Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Buy

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will end by building your own web applications servers, including WordPress and Joomla!. Systems from 2011 through 2017 are covered, including Windows 7, Windows 8, Windows 10, Windows Server 2012, and Windows Server 2016 as well as a range of Linux distributions, including Ubuntu, CentOS, Mint, and OpenSUSE.

Key defensive techniques are integrated throughout and you will develop situational awareness of your network and build a complete defensive infrastructure, including log servers, network firewalls, web application firewalls, and intrusion detection systems.

Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways. You will learn about Metasploit, browser attacks, privilege escalation, pass-the-hash attacks, malware, man-in-the-middle attacks, database attacks, and web application attacks.

What You’ll Learn

  • Construct a testing laboratory to experiment with software and attack techniques
  • Build realistic networks that include active directory, file servers, databases, web servers, and web applications such as WordPress and Joomla!
  • Manage networks remotely with tools, including PowerShell, WMI, and WinRM
  • Use offensive tools such as Metasploit, Mimikatz, Veil, Burp Suite, and John the Ripper
  • Exploit networks starting from malware and initial intrusion to privilege escalation through password cracking and persistence mechanisms
  • Defend networks by developing operational awareness using auditd and Sysmon to analyze logs, and deploying defensive tools such as the Snort intrusion detection system, IPFire firewalls, and ModSecurity web application firewalls

Who This Book Is For

This study guide is intended for everyone involved in or interested in cybersecurity operations (e.g., cybersecurity professionals, IT professionals, business professionals, and students) 

(HTML tags aren't allowed.)

Software Architecture (Advanced Topics in Science and Technology in China)
Software Architecture (Advanced Topics in Science and Technology in China)
Part of the new series, Advanced Topics in Science and Technology in China, this book aims to introduce the theoretical foundations, various sub-fields, current research, and practical methods of software architecture. Readers can acquire basic knowledge of software architecture, including why software architecture is necessary, how we can describe...
Lonely Planet Pocket Los Angeles (Encounter)
Lonely Planet Pocket Los Angeles (Encounter)

Get Straight to the Heart of the City
Top Sights. The city’s must-see sights plus expert advice to make your trip even better.
Local Life. Discover how to unlock the city with guides to areas that the locals really love.
Best of Los Angeles. We’ve found the best walks, food, art
...

Inside the Windows 95 File System: IFSMgr, The Installable File System Manager (Nutshell Handbooks)
Inside the Windows 95 File System: IFSMgr, The Installable File System Manager (Nutshell Handbooks)

This book details the Windows 95 File System, depicting the role it plays in providing opportunities and challenges for developers. Over the course of the book, Stan Mitchell progressively strips away the layers of the Win95 File System, which reside in a component named Installable File System Manager or IFSMgr, providing the reader with...


Core Concepts of Accounting Information Systems
Core Concepts of Accounting Information Systems

Information technologies impact every aspect of accounting, including financial reporting, managerial accounting, auditing, and tax. The nature of the work done by accountants continues to evolve as these technologies advance. For example, less than 30 years ago, accountants could have spent much of their day footing ledgers and making...

Skeletal Trauma: Fractures, Dislocations, Ligamentous Injuries (2-Volume Set)
Skeletal Trauma: Fractures, Dislocations, Ligamentous Injuries (2-Volume Set)
The first edition of Skeletal Trauma: Fractures, Dislocations, Ligamentous Injuries was written between 1988 and 1991. This represented a unique window for the creation of this text, coinciding with the increased recognition of the special needs of trauma victims. By the mid-1980s, more than 500 regional trauma centers had...
Statistical Mechanics of Learning
Statistical Mechanics of Learning
The effort to build machines that are able to learn and undertake tasks such as datamining, image processing and pattern recognition has led to the development of artificial neural networks in which learning from examples may be described and understood. The contribution to this subject made over the past decade by researchers applying the...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy