Cargando…

Defensive cybersecurity fundamentals /

Everyone talks about the intrusion kill chain (sometimes called the “cyber kill chain”)—a model for actionable intelligence in which defenders align enterprise defensive capabilities to the specific processes an adversary might undertake to target that enterprise. However, much of what’s discussed p...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Berlin, Amanda (Autor)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Sebastopol, California] : O'Reilly Media, Inc., [2022]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1322446638
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 220602s2022 cau153 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCO 
024 8 |a 0636920670896 
029 1 |a AU@  |b 000072055670 
035 |a (OCoLC)1322446638 
037 |a 0636920670896  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20220602 
049 |a UAMI 
245 0 0 |a Defensive cybersecurity fundamentals /  |c Amanda Berlin. 
250 |a [First edition]. 
264 1 |a [Sebastopol, California] :  |b O'Reilly Media, Inc.,  |c [2022] 
300 |a 1 online resource (1 video file (2 hr., 33 min.)) :  |b sound, color. 
306 |a 023300 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Amanda Berlin, presenter. 
520 |a Everyone talks about the intrusion kill chain (sometimes called the “cyber kill chain”)—a model for actionable intelligence in which defenders align enterprise defensive capabilities to the specific processes an adversary might undertake to target that enterprise. However, much of what’s discussed publicly is misinformation and scare tactics. Join expert Amanda Berlin to learn the most effective steps you can take to protect your organization from the vast majority of threats with defensive mitigation and monitoring. Through use cases such as ransomware, data exfiltration, and lateral movement, you’ll see how to improve the standard of defense at each level, then discover step-by-step what you can accurately cover using the kill chain by working through use cases that outline the specifics of attacks. You'll also gain hands-on experience through tabletop exercises and drills to strengthen your understanding. Much of what’s covered will be hands-on walk-throughs in a Microsoft Windows environment. Windows domains are the most popular target for attackers as they’re frequently the most insecurely configured. 
588 0 |a Online resource; title from title details screen (O’Reilly, viewed June 2, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Intrusion detection systems (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Systèmes de détection d'intrusion (Sécurité informatique) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
650 7 |a Intrusion detection systems (Computer security)  |2 fast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Berlin, Amanda,  |e author. 
710 2 |a O'Reilly (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/0636920670896/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP