Cybersecurity is more than a buzz word. It is a necessity for every computer system and network on the planet. Hacking is at an all-time high with digital criminals stealing data from governments to technology companies, and everyone in between. Your data may be the next treasure trove of information a hacker wants to get their hands on, and your network may be the next target beaconing vulnerabilities across the internet. History has shown the only effective method at defending a network is to implement a layered security approach with security appliances and applications strategically placed throughout a network. But even some of those methods have failed.
Rethinking Cyber Security will give you the background information you need to understand how hackers operate, and the methodologies you can implement to make sure key components of your network are secure. The historic layered approach has been updated to include concepts rarely implemented with out-of-the box solutions that will take network security to the next level. Defense of common attacks are given a new perspective with advice for more stringent controls to limit external and unauthorized access. And technical strategies are explained in simpler terms with examples anyone in the field can understand.
You will learn that security does not have to be difficult, overly complicated, or extremely expensive to be effective. Simpler strategies which use already available internet technologies can heighten the security of any network and keep hackers at bay. Practical application is included for key concepts with tips on how to practice new skills in a safe environment. Common poorly figured technologies which give hackers easier access to systems and data are also discussed. Do not worry. Even the most insecure network system can be hardened against an attack when you apply this new information.
CHAPTER 1: History
CHAPTER 2: Paradigm Shift
CHAPTER 3: Traffic Analysis
CHAPTER 4: Vulnerability Assessment
CHAPTER 5: Penetration Testing
CHAPTER 6: Incident Response Evidence Collection
CHAPTER 7: Incident Response Evidence Analysis
CHAPTER 8: Hardening Windows
CHAPTER 9: Hardening Linux
CHAPTER 10: Hardening Network
CHAPTER 11: Cloud Security
CHAPTER 12: Cryptography
APPENDIX 1: Linux Commands
APPENDIX 2: Meterpreter Commands
APPENDIX 3: Common Ports and Protocols