-
Book Overview & Buying
-
Table Of Contents
Cybersecurity Blue Team Toolkit
By :
Cybersecurity Blue Team Toolkit
By:
Overview of this book
As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner’s wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise.
Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as ping, tracert, PuTTY, pathping, sysinternals, NMAP, OpenVAS, Nexpose Community, OSSEC, Hamachi, InSSIDer, Nexpose Community, Wireshark, Solarwinds Kiwi Syslog Server, Metasploit, Burp, Clonezilla and many more.
Table of Contents (20 chapters)
Foreword
Introduction
CHAPTER 1: Fundamental Networking and Security Tools
CHAPTER 2: Troubleshooting Microsoft Windows
CHAPTER 3: Nmap—The Network Mapper
CHAPTER 4: Vulnerability Management
CHAPTER 5: Monitoring with OSSEC
CHAPTER 6: Protecting Wireless Communication
CHAPTER 7: Wireshark
CHAPTER 8: Access Management
CHAPTER 9: Managing Logs
CHAPTER 10: Metasploit
CHAPTER 11: Web Application Security
CHAPTER 12: Patch and Configuration Management
CHAPTER 13: Securing OSI Layer 8
CHAPTER 14: Kali Linux
CHAPTER 15: CISv7 Controls and Best Practices
Index
End User License Agreement
