Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Foreword Introduction
Our Goal Who This Book Is For Navigating the Book Conventions Used in This Book O’Reilly Safari How to Contact Us Acknowledgments
Amanda Lee
1. Creating a Security Program
Lay the Groundwork Establish Teams Baseline Security Posture Assess Threats and Risks
Identify Assess Mitigate Monitor
Prioritize Create Milestones Use Cases, Tabletops, and Drills Expanding Your Team and Skillsets Conclusion
2. Asset Management and Documentation
Information Classification Asset Management Implementation Steps
Defining the Lifecycle Information Gathering Change Tracking Monitoring and Reporting
Asset Management Guidelines
Automation One Source of Truth Organize a Company-Wide Team Executive Champions Software Licensing Define Assets
Documentation
Networking Equipment Network Servers Desktops Users Applications Other
Conclusion
3. Policies
Language Document Contents Topics Storage and Communication Conclusion
4. Standards and Procedures
Standards Language Procedures Language Document Contents Conclusion
5. User Education
Broken Processes Bridging the Gap Building Your Own Program
Establish Objectives Establish Baselines Scope and Create Program Rules and Guidelines Implement and Document Program Infrastructure Positive Reinforcement Gamification Define Incident Response Processes
Gaining Meaningful Metrics
Measurements Tracking Success Rate and Progress Important Metrics
Conclusion
6. Incident Response
Processes
Pre-Incident Processes Incident Processes Post-Incident Processes
Tools and Technology
Log Analysis Disk and File Analysis Memory Analysis PCAP Analysis All in One
Conclusion
7. Disaster Recovery
Setting Objectives
Recovery Point Objective Recovery Time Objective
Recovery Strategies
Backups Warm Standby High Availability Alternate System System Function Reassignment
Dependencies Scenarios Invoking a Fail Over...and Back Testing Security Considerations Conclusion
8. Industry Compliance Standards and Frameworks
Industry Compliance Standards
Payment Card Industry Data Security Standard (PCI DSS) Health Insurance Portability & Accountability Act Gramm-Leach Bliley Act Family Educational Rights and Privacy Act Sarbanes-Oxley Act
Frameworks
Cloud Control Matrix Center for Internet Security Control Objectives for Information and Related Technologies The Committee of Sponsoring Organizations of the Treadway Commission ISO-27000 Series NIST CyberSecurity Framework
Regulated Industries
Financial Government Healthcare
Conclusion
9. Physical Security
Physical
Restrict Access Video Surveillance Authentication Maintenance Secure Media Datacenters
Operational
Identify Visitors and Contractors Visitor Actions Contractor Actions Badges Include Physical Security Training
Conclusion
10. Microsoft Windows Infrastructure
Quick Wins
Upgrade Third-Party Patches Open Shares
Active Directory Domain Services
Forest Domain Domain Controllers OUs Groups Accounts
Group Policy Objects EMET
Basic Configuration Custom Configuration Enterprise Deployment Strategies
MS-SQL Server
When Third-Party Vendors Have Access MS SQL Authentication SA User Security
Conclusion
11. Unix Application Servers
Keeping Up-to-Date
Third-Party Software Updates Core Operating System Updates Hardening a Unix Application Server
Disable services File permissions Host-based firewalls Managing file integrity Separate disk partitions chroot Mandatory Access Controls
Conclusion
12. Endpoints
Keeping Up-to-Date
Microsoft Windows macOS Unix Desktops Third-Party Updates
Hardening Endpoints
Disable Services Desktop Firewalls Full-Disk Encryption Endpoint Protection Tools
Mobile Device Management Endpoint Visibility Centralization Conclusion
13. Password Management and Multifactor Authentication
Basic Password Practices Password Management Software Password Resets Password Breaches Encryption, Hashing, and Salting
Encryption Hashing Salting
Password Storage Locations and Methods Password Security Objects
Setting a Fine-Grained Password Policy
Multifactor Authentication
Why 2FA? 2FA Methods How It Works Threats Where It Should Be Implemented
Conclusion
14. Network Infrastructure
Firmware/Software Patching Device Hardening
Services SNMP Encrypted Protocols Management Network
Routers Switches Egress Filtering IPv6: A Cautionary Note TACACS+ Conclusion
15. Segmentation
Network Segmentation
Physical Logical
VLANs ACLs NACs VPNs
Physical and Logical Network Example Software-Defined Networking
Application Roles and Responsibilities Conclusion
16. Vulnerability Management
How Vulnerability Scanning Works Authenticated versus Unauthenticated Scans Vulnerability Assessment Tools Vulnerability Management Program
Program Initialization Business as Usual
Remediation Prioritization Risk Acceptance Conclusion
17. Development
Language Selection
0xAssembly /* C and C++ */ GO func() #!/Python/Ruby/Perl <? PHP ?>
Secure Coding Guidelines Testing
Automated Static Testing Automated Dynamic Testing Peer Review
System Development Lifecycle Conclusion
18. Purple Teaming
Open Source Intelligence
Types of Information and Access
Physical assets Company assets Technology Documents Personal assets
OSINT Tools
Maltego recon-ng theharvester.py Websites
Red Teaming
Responder Rawr
Conclusion
19. IDS and IPS
Types of IDS and IPS
Network-Based IDS Host-Based IDS IPS
Cutting Out the Noise Writing Your Own Signatures NIDS and IPS Locations Encrypted Protocols Conclusion
20. Logging and Monitoring
What to Log Where to Log Security Information and Event Management Designing the SIEM Log Analysis Logging and Alerting Examples
Authentication Systems Application Logs Proxy and Firewall Logs
Log Aggregation Use Case Analysis Conclusion
21. The Extra Mile
Email Servers DNS Servers Security through Obscurity Useful Resources
Books Blogs Podcasts Tools Websites
A. User Education Templates
Live Phishing Education Slides
You’ve Been Hacked! What Just Happened, and Why? Social Engineering 101(0101) So It’s OK That You Were Exploited (This Time) No Blame, No Shames, Just... A Few Strategies for Next Time Because There Will Be a Next Time If Something Feels Funny If Something Looks Funny If Something Sounds Funny Feels, Looks, or Sounds Funny—Call the IS Helpdesk What If I Already Clicked the Link, or Opened the Attachment? What If I Didn’t Click the Link or Attachment? Your IT Team Is Here for You!
Phishing Program Rules
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion