Atjaunināt sīkdatņu piekrišanu

E-grāmata: Mastering Cybersecurity: A Practical Guide for Professionals (Volume 1)

(University of Petroleum and Energy Studies)
  • Formāts: 218 pages
  • Izdošanas datums: 30-Dec-2024
  • Izdevniecība: CRC Press
  • Valoda: eng
  • ISBN-13: 9781040262481
  • Formāts - EPUB+DRM
  • Cena: 56,34 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

In today's ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyber defender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes.



In today’s ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyberdefender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes.

Volume 1: The first volume starts with the fundamentals and hands-on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn’t just about identifying weaknesses; it’s about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You’ll also learn live hunting for vulnerable devices and systems on the Internet.

Volume 2: The journey continues with volume two for mastering advanced techniques for network traffic analysis using Wireshark and other network sniffers. Then, we unlock the power of open-source intelligence (OSINT) to gather valuable intel from publicly available sources, including social media, web, images, and others. From there, explore the unique challenges of securing the internet of things (IoT) and conquer the art of reconnaissance, the crucial first stage of ethical hacking. Finally, we explore the dark web – a hidden corner of the internet – and learn safe exploration tactics to glean valuable intelligence. The book concludes by teaching you how to exploit vulnerabilities ethically during penetration testing and write pen test reports that provide actionable insights for remediation.

The two volumes will empower you to become a well-rounded cybersecurity professional, prepared to defend against today’s ever-increasing threats.

Foreword. Preface. About the Author.
1.
Chapter 1: Uncover Digital
Footprints: Theory of Log Analysis (Windows and Linux OS).
2.
Chapter 2:
Hands-on Log Analysis: Uncovering Threats with Practical Tools.
3.
Chapter 3:
Basics of Penetration Testing.
4.
Chapter 4: Build Your Own Fortresses: Setup
Pen Test Virtual Environment.
5.
Chapter 5: Build Digital Landscapes: Learn
Kali Linux and AppSec Management.
6.
Chapter 6: Hands-on Deep Dive: Deploy
Tools, Containers, and Secure Apps.
7.
Chapter 7: Master the Art of
Reconnaissance.
8.
Chapter 8: Hands-on Recon Missions: Unearthing Target
Information.
9.
Chapter 9: Scan for Weaknesses: Vulnerability Analysis and
Threat Intelligence.
10.
Chapter 10: Hands-on Practical Vulnerability Hunting.
Dr. Akashdeep Bhardwaj is working as a Professor and Head of Cybersecurity Center of Excellence at the University of Petroleum & Energy Studies (UPES), Dehradun, India. An eminent IT industry expert with over 28 years of experience in areas such as Cybersecurity, Digital Forensics, and IT Operations, Dr. Bhardwaj mentors engineering graduates, masters, and doctoral students and leads industry projects and research. Dr. Bhardwaj is among the Top 2% research scientists according to Stanford University release in September 2024.

Dr. Bhardwaj is a Postdoctoral from Majmaah University, Saudi Arabia, and Ph.D. in Computer Science, specializing in Cloud Security. Dr. Bhardwaj has published over 135 research works including copyrights, patents, research papers, and authored and edited books in highly referred international journals. Dr. Bhardwaj has worked as a technology leader for several multinational organizations during his time in the IT industry and is experienced in IT, cybersecurity, and digital forensics technologies, including compliance audits, networking cybersecurity, and digital forensics, and holds multiple industry certifications.