Mastering Cybersecurity : A Practical Guide to Cyber Tools and Techniques (Volume 2)

個数:
  • 予約

Mastering Cybersecurity : A Practical Guide to Cyber Tools and Techniques (Volume 2)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 336 p.
  • 言語 ENG
  • 商品コード 9781032893921
  • DDC分類 005.8

Full Description

In today's ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyber defender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes.

Volume 2: The journey continues with volume two for mastering advanced techniques for network traffic analysis using Wireshark and other network sniffers. Then, we unlock the power of Open-Source Intelligence (OSINT) to gather valuable intel from publicly available sources, including social media, web, images, and others. From there, explore the unique challenges of securing the Internet of Things (IoT) and conquer the art of reconnaissance, the crucial first stage of ethical hacking. Finally, we explore the dark web - a hidden corner of the internet - and learn safe exploration tactics to glean valuable intelligence. The book concludes by teaching you how to exploit vulnerabilities ethically during penetration testing and write pen test reports that provide actionable insights for remediation.

Contents

11. Chapter 1: Networking for Cyber Professionals
Learn about the basics of networking, protocols, ports from Cybersecurity perspectives.
12. Chapter 2: Deciphering Data Streams: Network Traffic Analysis
Master the art of network traffic analysis using industry-standard tools to identify suspicious network activity and potential data breaches.
13. Chapter 3: Open-Source Intelligence: Harnessing Intelligence from Digital space
Discover the power of OSINT and learn to unveil digital footprints.
14. Chapter 4: Hands-on OSINT Investigations
Conduct real-world OSINT investigations, harnessing social media, web, and publicly available sources for gathering valuable intelligence.
15. Chapter 5: Securing of Smart Interconnected Devices
Explore the unique challenges of securing smart devices and internet-connected devices (IoT).
16. Chapter 6: Ethical Hacking of Smart IoT Devices
Perform penetration testing of Smart interconnected ecosystems to expose and exploit vulnerabilities.
17. Chapter 7: Into the Shadows: Theory of Dark Web Investigations
Go beyond the surface web and delve into the hidden online world of the dark web.
18. Chapter 8: Hands-on Dark Web Investigations
Learn safe exploration techniques to gather intelligence from hidden forums and marketplaces to stay ahead of potential threats.
19. Chapter 9: Exploit the Gaps: Theory of Ethical Exploitation and Reporting
Master the art of Ethical Hacking during penetration testing. Learn to document your findings.
20. Chapter 10: Hands-on Exploitation of OS & Apps
Master the art of exploiting vulnerabilities ethically during pen testing. Write compelling penetration testing reports that provide actionable insights for remediation.

最近チェックした商品