Rethinking Cyber Security

Author(s): Gene Lloyd

Edition: 1

Copyright: 2022

Pages: 198

Choose Your Format

Choose Your Platform | Help Me Choose

Ebook

$55.13

ISBN 9798765705421

Details Electronic Delivery EBOOK 180 days

Cybersecurity is more than a buzz word. It is a necessity for every computer system and network on the planet. Hacking is at an all-time high with digital criminals stealing data from governments to technology companies, and everyone in between. Your data may be the next treasure trove of information a hacker wants to get their hands on, and your network may be the next target beaconing vulnerabilities across the internet. History has shown the only effective method at defending a network is to implement a layered security approach with security appliances and applications strategically placed throughout a network. But even some of those methods have failed.

Rethinking Cyber Security will give you the background information you need to understand how hackers operate, and the methodologies you can implement to make sure key components of your network are secure. The historic layered approach has been updated to include concepts rarely implemented with out-of-the box solutions that will take network security to the next level. Defense of common attacks are given a new perspective with advice for more stringent controls to limit external and unauthorized access. And technical strategies are explained in simpler terms with examples anyone in the field can understand.

You will learn that security does not have to be difficult, overly complicated, or extremely expensive to be effective. Simpler strategies which use already available internet technologies can heighten the security of any network and keep hackers at bay. Practical application is included for key concepts with tips on how to practice new skills in a safe environment. Common poorly figured technologies which give hackers easier access to systems and data are also discussed. Do not worry. Even the most insecure network system can be hardened against an attack when you apply this new information.

CHAPTER 1: History

CHAPTER 2: Paradigm Shift

CHAPTER 3: Traffic Analysis

CHAPTER 4: Vulnerability Assessment

CHAPTER 5: Penetration Testing

CHAPTER 6: Incident Response Evidence Collection

CHAPTER 7: Incident Response Evidence Analysis

CHAPTER 8: Hardening Windows

CHAPTER 9: Hardening Linux

CHAPTER 10: Hardening Network

CHAPTER 11: Cloud Security

CHAPTER 12: Cryptography

APPENDIX 1: Linux Commands

APPENDIX 2: Meterpreter Commands

APPENDIX 3: Common Ports and Protocols

Gene Lloyd

Cybersecurity is more than a buzz word. It is a necessity for every computer system and network on the planet. Hacking is at an all-time high with digital criminals stealing data from governments to technology companies, and everyone in between. Your data may be the next treasure trove of information a hacker wants to get their hands on, and your network may be the next target beaconing vulnerabilities across the internet. History has shown the only effective method at defending a network is to implement a layered security approach with security appliances and applications strategically placed throughout a network. But even some of those methods have failed.

Rethinking Cyber Security will give you the background information you need to understand how hackers operate, and the methodologies you can implement to make sure key components of your network are secure. The historic layered approach has been updated to include concepts rarely implemented with out-of-the box solutions that will take network security to the next level. Defense of common attacks are given a new perspective with advice for more stringent controls to limit external and unauthorized access. And technical strategies are explained in simpler terms with examples anyone in the field can understand.

You will learn that security does not have to be difficult, overly complicated, or extremely expensive to be effective. Simpler strategies which use already available internet technologies can heighten the security of any network and keep hackers at bay. Practical application is included for key concepts with tips on how to practice new skills in a safe environment. Common poorly figured technologies which give hackers easier access to systems and data are also discussed. Do not worry. Even the most insecure network system can be hardened against an attack when you apply this new information.

CHAPTER 1: History

CHAPTER 2: Paradigm Shift

CHAPTER 3: Traffic Analysis

CHAPTER 4: Vulnerability Assessment

CHAPTER 5: Penetration Testing

CHAPTER 6: Incident Response Evidence Collection

CHAPTER 7: Incident Response Evidence Analysis

CHAPTER 8: Hardening Windows

CHAPTER 9: Hardening Linux

CHAPTER 10: Hardening Network

CHAPTER 11: Cloud Security

CHAPTER 12: Cryptography

APPENDIX 1: Linux Commands

APPENDIX 2: Meterpreter Commands

APPENDIX 3: Common Ports and Protocols

Gene Lloyd