Cybersecurity - attack and defense strategies counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals
"Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with...
Main Author: | |
---|---|
Other Authors: | |
Format: | eBook |
Language: | Inglés |
Published: |
Birmingham :
Packt
2019.
|
Edition: | 2nd ed |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009631505006719 |
Table of Contents:
- Security posture
- Incident response process
- What is a cyber strategy
- Understanding the cybersecurity kill chain
- Reconnaissance
- Compromising the system
- Changing a user's identity
- Lateral movement
- Privilege escalation
- Security policy
- Network segmentation
- Active sensors
- Threat intelligence
- Investigating an incident
- Recovery process
- Vulnerability management
- Log analysis.