Cargando…

GCIH GIAC Certified Incident Handler All-in-One Exam Guide.

This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler exam Prepare for the challenging GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation guide. Written by a recognized cybersecurity expert...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mitropoulos, Nick
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : McGraw-Hill Professional : McGraw Hill, 2020.
Colección:All-in-one certification series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000003i 4500
001 OR_on1334673035
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220707s2020 xx o 000 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d AU@  |d UKAHL  |d YDX  |d UAB  |d EBLCP  |d OCLCF  |d CNWPU  |d OCLCQ  |d TOH  |d OCLCQ  |d OCL  |d OCLCO 
019 |a 1192526771  |a 1224162670 
020 |a 9781260461633  |q (electronic bk.) 
020 |a 1260461637  |q (electronic bk.) 
020 |z 9781260461626 
024 8 |a 1260461637 
024 8 |a 9781260461633 
029 1 |a AU@  |b 000067830210 
035 |a (OCoLC)1334673035  |z (OCoLC)1192526771  |z (OCoLC)1224162670 
050 4 |a QA76.3 
082 0 4 |a 005.8/076  |2 23 
049 |a UAMI 
100 1 |a Mitropoulos, Nick. 
245 1 0 |a GCIH GIAC Certified Incident Handler All-in-One Exam Guide. 
264 1 |a [Place of publication not identified] :  |b McGraw-Hill Professional :  |b McGraw Hill,  |c 2020. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a All-in-one 
588 0 |a Vendor-supplied metadata. 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Building a Lab -- Creating a Kali Linux Virtual Machine -- Creating a Metasploitable Virtual Machine -- Testing External Connectivity from Kali Linux -- Testing External Connectivity from Metasploitable -- Testing Communication Between Kali Linux and Metasploitable -- Creating a Windows Virtual Machine -- Testing Communication Between Windows, Kali Linux, and Metasploitable VMs -- Linux and Windows Commands -- Chapter Review -- Questions -- Answers -- References and Further Reading 
505 8 |a Chapter 2 Intrusion Analysis and Incident Handling -- Incident Handling Introduction -- Incident Handling Phases -- Preparation -- Building a Team -- Collecting Organizational Information -- Responding to an Incident -- Hardware -- Software -- Identification -- Incident Sources -- Data Collection for Incident Response -- Windows Investigations -- Linux Investigations -- Containment -- Tracking and Communicating an Incident -- Containment Strategies -- Eradication -- Recovery -- Lessons Learned -- Chapter Review -- Questions -- Answers -- References and Further Reading 
505 8 |a Chapter 3 Information Gathering -- Public Website Searching -- Netcraft -- the Harvester -- Wget -- Social Media Searching -- Defending Against Public Website and Social Media Searching -- Using Search Engines for Information Gathering -- Search Engine Query Examples -- Viewing Deleted Content Through the Wayback Machine -- Using Tools for Search Engine Information Gathering Automation -- Recon-NG -- Metagoofil -- Exiftool -- FOCA (Fingerprinting Organizations with Collected Archives) -- SearchDiggity -- Defending Against Search Engine Information Gathering -- Whois Lookups 
505 8 |a Performing Whois Lookups Using IANA and Regional Registries -- Performing Whois Lookups Using Online Tools -- Performing Whois Lookups Using the Command Line -- Defending Against Whois Lookups -- DNS Lookups -- Performing DNS Lookups Using Online Tools -- Nslookup -- Dig -- Host -- DNSRecon -- Defending Against DNS Lookups -- War Dialing -- Defending Against War Dialing -- War Driving -- Wireless Network Introduction -- Airmon-ng -- Kismet -- InSSIDer -- Other Tools Worth Checking -- Defending Against War Driving -- General-Purpose Information Gathering Tools -- Maltego -- Shodan -- Maps 
505 8 |a Spokeo -- Grayhat Warfare -- Chapter Review -- Questions -- Answers -- References and Further Reading -- Chapter 4 Scanning, Enumeration, and Vulnerability Identification -- Introduction to ARP, ICMP, IP, TCP, and UDP -- ARP -- ICMP -- IP -- TCP -- UDP -- Network Mapping -- Arp-scan -- Ping -- Traceroute -- Zenmap -- Defending Against Network Mapping -- Port Scanning -- Nmap -- Hping3 -- Additional Scanning Tools -- Proxy Utilization -- IDS/IPS Evasion -- Defending Against Port Scanning and IDS Evasion -- Vulnerability Identification -- Nessus -- Defending Against Vulnerability Identification 
520 |a This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler exam Prepare for the challenging GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation guide. Written by a recognized cybersecurity expert and seasoned author, GCIH GIAC Certified Incident Handler All-in-One Exam Guide clearly explains all of the advanced security incident handling skills covered on the test. Detailed examples and chapter summaries throughout demonstrate real-world threats and aid in retention. You will get online access to 300 practice questions that match those on the live test in style, format, and tone. Designed to help you prepare for the exam, this resource also serves as an ideal on-the-job reference. Covers all exam topics, including: Intrusion analysis and incident handling Information gathering Scanning, enumeration, and vulnerability identification Vulnerability exploitation Infrastructure and endpoint attacks Network, DoS, and Web application attacks Maintaining access Evading detection and covering tracks Worms, bots, and botnets Online content includes: 300 practice exam questions Test engine that provides full-length practice exams and customizable quizzes. 
542 |f Copyright © McGraw-Hill 2020  |g 2020 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Electronic data processing personnel  |x Certification  |v Study guides. 
650 6 |a Sécurité informatique  |x Examens  |v Guides de l'étudiant. 
650 7 |a COMPUTERS  |x Certification Guides  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Network Security.  |2 bisacsh 
650 7 |a Computer security  |x Examinations  |2 fast 
650 7 |a Electronic data processing personnel  |x Certification  |2 fast 
655 7 |a examination study guides.  |2 aat 
655 7 |a Examinations  |2 fast 
655 7 |a Study guides  |2 fast 
655 7 |a Examinations.  |2 lcgft 
655 7 |a Study guides.  |2 lcgft 
655 7 |a Guides de l'étudiant.  |2 rvmgf 
830 0 |a All-in-one certification series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781260461633/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37767511 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6404274 
938 |a EBSCOhost  |b EBSC  |n 2686892 
938 |a YBP Library Services  |b YANK  |n 17129312 
994 |a 92  |b IZTAP