Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover Page
About This eBook
Title Page
Copyright Page
Credits
Contents at a Glance
Table of Contents
About the Author
Dedication
Acknowledgments
About the Technical Reviewer
We Want to Hear from You!
Reader Services
Introduction
How to Prepare for the Exam
Taking a Certification Exam
About This Book
Pearson Test Prep Practice Test Software
Contacting the Author
Part I: Attacks, Threats, and Vulnerabilities
Chapter 1: Social Engineering Techniques
The Social Engineer
Phishing and Related Attacks
Principles of Influence (Reasons for Effectiveness)
What Next?
Chapter 2: Attack Basics
Malware
Physical Attacks
Adversarial Artificial Intelligence (AI)
Password Attacks
Downgrade Attacks
What Next?
Chapter 3: Application Attacks
Race Conditions
Improper Software Handling
Resource Exhaustion
Overflows
Code Injections
Driver Manipulation
Request Forgeries
Directory Traversal
Replay Attack
Secure Sockets Layer (SSL) Stripping
Application Programming Interface (API) Attacks
Pass-the-Hash Attack
What Next?
Chapter 4: Network Attacks
Wireless
On-Path Attack
Layer 2 Attacks
Domain Name System (DNS) Attacks
Denial of Service
Malicious Code and Script Execution
What Next?
Chapter 5: Threat Actors, Vectors, and Intelligence Sources
Threat Actor Attributes
Threat Actor Types
Vectors
Threat Intelligence and Research Sources
What Next?
Chapter 6: Vulnerabilities
Cloud-Based vs. On-Premises
Zero-Day
Weak Configurations
Third-Party Risks
Impacts
What Next?
Chapter 7: Security Assessment Techniques
Vulnerability Scans
Threat Assessment
What Next?
Chapter 8: Penetration Testing Techniques
Testing Methodology
Team Exercises
What Next?
Part II: Architecture and Design
Chapter 9: Enterprise Security Concepts
Configuration Management
Data Confidentiality
Deception and Disruption
What Next?
Chapter 10: Virtualization and Cloud Computing
Virtualization
On-Premises vs. Off-Premises
Cloud Models
What Next?
Chapter 11: Secure Application Development, Deployment, and Automation
Application Environment
Integrity Measurement
Change Management and Version Control
Secure Coding Techniques
Automation and Scripting
Scalability and Elasticity
What Next?
Chapter 12: Authentication and Authorization Design
Identification and Authentication, Authorization, and Accounting (AAA)
Multifactor Authentication
Single Sign-on
Authentication Technologies
What Next?
Chapter 13: Cybersecurity Resilience
Redundancy
Backups
Defense in Depth
What Next?
Chapter 14: Embedded and Specialized Systems
Embedded Systems
SCADA and ICS
Smart Devices and IoT
What Next?
Chapter 15: Physical Security Controls
Perimeter Security
Internal Security
Equipment Security
Environmental Controls
Secure Data Destruction
What Next?
Chapter 16: Cryptographic Concepts
Cryptosystems
Use of Proven Technologies and Implementation
Steganography
Cryptography Use Cases
Cryptography Constraints
What Next?
Part III: Implementation
Chapter 17: Secure Protocols
Secure Web Protocols
Secure File Transfer Protocols
Secure Email Protocols
Secure Internet Protocols
Secure Protocol Use Cases
What Next?
Chapter 18: Host and Application Security Solutions
Endpoint Protection
Application Security
Hardware and Firmware Security
Operating System Security
What Next?
Chapter 19: Secure Network Design
Network Devices and Segmentation
Security Devices and Boundaries
What Next?
Chapter 20: Wireless Security Settings
Access Methods
Wireless Cryptographic Protocols
Authentication Protocols
Wireless Access Installations
What Next?
Chapter 21: Secure Mobile Solutions
Communication Methods
Mobile Device Management Concepts
Enforcement and Monitoring
Deployment Models
What Next?
Chapter 22: Cloud Cybersecurity Solutions
Cloud Workloads
Third-Party Cloud Security Solutions
What Next?
Chapter 23: Identity and Account Management Controls
Account Types
Account Management
Account Policy Enforcement
What Next?
Chapter 24: Authentication and Authorization Solutions
Authentication
Access Control
What Next?
Chapter 25: Public Key Infrastructure
PKI Components
What Next?
Part IV: Operations and Incident Response
Chapter 26: Organizational Security
Shell and Script Environments
Network Reconnaissance and Discovery
Packet Capture and Replay
Password Crackers
Forensics and Data Sanitization
What Next?
Chapter 27: Incident Response
Attack Frameworks
Incident Response Plan
Incident Response Process
Continuity and Recovery Plans
What Next?
Chapter 28: Incident Investigation
SIEM Dashboards
Logging
Network Activity
What Next?
Chapter 29: Incident Mitigation
Containment and Eradication
What Next?
Chapter 30: Digital Forensics
Data Breach Notifications
Strategic Intelligence/Counterintelligence Gathering
Track Person-hours
Order of Volatility
Chain of Custody
Data Acquisition
What Next?
Part V: Governance, Risk, and Compliance
Chapter 31: Control Types
Nature of Controls
Functional Use of Controls
Compensating Controls
What Next?
Chapter 32: Regulations, Standards, and Frameworks
Industry-Standard Frameworks and Reference Architectures
Benchmarks and Secure Configuration Guides
What Next?
Chapter 33: Organizational Security Policies
Policy Framework
Human Resource Management Policies
Third-Party Risk Management
What Next?
Chapter 34: Risk Management
Risk Analysis
Risk Assessment
Business Impact Analysis
What Next?
Chapter 35: Sensitive Data and Privacy
Sensitive Data Protection
Privacy Impact Assessment
What Next?
Glossary of Essential Terms and Components
Index
Where are the companion content files? - Register
Inside Front Cover
Inside Back Cover
Code Snippets
← Prev
Back
Next →
← Prev
Back
Next →