Metasploit: The Penetration Tester Guide

فهرست مطالب کتاب Metasploit: The Penetration Tester’s Guide:

Foreword: by HD Moore

Preface

Acknowledgments

Introduction

Chapter 1: The Absolute Basics of Penetration Testing

Chapter 2: Metasploit Basics

Chapter 3: Intelligence Gathering

Chapter 4: Vulnerability Scanning

Chapter 5: The Joy of Exploitation

Chapter 6: Meterpreter

Chapter 7: Avoiding Detection

Chapter 8: Exploitation Using Client-Side Attacks

Chapter 9: Metasploit Auxiliary Modules

Chapter 10: The Social-Engineer Toolkit

Chapter 11: Fast-Track

Chapter 12: Karmetasploit

Chapter 13: Building Your Own Module

Chapter 14: Creating Your Own Exploits

Chapter 15: Porting Exploits to the Metasploit Framework

Chapter 16: Meterpreter Scripting

Chapter 17: Simulated Penetration Test

Appendix A: Configuring Your Target Machines

Appendix B: Cheat Sheet

Index

 

MGT514.1 Security Strategic Planning, Policy, and Leadership Strategic Planning Foundations

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Overview

Need for Strategic Planning

30-60-90 Day Plan

Lab #1: CISO First Impression

Decipher the Business

Historical Analysis

Values and Culture

Stakeholder Management

Lab #2: Relationship Management

Asset Analysis

Business Strategy

Lab #3: Strategy Map

Decipher the Threats

Threat Actors

PEST Analysis

Threat Analysis

MGT514.2 Security Strategic Planning, Policy, and Leadership Strategic Roadmap Development

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Define Current State

ïVision and Mission

Lab #1: Mission Statement

SWOT Analysis

Lab #2: SWOT Exercise

Develop the Plan

ïVisioning and Innovation

Security Framework

Security Roadmap

Gap Analysis

Lab #3: Roadmap Development

Business Case Development

Deliver the Program

Security Metrics Program

Marketing and Exec Communications

MGT514.3 Security Strategic Planning, Policy, and Leadership Security Policy Development and Assessment

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Purpose of Policy

Policy Pyramid

Develop Policy

Language of Policy

Lab #1: Positive and Negative Voicing

Policy Structure

Policy and Culture

Define Requirements

Development Examples

Lab #2: Vulnerability Management Policy

Manage Policy

Approve, Socialize, and Measure

Assess Policy and Procedure

SMART Approach

Policy Assessment

Lab #3: Cloud Computing Policy

MGT514.4 Security Strategic Planning, Policy, and Leadership Leadership & Management Competencies

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Why Choose Leadership

Understanding Leadership

Lab #1: Management and Leadership

Leadership Essentials

Building Trust

Servant Leadership

Effective Communications

Active Listening

Providing Feedback

Lab #2: Performance Review

Challenging Conversations

Build Effective Teams

Learning to Delegate

Lab #3: Delegation

Coaching, Mentoring, and Sponsorship

Leading Change

MGT514.5 Security Strategic Planning, Policy, and Leadership Strategic Planning Workshop

فهرست مطالب کتاب Security Strategic Planning, Policy, and Leadership:

Background

Case Study Method

Case Studies

iPremier Case (A)

iPremier Case (B)

iPremier Case (C)

PharmaCo Case (A)

PharmaCo Case (B)

PharmaCo Case (C)

HealthHound Case

Summary

Course Summary

Resources

Microservices: Flexible Software Architecture

فهرست مطالب کتاب Microservices: Flexible Software Architecture:

Preface

Part I: Motivation and Basics

Chapter 1: Preliminaries

Chapter 2: Microservice Scenarios

Part II: Microservices: What, Why, and Why Not?

Chapter 3: What Are Microservices?

Chapter 4: Reasons for Using Microservices

Chapter 5: Challenges

Chapter 6: Microservices and SOA

Part III: Implementing Microservices

Chapter 7: Architecture of Microservice-Based Systems

Chapter 8: Integration and Communication

Chapter 9: Architecture of Individual Microservices

Chapter 10: Testing Microservices and Microservice-Based Systems

Chapter 11: Operations and Continuous Delivery of Microservices

Chapter 12: Organizational Effects of a Microservices-Based Architecture

Part IV: Technologies

Chapter 13: Example of a Microservices-Based Architecture

Chapter 14: Technologies for Nanoservices

Chapter 15: Getting Started with Microservices

Index

Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion

فهرست مطالب Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion:

Introduction

Part I A New Era for the Microsoft Firewall

Chapter 1 What’s New in TMG

Chapter 2 What Are the Differences Between TMG and UAG?

Part II Planning for TMG

Chapter 3 System Requirements

Chapter 4 Analyzing Network Requirements

Chapter 5 Choosing the Right Network Topology

Chapter 6 Migrating to TMG

Chapter 7 Choosing a TMG Client Type

Part III Implementing a TMG Deployment

Chapter 8 Installing TMG

Chapter 9 Troubleshooting TMG Setup

Chapter 10 Exploring the TMG Console

Part IV TMG as Your Firewall

Chapter 11 Configuring TMG Networks

Chapter 12 Understanding Access Rules

Chapter 13 Configuring Load-Balancing Capabilities

Chapter 14 Network Inspection System

Part V TMG as Your Caching Proxy

Chapter 15 Web Proxy Auto Discovery for TMG

Chapter 16 Caching Concepts and Configuration

Part VI TMG Client Protection

Chapter 17 Malware Inspection

Chapter 18 URL Filtering

Chapter 19 Enhancing E-Mail Protection

Chapter 20 HTTP and HTTPS Inspection

Part VII TMG Publishing Scenarios

Chapter 21 Understanding Publishing Concepts

Chapter 22 Publishing Servers

Chapter 23 Publishing Microsoft Office SharePoint Server

Chapter 24 Publishing Exchange Server

Part VIII Remote Access

Chapter 25 Understanding Remote Access

Chapter 26 Implementing Dial-in Client VPN

Chapter 27 Implementing Site-to-Site VPN

Part IX Logging and Reporting

Chapter 28 Logging

Chapter 29 Enhanced NAT

Chapter 30 Scripting TMG

Part X Troubleshooting

Chapter 31 Mastering the Art of Troubleshooting

Chapter 32 Exploring HTTP Protocol

Chapter 33 Using Network Monitor 3 for Troubleshooting TMG

Microsoft® Exchange Server 2010 UNLEASHED

فهرست مطالب کتاب Microsoft® Exchange Server 2010 UNLEASHED:

