8 Using Various Programming language.
Time with subsecond precision
One to Many
Server Information
SSL Connection Setup
Create New User
Security via GRANTs
Change Password
Recover and reset the default root password for MySQL 5.7+
Recover from lost root password
MySQL Performance Tips
Performance Tuning
Reserved Words
Network Attacks & Exploitation: A Framework
فهرست مطالب کتاب Network Attacks & Exploitation:
Introduction
Chapter 1 Computer Network Exploitation
Chapter 2 The Attacker
Chapter 3 The Defender
Chapter 4 Asymmetries
Chapter 5 Attacker Frictions
Chapter 6 Defender Frictions
Chapter 7 Off ensive Strategy
Chapter 8 Defensive Strategy
Chapter 9 Off ensive Case Studies
Appendix Attack
References
Bibliography
Index
Network Defense and Countermeasures: Principles and Practices (Fourth Edition)
فهرست مطالب کتاب Network Defense and Countermeasures: Principles and Practices (Fourth Edition):
Chapter 1 Introduction to Network Security
Chapter 2 Types of Attacks
Chapter 3 Fundamentals of Firewalls
Chapter 4 Firewall Practical Applications
Chapter 5 Intrusion-Detection Systems
Chapter 6 Encryption Fundamentals
Chapter 7 Virtual Private Networks
Chapter 8 Operating System Hardening
Chapter 9 Defending Against Virus Attacks
Chapter 10 Defending against Trojan Horses and Phishing
Chapter 11 Security Policies
Chapter 12 Assessing System Security
Chapter 13 Security Standards
Chapter 14 Physical Security and Disaster Recovery
Chapter 15 Techniques Used by Attackers
Chapter 16 Introduction to Forensics
Chapter 17 Cyber Warfare and Terrorism