The Practice of Network Security Monitoring Logo

The Practice of Network Security Monitoring

0
Free
Visit Website

This book teaches readers how to use network security monitoring (NSM) to add a robust layer of protection around their networks. It covers deploying, building, and running an NSM operation using open source software and vendor-neutral tools, and shows how to interpret network evidence from server-side and client-side intrusions. Readers will learn how to determine where to deploy NSM platforms, deploy stand-alone or distributed NSM installations, use command line and graphical packet analysis tools, and integrate threat intelligence into NSM software to identify sophisticated adversaries. The book provides a comprehensive guide to building a security net to detect, contain, and control attacks, and is suitable for readers with no prior experience.

FEATURES

ALTERNATIVES

Live and on-demand cybersecurity training programs for all levels.

A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.

Interactive challenges demonstrating attacks on real-world cryptography.

An article in Phrack Magazine discussing the creation of shellcode for StrongARM/Linux architecture.

A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.

Korean cyber-security challenge platform for exploiting and defending web application vulnerabilities.

Andrew Case's personal page for research, software projects, and speaking events

A wargame that challenges your hacking skills