Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Page About This eBook Title Page Copyright Page Credits Contents at a Glance Table of Contents About the Author Dedication Acknowledgments About the Technical Reviewer We Want to Hear from You! Reader Services Introduction
How to Prepare for the Exam Taking a Certification Exam About This Book Pearson Test Prep Practice Test Software Contacting the Author
Part I: Attacks, Threats, and Vulnerabilities
Chapter 1: Social Engineering Techniques
The Social Engineer Phishing and Related Attacks Principles of Influence (Reasons for Effectiveness) What Next?
Chapter 2: Attack Basics
Malware Physical Attacks Adversarial Artificial Intelligence (AI) Password Attacks Downgrade Attacks What Next?
Chapter 3: Application Attacks
Race Conditions Improper Software Handling Resource Exhaustion Overflows Code Injections Driver Manipulation Request Forgeries Directory Traversal Replay Attack Secure Sockets Layer (SSL) Stripping Application Programming Interface (API) Attacks Pass-the-Hash Attack What Next?
Chapter 4: Network Attacks
Wireless On-Path Attack Layer 2 Attacks Domain Name System (DNS) Attacks Denial of Service Malicious Code and Script Execution What Next?
Chapter 5: Threat Actors, Vectors, and Intelligence Sources
Threat Actor Attributes Threat Actor Types Vectors Threat Intelligence and Research Sources What Next?
Chapter 6: Vulnerabilities
Cloud-Based vs. On-Premises Zero-Day Weak Configurations Third-Party Risks Impacts What Next?
Chapter 7: Security Assessment Techniques
Vulnerability Scans Threat Assessment What Next?
Chapter 8: Penetration Testing Techniques
Testing Methodology Team Exercises What Next?
Part II: Architecture and Design
Chapter 9: Enterprise Security Concepts
Configuration Management Data Confidentiality Deception and Disruption What Next?
Chapter 10: Virtualization and Cloud Computing
Virtualization On-Premises vs. Off-Premises Cloud Models What Next?
Chapter 11: Secure Application Development, Deployment, and Automation
Application Environment Integrity Measurement Change Management and Version Control Secure Coding Techniques Automation and Scripting Scalability and Elasticity What Next?
Chapter 12: Authentication and Authorization Design
Identification and Authentication, Authorization, and Accounting (AAA) Multifactor Authentication Single Sign-on Authentication Technologies What Next?
Chapter 13: Cybersecurity Resilience
Redundancy Backups Defense in Depth What Next?
Chapter 14: Embedded and Specialized Systems
Embedded Systems SCADA and ICS Smart Devices and IoT What Next?
Chapter 15: Physical Security Controls
Perimeter Security Internal Security Equipment Security Environmental Controls Secure Data Destruction What Next?
Chapter 16: Cryptographic Concepts
Cryptosystems Use of Proven Technologies and Implementation Steganography Cryptography Use Cases Cryptography Constraints What Next?
Part III: Implementation
Chapter 17: Secure Protocols
Secure Web Protocols Secure File Transfer Protocols Secure Email Protocols Secure Internet Protocols Secure Protocol Use Cases What Next?
Chapter 18: Host and Application Security Solutions
Endpoint Protection Application Security Hardware and Firmware Security Operating System Security What Next?
Chapter 19: Secure Network Design
Network Devices and Segmentation Security Devices and Boundaries What Next?
Chapter 20: Wireless Security Settings
Access Methods Wireless Cryptographic Protocols Authentication Protocols Wireless Access Installations What Next?
Chapter 21: Secure Mobile Solutions
Communication Methods Mobile Device Management Concepts Enforcement and Monitoring Deployment Models What Next?
Chapter 22: Cloud Cybersecurity Solutions
Cloud Workloads Third-Party Cloud Security Solutions What Next?
Chapter 23: Identity and Account Management Controls
Account Types Account Management Account Policy Enforcement What Next?
Chapter 24: Authentication and Authorization Solutions
Authentication Access Control What Next?
Chapter 25: Public Key Infrastructure
PKI Components What Next?
Part IV: Operations and Incident Response
Chapter 26: Organizational Security
Shell and Script Environments Network Reconnaissance and Discovery Packet Capture and Replay Password Crackers Forensics and Data Sanitization What Next?
Chapter 27: Incident Response
Attack Frameworks Incident Response Plan Incident Response Process Continuity and Recovery Plans What Next?
Chapter 28: Incident Investigation
SIEM Dashboards Logging Network Activity What Next?
Chapter 29: Incident Mitigation
Containment and Eradication What Next?
Chapter 30: Digital Forensics
Data Breach Notifications Strategic Intelligence/Counterintelligence Gathering Track Person-hours Order of Volatility Chain of Custody Data Acquisition What Next?
Part V: Governance, Risk, and Compliance
Chapter 31: Control Types
Nature of Controls Functional Use of Controls Compensating Controls What Next?
Chapter 32: Regulations, Standards, and Frameworks
Industry-Standard Frameworks and Reference Architectures Benchmarks and Secure Configuration Guides What Next?
Chapter 33: Organizational Security Policies
Policy Framework Human Resource Management Policies Third-Party Risk Management What Next?
Chapter 34: Risk Management
Risk Analysis Risk Assessment Business Impact Analysis What Next?
Chapter 35: Sensitive Data and Privacy
Sensitive Data Protection Privacy Impact Assessment What Next?
Glossary of Essential Terms and Components Index Where are the companion content files? - Register Inside Front Cover Inside Back Cover Code Snippets
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion