Cybersecurity Awareness for Employees - Mike Miller - Libros -  - 9798557157315 - 1 de noviembre de 2020
En caso de que portada y título no coincidan, el título será el correcto

Cybersecurity Awareness for Employees


Recibe un correo electrónico cuando el artículo esté disponible
¿Tienes un perfil? Iniciar sesión
Añadir a tu lista de deseos de iMusic

In this book you will learn over 100 terms and concepts related to Cybersecurity. This book is designed for beginners or employees to have a better understanding and awareness of Threats and Vulnerabilities. This book will teach you how to protect yourself and your Business from the most common Cyber-attacks in no time!BUY THIS BOOK NOW AND GET STARTED TODAY!You will learn: -Viruses, Cryptomalware and Ransomware, Trojans, Rootkits, Keyloggers, Adware, Spyware, -Botnets, Logic Bomb, Backdoors, Social Engineering, Social Engineering Attacks, -Vishing, Tailgaiting, Impersonation, Dumpster Diving, Shoulder Surfing, Hoaxes, -Watering Hole Attack, DDoS Attack, Replay Attacks, Man in the Middle Attack, -Buffer Overflow Attack, SQL Injection Attack, LDAP Injection Attack, -XML Injection Attack, Cross-Site Scripting, Cross-Site Request Forgery, -Privilege Escalation, ARP Poisoning, Smurf Attack, DNS Poisoning, -Zero Day Attacks, Pass the Hash, Clickjacking, Session Hijacking, -Typo Squatting and URL Hijacking, Shimming, Refactoring, IP/MAC Spoofing, -Wireless Replay Attacks, IV Attack, Rogue Access Points, Evil Twin, WPS Attacks-Bluejacking and Bluesnarfing, NFC Attacks, Dissociation Attack, Brute Force Attack, -Dictionary Attacks, Birthday Attack, Rainbow Tables, Collision and Downgrade Attack, -Script Kiddies, Hacktivists, Nation States/APT, Organized Crime, Insiders, Competitors, -Open Source Intelligence (OSINT), Penetration Test Steps, Active and Passive Reconnaissance, -Pivoting, Persistence, Escalation of Privilege, Black Box, White Box, and Grey Box Testing-Pen Testing vs. Vulnerability Scanning, Red vs. Blue Teams, -How to define the Vulnerability Scanning Process-How to Identify Vulnerability and Lack of Security Controls-How to Identify Common Misconfigurations, Credentialed vs. Non-credentialed, False Positive-Rules of Engagement and Authorization, Impact Assessment, Race Conditions, -Support/Lifecycle Vulnerabilities, Secure Coding Concepts, Resource Exhaustion, -Vulnerable Business Processes, Weak Cipher Suites and Implementations, Memory Leaks, -Integer Overflow, Pointer Dereference, DLL Injection, System Sprawl, -Architecture Design Weaknesses, Data Loss Prevention & RAID, -Proxy Servers, IDS & IPS Systems, VPN Basics and more... BUY THIS BOOK NOW AND GET STARTED TODAY!

Medios de comunicación Libros     Paperback Book   (Libro con tapa blanda y lomo encolado)
Publicado 1 de noviembre de 2020
ISBN13 9798557157315
Páginas 168
Dimensiones 152 × 229 × 9 mm   ·   231 g
Lengua Inglés  

Mas por Mike Miller

Mostrar todo