Cyber Security Essentials
Instant Download
Price:
9.99
USD
9.99
USD
Tradebit buyer protection fee included.
Instant Download from offroadblowouts, digital version
Features
Illustrates more than 75 key security concepts with short, easy-to-understand descriptions
Explains the concepts behind todays most prevalent threats, tactics, and procedures
Provides actionable advice for the mitigation of common vulnerabilities
Supplies a fundamental understanding of the issues impacting cyber security
Breaks down the code used to write exploits into understandable diagrams
Table of Contents
Cyber Security Fundamentals
Network and Security Concepts
Information Assurance Fundamentals
Basic Cryptography
Symmetric Encryption
Public Key Encryption
The Domain Name System (DNS)
Firewalls
Virtualization
Radio-Frequency Identification
Microsoft Windows Security Principles
Windows Tokens
Window Messaging
Windows Program Execution
The Windows Firewall
Attacker Techniques and Motivations
How Hackers Cover Their Tracks (Anti-forensics)
How and Why Attackers Use Proxies
Tunneling Techniques
Fraud Techniques
Phishing, Smishing, Vishing and Mobile Malicious Code
Rogue Anti-Virus
Click Fraud
Threat Infrastructure
Botnets
Fast-Flux
Advanced Fast-Flux
Exploitation
Techniques to Gain a Foothold
Shellcode
Integer Overflow Vulnerabilities
Stack-Based Buffer Overflows
Format-String Vulnerabilities
SQL Injection
Malicious PDF Files
Race Conditions
Web Exploit Tools
DoS Conditions
Brute-Force and Dictionary Attacks
Misdirection, Reconnaissance and Disruption Methods
Cross-Site Scripting (XSS)
Social Engineering
WarXing
DNS Amplification Attacks
Malicious Code
Self-Replicating Malicious Code
Worms
Viruses
Evading Detection and Elevating Privileges
Obfuscation
Virtual Machine Obfuscation
Persistent Software Techniques
Rootkits
Spyware
Attacks against Privileged User Accounts and Escalation of Privileges
Token Kidnapping
Virtual Machine Detection
Stealing Information and Exploitation
Form Grabbing
Man-in-the-Middle Attacks
DLL Injection
Browser Helper Objects
Defense and Analysis Techniques
Memory Forensics
Why Memory Forensics Is Important
Capabilities of Memory Forensics
Memory Analysis Frameworks
Dumping Physical Memory
Installing and Using Volatility
Finding Hidden Processes
Volatility Analyst Pack
Honeypots
Malicious Code Naming
Automated Malicious Code Analysis Systems
Passive Analysis
Active Analysis
Physical or Virtual Machines
Intrusion Detection Systems
Illustrates more than 75 key security concepts with short, easy-to-understand descriptions
Explains the concepts behind todays most prevalent threats, tactics, and procedures
Provides actionable advice for the mitigation of common vulnerabilities
Supplies a fundamental understanding of the issues impacting cyber security
Breaks down the code used to write exploits into understandable diagrams
Table of Contents
Cyber Security Fundamentals
Network and Security Concepts
Information Assurance Fundamentals
Basic Cryptography
Symmetric Encryption
Public Key Encryption
The Domain Name System (DNS)
Firewalls
Virtualization
Radio-Frequency Identification
Microsoft Windows Security Principles
Windows Tokens
Window Messaging
Windows Program Execution
The Windows Firewall
Attacker Techniques and Motivations
How Hackers Cover Their Tracks (Anti-forensics)
How and Why Attackers Use Proxies
Tunneling Techniques
Fraud Techniques
Phishing, Smishing, Vishing and Mobile Malicious Code
Rogue Anti-Virus
Click Fraud
Threat Infrastructure
Botnets
Fast-Flux
Advanced Fast-Flux
Exploitation
Techniques to Gain a Foothold
Shellcode
Integer Overflow Vulnerabilities
Stack-Based Buffer Overflows
Format-String Vulnerabilities
SQL Injection
Malicious PDF Files
Race Conditions
Web Exploit Tools
DoS Conditions
Brute-Force and Dictionary Attacks
Misdirection, Reconnaissance and Disruption Methods
Cross-Site Scripting (XSS)
Social Engineering
WarXing
DNS Amplification Attacks
Malicious Code
Self-Replicating Malicious Code
Worms
Viruses
Evading Detection and Elevating Privileges
Obfuscation
Virtual Machine Obfuscation
Persistent Software Techniques
Rootkits
Spyware
Attacks against Privileged User Accounts and Escalation of Privileges
Token Kidnapping
Virtual Machine Detection
Stealing Information and Exploitation
Form Grabbing
Man-in-the-Middle Attacks
DLL Injection
Browser Helper Objects
Defense and Analysis Techniques
Memory Forensics
Why Memory Forensics Is Important
Capabilities of Memory Forensics
Memory Analysis Frameworks
Dumping Physical Memory
Installing and Using Volatility
Finding Hidden Processes
Volatility Analyst Pack
Honeypots
Malicious Code Naming
Automated Malicious Code Analysis Systems
Passive Analysis
Active Analysis
Physical or Virtual Machines
Intrusion Detection Systems
(ID 275324965)
File Data:
Contact Seller:
offroadblowouts,
US, Member since 06/13/2014
URL:
Embed:
Resell product:
Related Files
-
Yamaha Yz450f & Yz450fr Parts Catalog Manual Service Repair -2- Manuals 2003 Instant Download
-
Instant Download Nicad Battery Complete Repair Guide
-
☆☆ Best ☆☆ Panasonic Dp-1510p/dp-1810p/dp-1810f/dp- 2010e Digital Imaging Systems Technical Guide
-
Instant Income Boost
-
Ebayebookdigdel-quality Product With Resale Rights
-
Sony Dsc-w100 Digital Camera Service Manual
-
Sharp Ar M350, M450, W Opt Ar Ef1, M11, Rk1 Digital Copier, Printer, Multifunction Service Manual
Tradebit Reviews
Tradebit is the worlds largest marketplace for digital files, with over 2.5 million satisfied customers and millions of digital products. Online for over 12 years, Tradebit is the best place to find files like music, video tutorials, repair manuals, and more. If you're curious about how much our users love Tradebit, read reviews from real buyers!





