Mastering defensive security effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

An immersive learning experience enhanced with technical, hands-on labs to understand the concepts, methods, tools, platforms, and systems required to master the art of cybersecurity Key Features Get hold of the best defensive security strategies and tools Develop a defensive security strategy at an...

Descripción completa

Detalles Bibliográficos
Otros Autores: Bravo, Cesar, author (author), Kitchen, Darren, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, England ; Mumbai : Packt Publishing [2021]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009645693406719
Tabla de Contenidos:
  • Cover
  • Title page
  • Copyright and Credits
  • Dedication
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Section 1: Mastering Defensive Security Concepts
  • Chapter 1: A Refresher on Defensive Security Concepts
  • Technical requirements
  • Deep dive into the core of cybersecurity
  • The cybersecurity triad
  • Types of attacks
  • Managing cybersecurity's legendary pain point: Passwords
  • Password breaches
  • Social engineering attacks using compromised passwords
  • Brute-force attacks
  • Dictionary attacks
  • Creating a secure password
  • Managing passwords at the enterprise level
  • Bonus track
  • Mastering defense in depth
  • Factors to consider when creating DiD models
  • Asset identification
  • Defense by layers
  • Bonus track
  • Comparing the blue and red teams
  • Summary
  • Further reading
  • Chapter 2: Managing Threats, Vulnerabilities, and Risks
  • Technical requirements
  • Understanding cybersecurity vulnerabilities and threats
  • Performing a vulnerability assessment
  • The vulnerability assessment process
  • When should you check for vulnerabilities?
  • Types of vulnerabilities
  • USB HID vulnerabilities
  • Types of USB HID attacks
  • A false sense of security
  • Protecting against USB HID attacks
  • Managing cybersecurity risks
  • Risk identification
  • Risk assessment
  • Risk response
  • Risk monitoring
  • The NIST Cybersecurity Framework
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover
  • Creating an effective Business Continuity Plan (BCP)
  • Creating a Business Impact Analysis (BIA)
  • Business Continuity Planning (BCP)
  • Implementing a best-in-class DRP
  • Creating a DRP
  • Implementing the DRP
  • Summary
  • Further reading
  • Chapter 3: Comprehending Policies, Procedures, Compliance, and Audits
  • Creating world-class cybersecurity policies and procedures
  • Cybersecurity policies.
  • Cybersecurity procedures
  • The CUDSE method
  • Understanding and achieving compliance
  • Types of regulations
  • Achieving compliance
  • Exploring, creating, and managing audits
  • Internal cybersecurity audits
  • External cybersecurity audits
  • Data management during audits
  • Types of cybersecurity audit
  • What triggers an audit?
  • Applying a CMM
  • The goals of a CMM
  • Characteristics of a good CMM
  • The structure of a good CMM
  • Analyzing the results
  • Advantages of a CMM
  • Summary
  • Further reading
  • Chapter 4: Patching Layer 8
  • Understanding layer 8 - the insider threat
  • The inadvertent user
  • The malicious insider
  • How do you spot a malicious insider?
  • Protecting your infrastructure against malicious insiders
  • Mastering the art of social engineering
  • The social engineering cycle
  • Social engineering techniques
  • Types of social engineering attacks
  • Defending against social engineering attacks (patching layer 8)
  • Creating your training strategy
  • Admin rights
  • Implementing a strong BYOD policy
  • Performing random social engineering campaigns
  • Summary
  • Further reading
  • Chapter 5: Cybersecurity Technologies and Tools
  • Technical requirements
  • Advanced wireless tools for cybersecurity
  • Defending from wireless attacks
  • Pentesting tools and methods
  • Metasploit framework
  • Social engineering toolkit
  • exe2hex
  • Applying forensics tools and methods
  • Dealing with evidence
  • Forensic tools
  • Recovering deleted files
  • Dealing with APTs
  • Defensive techniques
  • Leveraging security threat intelligence
  • Threat intelligence 101
  • Implementing threat intelligence
  • Converting a threat into a solution
  • The problem
  • The solution
  • Summary
  • Further reading
  • Section 2: Applying Defensive Security
  • Chapter 6: Securing Windows Infrastructures
  • Technical requirements.
  • Applying Windows hardening
  • Hardening by the infrastructure team
  • Creating a hardening checklist
  • Creating a patching strategy
  • The complexity of patching
  • Distribution of tasks (patching roles and assignments)
  • Distribution and deployment of patches
  • Types of patches
  • Applying security to AD
  • Secure administrative hosts
  • Windows Server Security documentation
  • Mastering endpoint security
  • Windows updates
  • Why move to Windows 10?
  • Physical security
  • Antivirus solutions
  • Windows Defender Firewall
  • Application control
  • URL filtering
  • Spam filtering
  • Client-facing systems
  • Backups
  • Users
  • Securing the data
  • Leveraging encryption
  • Configuring BitLocker
  • Summary
  • Chapter 7: Hardening a Unix Server
  • Technical requirements
  • Securing Unix services
  • Defining the purpose of the server
  • Secure startup configuration
  • Managing services
  • Applying secure file permissions
  • Understanding ownership and permissions
  • Default permissions
  • Permissions in directories (folders)
  • Changing default permissions with umask
  • Permissions hierarchy
  • Comparing directory permissions
  • Changing permissions and ownership of a single file
  • Useful commands to search for unwanted permissions
  • Enhancing the protection of the server by improving your access controls
  • Viewing ACLs
  • Managing ACLs
  • Default ACL on directories
  • Removing ACLs
  • Enhanced access controls
  • Configuring host-based firewalls
  • Understanding iptables
  • Configuring iptables
  • SSH brute-force protection with iptables
  • Protecting from port scanning with iptables
  • Advanced management of logs
  • Leveraging the logs
  • Summary
  • Further reading
  • Chapter 8: Enhancing Your Network Defensive Skills
  • Technical requirements
  • Using the master tool of network mapping - Nmap
  • Phases of a cyber attack
  • Nmap
  • Nmap scripts.
  • Improving the protection of wireless networks
  • Wireless network vulnerabilities
  • User's safety guide for wireless networks
  • Introducing Wireshark
  • Finding users using insecure protocols
  • FTP, HTTP, and other unencrypted traffic
  • Wireshark for defensive security
  • Working with IPS/IDS
  • What is an IDS?
  • What is an IPS?
  • Free IDS/IPS
  • IPS versus IDS
  • Summary
  • Chapter 9: Deep Diving into Physical Security
  • Technical requirements
  • Understanding physical security and associated threats
  • The powerful LAN Turtle
  • The stealthy Plunder Bug LAN Tap
  • The dangerous Packet Squirrel
  • The portable Shark Jack
  • The amazing Screen Crab
  • The advanced Key Croc
  • USB threats
  • Equipment theft
  • Environmental risks
  • Physical security mechanisms
  • Mastering physical security
  • Clean desk policy
  • Physical security audits
  • Summary
  • Further reading
  • Chapter 10: Applying IoT Security
  • Understanding the Internet of Things
  • The risks
  • The vulnerabilities
  • Understanding IoT networking technologies
  • LoRaWAN
  • Zigbee
  • Sigfox
  • Bluetooth
  • Security considerations
  • Improving IoT security
  • Creating cybersecurity hardware using IoT-enabled devices
  • Raspberry Pi firewall and intrusion detection system
  • Defensive security systems for industrial control systems (SCADA)
  • Secure USB-to-USB copy machine
  • Creating a 10 honeypot
  • Advanced monitoring of web apps and networks
  • Creating an internet ad blocker
  • Access control and physical security systems
  • Bonus track - Understanding the danger of unauthorized IoT devices
  • Detecting unauthorized IoT devices
  • Detecting a Raspberry Pi
  • Disabling rogue Raspberry Pi devices
  • Summary
  • Further reading
  • Chapter 11: Secure Development and Deployment on the Cloud
  • Technical requirements
  • Secure deployment and implementation of cloud applications.
  • Security by cloud models
  • Data security in the cloud
  • Securing Kubernetes and APIs
  • Cloud-native security
  • Controlling access to the Kubernetes API
  • Controlling access to kubelet
  • Preventing containers from loading unwanted kernel modules
  • Restricting access to etcd
  • Avoiding the use of alpha or beta features in production
  • Third-party integrations
  • Hardening database services
  • Testing your cloud security
  • Azure Security Center
  • Amazon CloudWatch
  • AppDynamics
  • Nessus vulnerability scanner
  • InsightVM
  • Intruder
  • Summary
  • Further reading
  • Chapter 12: Mastering Web App Security
  • Technical requirements
  • Gathering intelligence about your site/web application
  • Importance of public data gathering
  • Open Source Intelligence
  • Hosting information
  • Checking data exposure with Google hacking (dorks)
  • Leveraging DVWA
  • Installing DVWA on Kali Linux
  • Overviewing the most common attacks on web applications
  • Exploring XSS attacks
  • Using Burp Suite
  • Burp Suite versions
  • Setting up Burp Suite on Kali
  • SQL injection attack on DVWA
  • Fixing a common error
  • Brute forcing web applications' passwords
  • Analyzing the results
  • Summary
  • Further reading
  • Section 3: Deep Dive into Defensive Security
  • Chapter 13: Vulnerability Assessment Tools
  • Technical requirements
  • Dealing with vulnerabilities
  • Who should be looking for vulnerabilities?
  • Bug bounty programs
  • Internal vulnerabilities
  • Vulnerability testing tools
  • Using a vulnerability assessment scanner (OpenVAS)
  • Authenticated tests
  • Installing OpenVAS
  • Using OpenVAS
  • Updating your feeds
  • Overview of Nexpose Community
  • Summary
  • Further reading
  • Chapter 14: Malware Analysis
  • Technical requirements
  • Why should I analyze malware?
  • Malware functionality
  • Malware objectives
  • Malware connections.
  • Malware backdoors.