15 Jan, 2018

Cybersecurity Attack and Defense Strategies ( Book )

Great deal from Packt Publishing  on our upcoming book which we wrote with my good friend Yuri Diogenes . #Cybersecurity Attack and Defense Strategies for $5 , don’t miss out
https://www.packtpub.com/networking-and-servers/cybersecurity-attack-and-defense-strategies

Book Description

The book will start with the initial Incident Response process, moving to Red Team tactics, where you will learn the basic syntax for commonly used Windows and Linux tools to perform the necessary operations. You will also gain hands-on experience of using the new red team techniques with powerful tools like python and PowerShell which will enable you to find out vulnerabilities in your system and mediums to exploit them. Moving on, you will learn how to compromise a system, hack the user’s identity, and the various tools used by the red team to find vulnerabilities in a system.

In the next section, you will learn about the defense strategies followed by the blue team to enhance the overall security of a system. You will also learn about an in depth strategy to ensure that there are security controls in each network layer and ways in which you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.

By the end of this book, you will be well-versed with Red and Blue team techniques and will learn military grade security aspects of attacking and defending a system.

Table of Contents

Chapter 1: Security Posture
Current threat landscape
Cybersecurity challenges
Enhancing your security posture
Red and blue team
References
Summary
Chapter 2: Incident Response Process
Incident Response process
Handling an incident
Post–incident activity
Incident Response in the cloud
References
Summary
Chapter 3: Understanding the Cybersecurity Kill Chain
External reconnaissance
Access and privilege escalation
Exfiltration
Sustainment
Assault
Obfuscation
Threat lifecycle managament
References
Summary
Chapter 4: Reconnaissance
External reconnaissance
Internal reconnaissance
Conclusion
References
Summary
Chapter 5: Compromising the System
Analyzing current trends
Phishing
Exploiting a vulnerability
Zero-Day
Performing the steps to compromise a system
References
Summary
Chapter 6: Chasing User’s Identity
Identity is the new perimeter
Strategies to compromise user’s identity
Hacking user’s identity
References
Summary
Chapter 7: Lateral Movement
Infiltration
Performing lateral movement
Summary
Chapter 8: Privilege Escalation
Infiltration
Avoiding alerts
Performing privilege escalation
Conclusion and lessons learnt
References
Summary
Chapter 9: Security Policy
Reviewing your security policy
Educating the end user
Policy enforcement
Monitoring for compliance
References
Summary
Chapter 10: Network Segmentation
Defense in depth approach
Physical network segmentation
Securing remote access to the network
Virtual network segmentation
Hybrid cloud network security
References
Summary
Chapter 11: Active Sensors
Chapter 12: Threat Intelligence
Chapter 13: Investigating an Incident
Chapter 14: Recovery Process
Chapter 15: Vulnerability Management
Chapter 16: Log Analysis

What You Will Learn

  • Learn the importance of having a solid foundation for your security posture
  • Understand the attack strategy using cyber security kill chain.
  • Learn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence
  • Learn how to perform an incident investigation
  • Get in-depth understanding of the recovery process
  • Understand continuous security monitoring, and how to implement a vulnerability management strategy
  • Learn how to perform log analysis to identify suspicious activities

Authors

Yuri Diogenes

Yuri Diogenes, Master of Science in Cybersecurity Intelligence & Forensics Investigation (UTICA College USA), CISSP, CASP, E|CEH, E|CSA, CyberSec First Responder, CompTIA, Security+, CompTIA Cloud Essentials Certified, CompTIA Network+, CompTIA Mobility+, MCSE, MCTS, MBA and ISSA Forth Member Senior Member. Yuri works for Microsoft for more than 10 years in different teams, including Forefront TMG, Windows Security and currently as Senior Content Developer for the Enterprise Mobility and Azure Security Team, Yuri is also a Professor for the Master of Security Science course from EC-Council University. Yuri is co-author of more than ten books published by Microsoft Press, Syngress, and Novaterra.

Erdal Ozkaya

Erdal Ozkaya, Doctor of Philosophy (Ph.D.) in Cybersecurity, Master of Information Systems Security (M.I.S), Master of Computing Research CEI, MCT,MCSE, MCSA, E|CEH, E|CSA, E|CISO, CFR, CISSP. Erdal works for Microsoft as Cybersecurity Architect and Security Advisor in the Global Cybersecurity Practice team. Erdal is also a part time lecturer at the Australian Charles Sturt University. Erdal co-authored many security certifications courseware for different vendors . Erdal speaks in world wide conferences and won many awards in his filed, inc from NATO, UN, and many governments.

You may also like...

2 Responses

  1. Carlos says:

    Hi Mr. Ozkaya,
    i’m a big fan of your work ethic an professionalism. kindly i like to continue my career as one of your students. One day i wish to become just like you with your support.

Leave a Reply

Your email address will not be published. Required fields are marked *