The Practice of Network Security Monitoring Logo

The Practice of Network Security Monitoring

0
Free
Visit Website

This book teaches readers how to use network security monitoring (NSM) to add a robust layer of protection around their networks. It covers deploying, building, and running an NSM operation using open source software and vendor-neutral tools, and shows how to interpret network evidence from server-side and client-side intrusions. Readers will learn how to determine where to deploy NSM platforms, deploy stand-alone or distributed NSM installations, use command line and graphical packet analysis tools, and integrate threat intelligence into NSM software to identify sophisticated adversaries. The book provides a comprehensive guide to building a security net to detect, contain, and control attacks, and is suitable for readers with no prior experience.

FEATURES

ALTERNATIVES

A network of physical and online cyber warfare ranges for training and testing

IT certification training for CompTIA exams with free resources.

A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.

Free online class for web security and hacking

A comprehensive cybersecurity resource for learning and education

A comprehensive guide for hardening GNU/Linux systems with practical step-by-step instructions.

A repository aiming to archive all Android security presentations and whitepapers from conferences.

A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.