Amazon Price: N/A (as of September 24, 2017 00:56 –
Key FeaturesGain the skills to carry out penetration testing in complex and highly-secured environmentsBecome a master using the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenariosGet this completely updated edition with new useful methods and techniques to make your network robust and resilient
Continue reading “Mastering Metasploit – Second Edition”
Amazon Price: N/A (as of September 23, 2017 09:47 –
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry – basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field.
This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.
Continue reading “Introduction to US Cybersecurity Careers”
Amazon Price: N/A (as of September 23, 2017 15:36 –
The Cyber-Security Glossary of Building Hacks and Cyber-Attacks was developed specifically to help facility and infrastructure engineers and building managers understand vulnerability of SCADA systems and building and industrial control systems to cyber-attack. The book includes definitions of technical terms related to automated equipment controls common to industry, utilities and buildings. Although written for facility engineers, much of the terminology applies to cyber-attacks in general. I define many types of cyber-attacks including:
Time Bomb attack
Fork Bomb attack
Logic Bomb attack
Pass the Hash attack
Tiny Fragment attack
Protocol Fuzzing attack
Man in the Middle attack
and many more.
I also include steps to take to prevent a cyber-attack.
Amazon Price: $14.99 $13.49 You save: $1.50 (10%). (as of September 23, 2017 11:00 –
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.
Amazon Price: N/A (as of September 23, 2017 06:04 –
Co-editors Timothy Sample and Michael Swetnam, along with a dozen thought leaders in the realm of cyber security, have assembled “#CyberDoc: No Borders – No Boundaries” as a preliminary framework for the development of a national doctrine for the cyber era.
Cyber technologies are an increasingly essential part of daily life for people around the world, and have fundamentally altered our lives in countless ways. The Internet is now as essential as any other “utility,” and is so seamlessly woven into the fabric of life that we rarely even think about it. At the same time, the vulnerabilities inherent in our reliance on the Internet are rarely discussed publicly in terms of our national security. Those responsible for protecting the capabilities upon which we all rely, as well as the security of the United States, have struggled to articulate and agree upon a doctrine to address these complex issues.
Continue reading “#CyberDoc: No Borders – No Boundaries: National Doctrine for the Cyber Era”