download process

Cyber Security Essentials














Problems with checkout?
Try your download again
Instant Download
Price:
9.99
USD


Tradebit buyer protection fee included.

Instant Download from offroadblowouts, digital version

Pay for Cyber Security Essentials
6.0139 MB PDF File

Features
Illustrates more than 75 key security concepts with short, easy-to-understand descriptions
Explains the concepts behind todays most prevalent threats, tactics, and procedures
Provides actionable advice for the mitigation of common vulnerabilities
Supplies a fundamental understanding of the issues impacting cyber security
Breaks down the code used to write exploits into understandable diagrams

Table of Contents
Cyber Security Fundamentals
Network and Security Concepts 
     Information Assurance Fundamentals
     Basic Cryptography
     Symmetric Encryption
     Public Key Encryption
     The Domain Name System (DNS) 
     Firewalls
     Virtualization
     Radio-Frequency Identification
Microsoft Windows Security Principles
     Windows Tokens
     Window Messaging
     Windows Program Execution
     The Windows Firewall
Attacker Techniques and Motivations
How Hackers Cover Their Tracks (Anti-forensics) 
     How and Why Attackers Use Proxies 
     Tunneling Techniques
Fraud Techniques
     Phishing, Smishing, Vishing and Mobile Malicious Code
     Rogue Anti-Virus
     Click Fraud
Threat Infrastructure 
     Botnets 
     Fast-Flux 
     Advanced Fast-Flux
Exploitation
Techniques to Gain a Foothold
     Shellcode 
      Integer Overflow Vulnerabilities 
     Stack-Based Buffer Overflows 
     Format-String Vulnerabilities
     SQL Injection 
     Malicious PDF Files 
     Race Conditions 
     Web Exploit Tools 
     DoS Conditions 
     Brute-Force and Dictionary Attacks
Misdirection, Reconnaissance and Disruption Methods 
     Cross-Site Scripting (XSS) 
     Social Engineering 
     WarXing 
     DNS Amplification Attacks

Malicious Code
Self-Replicating Malicious Code 
     Worms 
     Viruses
Evading Detection and Elevating Privileges 
     Obfuscation 
     Virtual Machine Obfuscation 
     Persistent Software Techniques 
     Rootkits 
     Spyware 
     Attacks against Privileged User Accounts and Escalation of Privileges 
     Token Kidnapping 
     Virtual Machine Detection
Stealing Information and Exploitation 
     Form Grabbing 
     Man-in-the-Middle Attacks 
     DLL Injection 
     Browser Helper Objects
Defense and Analysis Techniques
Memory Forensics 
     Why Memory Forensics Is Important 
     Capabilities of Memory Forensics 
     Memory Analysis Frameworks 
     Dumping Physical Memory 
     Installing and Using Volatility 
     Finding Hidden Processes 
     Volatility Analyst Pack
Honeypots
Malicious Code Naming
Automated Malicious Code Analysis Systems
     Passive Analysis
     Active Analysis
     Physical or Virtual Machines
Intrusion Detection Systems 


(ID 275324965)

File Data:

Contact Seller:
offroadblowouts, US, Member since 06/13/2014

URL:

Embed:
Create JavaScript Mobile Tag Widgets for your homepage

Resell product:

Related Files


Tradebit Reviews

Tradebit is the worlds largest marketplace for digital files, with over 2.5 million satisfied customers and millions of digital products. Online for over 12 years, Tradebit is the best place to find files like music, video tutorials, repair manuals, and more. If you're curious about how much our users love Tradebit, read reviews from real buyers!