ISBN 9788126549191,Cybersecurity: Managing Systems, Conducting Testing, And Investigating Intrusions

Cybersecurity: Managing Systems, Conducting Testing, And Investigating Intrusions



Wiley India Pvt Ltd

Publication Year 2014

ISBN 9788126549191

ISBN-10 812654919X


Number of Pages 360 Pages
Language (English)

Computer Engineering

Serve As A Detailed, Hands-On Guide For Anyone Who Wants To Enter The Hands-On Security Profession, Including Cybersecurity Testing, It Testing/Development, And System/Network Administration. It Will Also Serve As The Text For A Cybersecurity Course At 2 And 4 Year Colleges And Vocational Cybersecurity Education. The Book Is Also A Useful Reference For Working Cybersecurity Professionals For Techniques Such As Advanced Filtering With Wireshark And Tcpdump, Command Line Scripting, Network Penetration, Tool Customization, Network Administration, And Log Analysis. This Book Covers Basic Network Administration Skills That Everyone Needs Through To Advanced Command Line Scripting, Tool Customization, And Log Analysis Skills That Are Very Useful In Every Shop, But Few Professionals Have. The Book Goes Deeper Into Wireshark/Tcpdump Filtering, Google Hacks, Windows/Linux Scripting, Metasploit Command Line, And Tool Customizations. In Addition To The Accompanying Course Syllabus, Powerpoint Slides, And Test Bank, The Ancillaries Include Downloadable Custom Scripts For Advanced Log Analysis. The Book Can Be Used In Tandem With The Seed Project Lab Exercises At Http://Www.Cis.Syr.Edu/~Wedu/Seed/ Which Are Free, Open Source Security Labs With A Free Instructor'S Manual. The Book'S Exercises Can Be Tested Using The Free Version Of Backtrack Linux. The Book Covers: Cyber Network Security Concepts; Signature-Based Malware Detection Vs. Polymorphic Threats Security Training Roadmap; Cyber Antipatterns & Templates Cyber Security Architecture; Cyber Network Security Hands-On Network Administration For Windows, Linux, And Vmware Administrator And Root Accounts; System Protection / Anti-Malware Firewall Configuration; Security Tool Customization On Windows And Backtrack Linux Alternative Pen Test Architectures; Protocol Analysis And Network Programming Linux/Unix Command Line Scripting; Windows Command Line Scripting; Python Scripting Reconnaissance, Vulnerabilities, And Cyber Testing; Cyber Security Test Planning And Reporting Penetration Testing; Advanced Log Analysis And Cyber Network Defense Reporting Cyber Investigations; Eradication Of Cyber Threats