The NIST Cybersecurity Framework provides a way of implementing cybersecurity best practices. The book takes you through how to evaluate the current and future state of your program, and which controls to implement to reduce overall risk posture.
This book is a practical guide to learning all about MPLS and SR-MPLS networks, covering key concepts, hands-on labs, and advanced topics, such as fast rerouting (FRR) and TI-LFA for efficient traffic management and network resilience.
This book offers in-depth coverage and practical insights for effectively securing AWS environments, encompassing key services, compliance, and best practices.
This new edition will show you how to make it much more difficult for an attacker to exploit your Linux system. You’ll be guided through installing a Linux operating system, either on bare metal or in a virtual machine, before tackling configuration and auditing.
Gain a comprehensive understanding of the detection engineering lifecycle, why it’s important, and how it can be leveraged to protect your organization. Authored by three cybersecurity veterans, this practical guide covers everything from fundamental concepts to career insights, enriching your cybersecurity expertise and bolstering your CV.
PowerShell is a powerful framework and tool that can help both red and blue teamers. It’s easy to learn and provides direct access to the Windows subsystem and APIs. This book will provide you with the skills and knowledge to make the most of PowerShell from both a red and blue team perspective. You’ll learn to attack, secure, and build a robust security framework within your organization.
PowerShell is a powerful framework and tool that can help both red and blue teamers. It’s easy to learn and provides direct access to the Windows subsystem and APIs. This book will provide you with the skills and knowledge to make the most of PowerShell from both a red and blue team perspective. You’ll learn to attack, secure, and build a robust security framework within your organization.
This hands-on guide to understanding Snort 3 and its evolution covers everything from installation to configuration based on available resources and expected detection rates. The book dives into various key modules using practical examples.
Master the craft of offensive security using Python. Gain holistic understanding of web security, exploit vulnerabilities, automate security tasks, and fortify your defenses to succeed in the ever-evolving cybersecurity landscape.
This book covers program selection, security methodologies, and advanced techniques like enumeration and privilege escalation. You’ll gain the skills to excel in bug bounty programs, contributing to enhanced cybersecurity while maximizing rewards.
A comprehensive guide to critical infrastructure and cybersecurity, essential for those concerned about modern safety. Gain insights into growing cyber threats, system vulnerabilities, and common attacks. Learn practical techniques for protecting CI.
This book covers threat management, investigation, automation, and integration with other security tools to fortify organizational cybersecurity defenses effectively.
Comprehensive guidance on evaluating cybersecurity, conducting risk assessments, and auditing IT systems for compliance across multiple platforms like AWS, Azure, and GCP.
This comprehensive book helps you understand layered security. You’ll cover essential concepts, from risk assessment to proactive defense strategies.
A comprehensive book that equips you with essential techniques to assess, exploit, and secure APIs against cyber threats.