Cybersecurity - Attack and Defense Strategies
With cybercrime on a rise, cybersecurity has become extremely vital to industries. Companies have started adopting more stringent ways of preventing system breaches. This book will explore Red Team tactics that can be used in penetration for accessing sensitive data and Blue Team tactics that can help you defend your system from complex attacks.
Offered by
Difficulty Level
Intermediate
Completion Time
12h48m
Language
English
About Book
Who Is This Book For?
This book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.
Cybersecurity - Attack and Defense Strategies
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 12h48m total length
Security Posture
Incident Response Process
Understanding the Cybersecurity Kill Chain
Reconnaissance
Compromising the System
Chasing a User's Identity
Lateral Movement
Privilege Escalation
Security Policy
Network Segmentation
Active Sensors
Threat Intelligence
Investigating an Incident
Recovery Process
Vulnerability Management
Log Analysis
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!