Amazon Price: $13.94 (as of November 18, 2019 17:06 –
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.
Continue reading “Cuckoo Malware Analysis”
Amazon Price: $3.99 (as of November 18, 2019 16:36 –
Black Hat Python: 2 Manuscripts—Hacking With Python and Wireless Hacking
Download this 2 book bundle TODAY and Get 2 books for the price of ONE!
Get a preemptive jump on your competition with this outstanding Bundle.
Continue reading “Black Hat Python: 2 Manuscripts—Hacking With Python and Wireless Hacking”
Amazon Price: $49.99 $39.56 You save: $10.43 (21%) (as of November 19, 2019 08:01 –
Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.
Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.Learn incident response fundamentals—and the importance of getting back to basicsUnderstand threats you face and what you should be protectingCollect, mine, organize, and analyze as many relevant data sources as possibleBuild your own playbook of repeatable methods for security monitoring and responseLearn how to put your plan into action and keep it running smoothlySelect the right monitoring and detection tools for your environmentDevelop queries to help you sort through data and create valuable reportsKnow what actions to take during the incident response phase
Amazon Price: $31.00 (as of November 18, 2019 15:58 –
Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
Amazon Price: N/A (as of December 17, 2018 01:21 –
I. Security Principles — 4 (Lecture 1)
Introduction — 5
Ia. Continuous Attacks on Networks — 20
Ib. Rootkits — 32
Ic. Seven Myths about the Resilience of
the Commercial Power Grid — 55
1d. Cryptography and Computer Networks — 59
Ie. Anatomy of a Cyber attack — 98
If. System Security — 107
Ig. Top Security Breaches — 141
Ih. Mobile data leakage
and Employee risky behavior — 161
II. Network Security — 187 (Lecture 2)
IIa. Prevention of Intrusion and Information Security — 188
IIb. Network Security — 233
IIc. Cloud Computing and Virtualization — 267
IId. OS and Computer Architecture — 277
IIe. Deploying VMware High Availability and Fault
Tolerance cluster on EonNAS (NFS) — 281
IIf. Client-side Vulnerability Assessment — 298
IIg. Security Issues NoSQL databases — 312
IIh. Preventing Cross-site scripting — 328
IIi. Buffer Overflow — 342
IIj. Fuzzing Strategy and Tools — 385
IIk. Securing the Internet of Things — 402
IIl. BYOD Security — 409
Continue reading “Cyber Security 101”