Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

Add your review


Note: Prices may fluctuate as sellers adjust them regularly. You'll see the latest price at final checkout.
Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare


Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity

Key Features:

Covers the latest security threats and defense strategies for 2020Introduces techniques and skillsets required to conduct threat hunting and deal with a system breachProvides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more

Book Description:

Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.

Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user’s identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system.

This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.

What You Will Learn:

The importance of having a solid foundation for your security postureUse cyber security kill chain to understand the attack strategyBoost your organization’s cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligenceUtilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategyIdentify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emailsPerform an incident investigation using Azure Security Center and Azure SentinelGet an in-depth understanding of the disaster recovery processUnderstand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloudLearn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure

Who this book is for:

For the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.


From the brand

Packt Brand ImagePackt Brand Image

Packt is a leading publisher of technical learning content with the ability to publish books on emerging tech faster than any other.

Our mission is to increase the shared value of deep tech knowledge by helping tech pros put software to work.

We help the most interesting minds and ground-breaking creators on the planet distill and share the working knowledge of their peers.

See Our Full Range

Cybersecurity and Pentesting

Linux and Networking

See Our Full Range

Publisher ‏ : ‎ Packt Publishing
Publication date ‏ : ‎ December 31, 2019
Edition ‏ : ‎ 2nd ed.
Language ‏ : ‎ English
Print length ‏ : ‎ 634 pages
ISBN-10 ‏ : ‎ 183882779X
ISBN-13 ‏ : ‎ 978-1838827793
Item Weight ‏ : ‎ 2.54 pounds
Dimensions ‏ : ‎ 7.5 x 1.43 x 9.25 inches
Best Sellers Rank: #774,406 in Books (See Top 100 in Books) #122 in Computer Viruses #320 in Computer Hacking #516 in Computer Network Security
Customer Reviews: 4.6 4.6 out of 5 stars (179) var dpAcrHasRegisteredArcLinkClickAction; P.when(‘A’, ‘ready’).execute(function(A) { if (dpAcrHasRegisteredArcLinkClickAction !== true) { dpAcrHasRegisteredArcLinkClickAction = true; A.declarative( ‘acrLink-click-metrics’, ‘click’, { “allowLinkDefault”: true }, function (event) { if (window.ue) { ue.count(“acrLinkClickCount”, (ue.count(“acrLinkClickCount”) || 0) + 1); } } ); } }); P.when(‘A’, ‘cf’).execute(function(A) { A.declarative(‘acrStarsLink-click-metrics’, ‘click’, { “allowLinkDefault” : true }, function(event){ if(window.ue) { ue.count(“acrStarsLinkWithPopoverClickCount”, (ue.count(“acrStarsLinkWithPopoverClickCount”) || 0) + 1); } }); });

10 reviews for Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

0.0 out of 5
0
0
0
0
0
Write a review
Show all Most Helpful Highest Rating Lowest Rating
  1. Tim van Eijden

    Great guide for developing Cyber Security knowledge
    The book is easy to read and gives you hand on examples on how to manage cyber attacks.

    Helpful(0) Unhelpful(0)You have already voted this
  2. ANDRIES DELPORT

    Well-written cybersecurity instruction manual
    I would recommend this book to all company executives, company directors, IT staff and cybersecurity practitioners. The book provides an understanding of how cyber-criminals gain access to organisations and provides a framework of how organisations could protect themselves.

    Helpful(0) Unhelpful(0)You have already voted this
  3. Sam oduor the

    Great read
    The cybersecurity defense strategies are well laid out and easy to follow. This is a great read for those new to cybersecurity and more so experts who want to self-review!

    Helpful(0) Unhelpful(0)You have already voted this
  4. Brian

    Great reference material. Especially for beginners.
    The book introduces you to a lot of common tools. Some more well known than others. Though it doesn’t give a lot of instruction on how to use each of them. The labs offer some useful insight that can get your mind going a bit. Though it’s important to know that learning cyber security depends on heavily on trial and error. Hackers have a lot of tools. Each one is used for a specific situation. That being said, you are going to need to take your education outside of this book. You may need to Google a bit (There’s also a section to really help your Google search skills).I already have learned most of this in college, yet I feel I learned enough to justify the cost of this book. I recommend the Kindle version as it makes great reference material to guide you to learn the right tools for the right scenario.Pro tip: Learn how to create your own virtual environment to practice on using VMware or Virtual Box. It really helps get the basics down without breaking stuff.

    Helpful(0) Unhelpful(0)You have already voted this
  5. Edshel Torres

    Excellent book for beginners
    Was able to read this book and is excellent for any person that will like to enter in this field of cybersecurity. Al basic details explains and a lot of labs to practice

    Helpful(0) Unhelpful(0)You have already voted this
  6. Wilson Bautista Jr.

    Very Useful For Those Who Are Interested In Red and Blue Team Strategy Topics and Tools
    The book is worth the read and it covers both offensive and defensive strategies broadly. Each of the sections could be a book of their own if the authors decided to deep-dive on each topic (which I would suggest). However, the content in each section was enough for readers to “get the point” of what was being discussed. The others did a great job keeping the material concise and straight to the point.I found this book to be very informative for a wide range of audiences. For senior executives, this gives a high-level view of what the current threat landscape looks like. The authors then took it down to the manager and analyst level. They provided different tools (old and new) that they can use on either the Red or Blue teams. While they didn’t go too deep into each tool’s use, there was an array of examples in each chapter provided more context than mere tools suggestions. Also, this book has labs where readers can practice what they learned thus reinforcing the concepts that all audiences can appreciate.Two thumbs up and highly recommend.

    Helpful(0) Unhelpful(0)You have already voted this
  7. Jacob Hinkle

    An excellent introduction to the cyber security field.
    This book is an ambitious and excellent introduction to the cyber security field and the nuances of both red and blue team strategies. This book is a fantastic tool for those just getting into the field and an excellent reference source for seasoned veterans looking to brush up on the myriad of topics it covers.Others have unfairly maligned the book as not being in-depth as much when it is clearly written as an introduction and not meant to teach any one topic in great depth.I found the vulnerability management section particularly useful for creating an efficient and effective vulnerability management program.

    Helpful(0) Unhelpful(0)You have already voted this
  8. Jeff Char

    Really Bad
    It is all very obvious, if you ever played around with Kali, pen-testing, or secured your own website this is highly redundant and at an extremely low level. If you are brand new this is a fair entry book. It brushes over most know security flaws at a beginner’s level. I went through the whole book in around 15 minutes.

    Helpful(0) Unhelpful(0)You have already voted this
  9. Mino

    secondo me è uno dei migliori libri sull’argomento. Pieno di esercitazioni pratiche e nozioni abbastanza corpose. Diventa un must have. Lasciate stare chi commenta in maniera negativa, è scritto con una semplicità disarmante. Parla e copre molti argomenti attualissimi. Quindi è molto valido. Se lo dovessi consigliare? Ovviamente si x 10. Semplice e coinciso arriva dritto al punto. Strutturazione perfetta. Argomenti nuovi ed esaustivi senza girarci intorno.

    Helpful(0) Unhelpful(0)You have already voted this
  10. Jordan Bird

    The book is poorly written and organised. It should undergo a thorough review by both an expert in the field and an editor, as it currently falls short of professional standards in writing and organisation.

    Helpful(0) Unhelpful(0)You have already voted this

    Add a review

    Your email address will not be published. Required fields are marked *

    Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition
    Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition
    bestdealsavvy.com
    Logo
    Register New Account
    Compare items
    • Total (0)
    Compare
    0
    Shopping cart