본문 바로가기

리디 접속이 원활하지 않습니다.
강제 새로 고침(Ctrl + F5)이나 브라우저 캐시 삭제를 진행해주세요.
계속해서 문제가 발생한다면 리디 접속 테스트를 통해 원인을 파악하고 대응 방법을 안내드리겠습니다.
테스트 페이지로 이동하기

Network Security Strategies 상세페이지

Network Security Strategies

Protect your network and enterprise against advanced cybersecurity attacks and threats

  • 관심 0
소장
전자책 정가
24,000원
판매가
24,000원
출간 정보
  • 2020.11.06 전자책 출간
듣기 기능
TTS(듣기) 지원
파일 정보
  • PDF
  • 378 쪽
  • 20.2MB
지원 환경
  • PC뷰어
  • PAPER
ISBN
9781789801057
ECN
-
Network Security Strategies

작품 정보

Build a resilient network and prevent advanced cyber attacks and breaches

▶Book Description
With advanced cyber attacks severely impacting industry giants and the constantly evolving threat landscape, organizations are adopting complex systems to maintain robust and secure environments. Network Security Strategies will help you get well-versed with the tools and techniques required to protect any network environment against modern cyber threats.</p><p>You'll understand how to identify security vulnerabilities across the network and how to effectively use a variety of network security techniques and platforms. Next, the book will show you how to design a robust network that provides top-notch security to protect against traditional and new evolving attacks. With the help of detailed solutions and explanations, you'll be able to monitor networks skillfully and identify potential risks. Finally, the book will cover topics relating to thought leadership and the management aspects of network security.

By the end of this network security book, you'll be well-versed in defending your network from threats and be able to consistently maintain operational efficiency, security, and privacy in your environment.

▶What You Will Learn
⦁Understand network security essentials, including concepts, mechanisms, and solutions to implement secure networks
⦁Get to grips with setting up and threat monitoring cloud and wireless networks
⦁Defend your network against emerging cyber threats in 2020
⦁Discover tools, frameworks, and best practices for network penetration testing
⦁Understand digital forensics to enhance your network security skills
⦁Adopt a proactive approach to stay ahead in network security

▶Key Features
⦁ Explore modern cybersecurity techniques to protect your networks from ever-evolving cyber threats
⦁ Prevent cyber attacks by using robust cybersecurity strategies
⦁ Unlock the secrets of network security

▶Who This Book Is For
This book is for anyone looking to explore information security, privacy, malware, and cyber threats. Security experts who want to enhance their skill set will also find this book useful. A prior understanding of cyber threats and information security will help you understand the key concepts covered in the book more effectively.

▶What this book covers
⦁ Chapter 1, Network Security Concepts, is a start point where you will gain an understanding of what networking security concepts are. This includes the mechanisms and solutions that can be implemented. We will also take a look at the various types of setup that organizations have and what the best practices are, according to leading industry resources, for secure network establishment.

⦁ Chapter 2, Security for the Cloud and Wireless Networks, deals with the security concepts that are relevant for this book with respect to cloud and wireless networking. The majority of today's attacks on the corporate side are targeted toward cloud instances. On the other hand, unprotected wireless networks are textbook entry points for threat actors looking to gain access to an organization's infrastructure. We will cover this in detail and discuss how each category of the network can be protected and the various methods that can be employed to defend them.

⦁ Chapter 3, Mitigating the Top Network Threats of 2020, discusses the top network threats and how to mitigate them. This will also give you a detailed understanding of how to perform a network security assessment, such as a vulnerability assessment, and perform continuous monitoring, enabling you to monitor active and ongoing threats in your environment.

⦁ Chapter 4, Network Penetration Testing and Best Practices, is a step-by-step guide for you, after which you yourself can perform network penetration testing and document the findings for the next steps. We will look at the different tools/platforms that will help you perform these activities efficiently.

⦁ Chapter 5, Advanced Network Attacks, focuses on introducing the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (for example, electrical power grids), ground transportation systems (automotive, roads, bridges, and tunnels); airports and air traffic control systems; wired and wireless communication and sensor networks; systems for storing and distributing water and food supplies; medical and healthcare delivery systems; and financial, banking, and commercial transaction assets.

⦁ Chapter 6, Network Digital Forensics, is the process of looking at network artifacts to determine whether any unauthorized activity has taken place and to retrieve artifacts and evidence to prove it. This may include, but is not restricted to, network monitoring, network recording, and active/passive analysis of network traffic and events for correlation. Analysts such as yourself can use these techniques to uncover the origination of security events and perform root cause analysis. The idea behind a strong forensics practice is to enable the blue team to improve their detection techniques and have a better understanding and visibility throughout the network. In this chapter, we will be taking a deep-dive look at how to perform network forensics and how to utilize these results to build a strong security mechanism.

⦁ Chapter 7, Performing Network Auditing, explains why network auditing is needed and how to conduct it. This will be a step-by-step guide for you, after which you yourself can perform network audits and document the findings for the next steps. We will look at the different tools, platforms, and other guides that will help you perform these activities efficiently.

⦁ Chapter 8, Continuous and Effective Threat Management, discusses what threat management is all about and how it is going to help you transform your security posture. Most organizations face some magnitude of security threats today and effective management of these threats and prioritization is crucial for success. In this chapter, this is exactly what you will learn and understand as a practice for your operations. We will also talk about how to have a risk discussion with senior management and translate risk in business terms. The essence is how to analyze a threat and gauge its business impact so as to communicate it to the leadership in appropriate terms. A threat may mean different things to different areas of the organization. Hence, putting the implications into perspective and validating the risk and control effectiveness is critical for a security professional.

⦁ Chapter 9, Proactive Security Strategies, is a step-by-step guide to how to make your security approach proactive in nature. We look at steps to develop a proactive security strategy, by means of which companies can effectively assess risk and minimize the potential of a breach.

작가 소개

▶About the Author
- Aditya Mukherjee
Dr. Aditya Mukherjee is a Cyber Security veteran and an Information Security Leader with 14+ years of experience in Leadership roles across Info. Sec. domains such as Defence & Law Enforcement, Financial Services, Health & Public Service, Products, Resources, Communications, Media & Technology. His core expertise includes Cyber Security Strategy, Strategic Risk & Cyber Resilience Assessment, Tactical Leadership & Development, GRC & Security Audit, Security Operations, Architecture & Engineering, Threat Management, Security Investigation, and Forensics.
He started his career as an Entrepreneur, where his specializations included implementation of Cyber security solutions / Cyber transformation projects, and solving challenges associated with Security architecture, framework, policies, and procedures. Later he had the opportunity to work with various LEA across India and conduct over 160 trainings programs for Government organizations, Corporate and educational institutions. Over the tenure of his career he has been bestowed with various Industry recognitions & Awards, of which most recently are the - Cyber Sentinel of the Year, CISO of the Year 2019 @ Indian CISO Awards 2019, Most Innovative / Dynamic CISO of the Year - 2018, and an Honorary Doctorate – For Excellence in the Field of Cyber Security Management.

리뷰

0.0

구매자 별점
0명 평가

이 작품을 평가해 주세요!

건전한 리뷰 정착 및 양질의 리뷰를 위해 아래 해당하는 리뷰는 비공개 조치될 수 있음을 안내드립니다.
  1. 타인에게 불쾌감을 주는 욕설
  2. 비속어나 타인을 비방하는 내용
  3. 특정 종교, 민족, 계층을 비방하는 내용
  4. 해당 작품의 줄거리나 리디 서비스 이용과 관련이 없는 내용
  5. 의미를 알 수 없는 내용
  6. 광고 및 반복적인 글을 게시하여 서비스 품질을 떨어트리는 내용
  7. 저작권상 문제의 소지가 있는 내용
  8. 다른 리뷰에 대한 반박이나 논쟁을 유발하는 내용
* 결말을 예상할 수 있는 리뷰는 자제하여 주시기 바랍니다.
이 외에도 건전한 리뷰 문화 형성을 위한 운영 목적과 취지에 맞지 않는 내용은 담당자에 의해 리뷰가 비공개 처리가 될 수 있습니다.
아직 등록된 리뷰가 없습니다.
첫 번째 리뷰를 남겨주세요!
'구매자' 표시는 유료 작품 결제 후 다운로드하거나 리디셀렉트 작품을 다운로드 한 경우에만 표시됩니다.
무료 작품 (프로모션 등으로 무료로 전환된 작품 포함)
'구매자'로 표시되지 않습니다.
시리즈 내 무료 작품
'구매자'로 표시되지 않습니다. 하지만 같은 시리즈의 유료 작품을 결제한 뒤 리뷰를 수정하거나 재등록하면 '구매자'로 표시됩니다.
영구 삭제
작품을 영구 삭제해도 '구매자' 표시는 남아있습니다.
결제 취소
'구매자' 표시가 자동으로 사라집니다.

개발/프로그래밍 베스트더보기

  • 핸즈온 LLM (제이 알아마르, 마르턴 흐루턴도르스트)
  • 모던 소프트웨어 엔지니어링 (데이비드 팔리, 박재호)
  • 러닝 랭체인 (메이오 오신, 누노 캄포스)
  • 개정4판 | 스위프트 프로그래밍 (야곰)
  • LLM 엔지니어링 (막심 라본, 폴 이우수틴)
  • 주니어 백엔드 개발자가 반드시 알아야 할 실무 지식 (최범균)
  • 미래를 선점하라 : AI Agent와 함께라면 당신도 디지털 천재 (정승원(디지털 셰르파))
  • 잘되는 머신러닝 팀엔 이유가 있다 (데이비드 탄, 에이다 양)
  • 혼자 만들면서 공부하는 딥러닝 (박해선)
  • 개정판 | 개발자 기술 면접 노트 (이남희)
  • 스테이블 디퓨전 실전 가이드 (시라이 아키히코, AICU 미디어 편집부)
  • 개정판|혼자 공부하는 파이썬 (윤인성)
  • 실리콘밸리에서 통하는 파이썬 인터뷰 가이드 (런젠펑, 취안수쉐)
  • 7가지 프로젝트로 배우는 LLM AI 에이전트 개발 (황자, 김진호)
  • 개발자를 위한 쉬운 쿠버네티스 (윌리엄 데니스, 이준)
  • 전략적 모놀리스와 마이크로서비스 (반 버논, 토마스 야스쿨라)
  • 요즘 우아한 AI 개발 (우아한형제들)
  • 최고의 프롬프트 엔지니어링 강의 (김진중)
  • [리얼타임] 버프스위트 활용과 웹 모의해킹 (김명근, 조승현)
  • 입문자를 위한 맞춤형 AI 프로그램 만들기 (다비드스튜디오)

본문 끝 최상단으로 돌아가기

spinner
앱으로 연결해서 다운로드하시겠습니까?
닫기 버튼
대여한 작품은 다운로드 시점부터 대여가 시작됩니다.
앱으로 연결해서 보시겠습니까?
닫기 버튼
앱이 설치되어 있지 않으면 앱 다운로드로 자동 연결됩니다.
모바일 버전