Introduction

Part I: Microsoft Exchange Server 2010 Overview

1 Exchange Server 2010 Technology Primer

2 Planning, Prototyping, Migrating, and Deploying Exchange Server 2010

Part II: Planning and Designing an Exchange Server 2010 Environment

3 Understanding Core Exchange Server 2010 Design Plans

4 Architecting an Enterprise-Level Exchange Server Environment

5 Integrating Exchange Server 2010 in a Non-Windows Environment

6 Understanding Network Services and Active Directory Domain

Controller Placement for Exchange Server 2010

Part III: Implementing Exchange Server 2010 Services

7 Installing Exchange Server 2010

8 Implementing Edge Services for an Exchange Server

2010 Environment

9 Using Windows PowerShell in an Exchange Server 2010 Environment

Part IV: Securing an Exchange Server 2010 Environment

10 Client-Level Secured Messaging

11 Server and Transport-Level Security

12 Integrating Certificate-Based Public Key Infrastructure (PKI) in

Exchange Server 2010

13 Securing Exchange Server 2010 with ISA Server

14 Understanding Exchange Server Policy Enforcement Security

Part V: Migrations and Coexistence with Exchange Server 2010

15 Migrating from Active Directory 2000/2003 to Active Directory 2008

16 Transitioning from Exchange Server 2003/2007 to Exchange

Server 2010

17 Implementing Client Access and Hub Transport Servers

Part VI: Exchange Server 2010 Administration and Management

18 Administering an Exchange Server 2010 Environment

19 Exchange Server 2010 Management and Maintenance Practices

20 Using Operations Manager to Monitor Exchange Server 2010

21 Remote Administration of Exchange Server 2010 Servers

22 Documenting an Exchange Server 2010 Environment

Part VII: Unified Communications in an Exchange Server 2010 Environment

23 Designing and Implementing Mobility in Exchange Server 2010

24 Designing and Configuring Unified Messaging in Exchange

Server 2010

25 Collaborating Within an Exchange Server Environment Using

Microsoft Office SharePoint Server 2007

26 Integrating Office Communications Server 2007 in an Exchange

Server 2010 Environment

Part VIII: Client Access to Exchange Server 2010

27 Getting the Most Out of the Microsoft Outlook Client

28 Leveraging the Capabilities of the Outlook Web App (OWA) Client

29 Using Non-Windows Systems to Access Exchange Server 2010

30 Deploying the Client for Microsoft Exchange Server 2010

Part IX: Data Protection and Disaster Recovery of Exchange Server

31 Database Availability Group Replication in Exchange Server

32 Backing Up the Exchange Server 2010 Environment

33 Recovering from a Disaster in an Exchange Server

2010 Environment

Part X: Optimizing Exchange Server 2010 Environments

34 Optimizing an Exchange Server 2010 Environment

35 Designing and Optimizing Storage in an Exchange Server

2010 Environment

MySQL Notes For Professionals

فهرست مطالب کتاب MySQL Notes For Professionals:

Getting started with MySQL

Data Types

SELECT

Backticks

NULL

Limit and Offset

Creating databases

Using Variables

Comment MySQL

INSERT

DELETE

UPDATE

ORDER BY

Group By

Error 1055: ONLY_FULL_GROUP_BY: something is not in GROUP BY clause …

Joins

JOINS: Join 3 table with the same name of id.

UNION

Arithmetic

String operations

Date and Time Operations

Handling Time Zones

Regular Expressions

VIEW

Table Creation

ALTER TABLE

Drop Table

MySQL LOCK TABLE

Error codes

Stored routines (procedures and functions)

Indexes and Keys

Full-Text search

PREPARE Statements

JSON

Extract values from JSON type

MySQL Admin

TRIGGERS

Configuration and tuning

Events

ENUM

Install Mysql container with Docker-Compose

Character Sets and Collations

MyISAM Engine

Converting from MyISAM to InnoDB

Transaction

Log files

Clustering

Partitioning

Replication

Backup using mysqldump

mysqlimport

LOAD DATA INFILE

MySQL Unions

MySQL client

Temporary Tables

Customize PS1

Dealing with sparse or missing data

Connecting with UTF-8 Using Various Programming language.

Time with subsecond precision

One to Many

Server Information

SSL Connection Setup

Create New User

Security via GRANTs

Change Password

Recover and reset the default root password for MySQL 5.7+

Recover from lost root password

MySQL Performance Tips

Performance Tuning

Reserved Words

Network Attacks & Exploitation: A Framework

فهرست مطالب کتاب Network Attacks & Exploitation:

Introduction

Chapter 1 Computer Network Exploitation

Chapter 2 The Attacker

Chapter 3 The Defender

Chapter 4 Asymmetries

Chapter 5 Attacker Frictions

Chapter 6 Defender Frictions

Chapter 7 Off ensive Strategy

Chapter 8 Defensive Strategy

Chapter 9 Off ensive Case Studies

Appendix Attack

References

Bibliography

Index

Network Defense and Countermeasures: Principles and Practices (Fourth Edition)

فهرست مطالب کتاب Network Defense and Countermeasures: Principles and Practices (Fourth Edition):

Chapter 1 Introduction to Network Security

Chapter 2 Types of Attacks

Chapter 3 Fundamentals of Firewalls

Chapter 4 Firewall Practical Applications

Chapter 5 Intrusion-Detection Systems

Chapter 6 Encryption Fundamentals

Chapter 7 Virtual Private Networks

Chapter 8 Operating System Hardening

Chapter 9 Defending Against Virus Attacks

Chapter 10 Defending against Trojan Horses and Phishing

Chapter 11 Security Policies

Chapter 12 Assessing System Security

Chapter 13 Security Standards

Chapter 14 Physical Security and Disaster Recovery

Chapter 15 Techniques Used by Attackers

Chapter 16 Introduction to Forensics

Chapter 17 Cyber Warfare and Terrorism