Muutke küpsiste eelistusi

E-raamat: Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments

  • Formaat: 320 pages
  • Ilmumisaeg: 28-Feb-2020
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781260458329
  • Formaat - EPUB+DRM
  • Hind: 46,80 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 320 pages
  • Ilmumisaeg: 28-Feb-2020
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781260458329

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.



Manage your own robust, inexpensive cybersecurity testing environment   This hands-on guide shows clearly how to administer an effective cybersecurity testing lab using affordable technologies and cloud resources. Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments fully explains multiple techniques for developing lab systems, including the use of Infrastructure-as-Code, meaning you can write programs to create your labs quickly, without manual steps that could lead to costly and frustrating mistakes. Written by a seasoned IT security professional and academic, this book offers complete coverage of cloud and virtual environments as well as physical networks and automation. Included with the book is access to videos that demystify difficult concepts.   Inside, you will discover how to:



 Gather network requirements and build your cybersecurity testing lab  Set up virtual machines and physical systems from inexpensive components  Select and configure the necessary operating systems  Gain remote access through SSH, RDP, and other remote access protocols  Efficiently isolate subnets with physical switches, routers, and VLANs  Analyze the vulnerabilities and challenges of cloud-based infrastructures  Handle implementation of systems on Amazon Web Services, Microsoft Azure, and Google Cloud Engine  Maximize consistency and repeatability using the latest automation tools







 
Introduction ix
Chapter 1 Why Perform Security Testing?
1(20)
Compliance
2(2)
Security Testing
4(12)
Software Security Testing
6(4)
Stress Testing
10(2)
Penetration Testing
12(2)
Red Teaming
14(1)
Blue Team/Operations Testing
15(1)
Goals
16(1)
Isolation
17(1)
You vs. the Enterprise
18(1)
Summary
19(2)
Chapter 2 Network Design
21(28)
Networking Basics
22(17)
Network Access Layer
22(3)
Switching
25(2)
Internetworking Layer
27(12)
Network Topologies
39(2)
Design Requirements
41(1)
The Importance of Isolation
42(5)
Air Gaps
43(1)
Routing
43(1)
Firewalls
44(3)
Summary
47(2)
Chapter 3 Physical and Virtual Machines
49(28)
Physical Systems
50(18)
Specifications
50(7)
Go New!
57(7)
Reduce, Reuse, Recycle
64(1)
Low-Cost Devices
64(2)
Racking and Stacking
66(2)
Virtualization
68(7)
Type 1 Hypervisors
69(2)
Type 2 Hypervisors
71(2)
Containers
73(2)
Summary
75(2)
Chapter 4 Operating Systems
77(30)
Operating Systems to Test From
78(22)
Windows
78(12)
Linux
90(8)
Single-Board Computer (SBC) Operating Systems
98(2)
Systems Under Test
100(3)
Metasploitable 2
100(1)
Metasploitable 3
100(1)
Web Applications
101(2)
Command Line Considerations
103(3)
Summary
106(1)
Chapter 5 Remote Access
107(24)
Virtual Private Networks
108(10)
Windows VPN
111(4)
Linux VPN
115(3)
Shell Access
118(2)
Graphical Interfaces
120(6)
Remote Management (No Interface)
126(1)
Virtual Machine Access
127(2)
Summary
129(2)
Chapter 6 Networking
131(24)
Switching
132(8)
Virtual Local Area Networks (VLANs)
135(4)
Private VLANs
139(1)
Routing
140(8)
Static Routing
141(3)
Dynamic Routing
144(4)
Virtual Machine Networking
148(5)
Software Defined Networking
153(1)
Summary
153(2)
Chapter 7 Cloud Computing and Private Clouds
155(34)
Cloud Services
156(8)
Infrastructure as a Service
157(2)
Platform as a Service
159(1)
Storage as a Service
160(1)
Software as a Service
161(3)
Elements of Cloud
164(3)
OpenStack
167(19)
Using DevStack
169(3)
Admin
172(2)
Instantiation
174(4)
Networking
178(4)
Security Groups
182(3)
Finding Images
185(1)
Summary
186(3)
Chapter 8 Amazon Web Services
189(30)
Traditional Architecture
191(17)
Data Storage
192(4)
Application Server
196(6)
Web Server
202(2)
Load Balancer
204(4)
The Cloud Way
208(8)
Microservices
209(3)
Message Queuing Services
212(1)
Database
212(4)
Summary
216(3)
Chapter 9 Microsoft Azure
219(30)
Traditional Web Design
220(21)
Load Balancers
221(5)
Web Servers
226(8)
Application Server
234(5)
Database
239(2)
Cloud Native
241(7)
Serverless
242(2)
Containers
244(2)
Databases
246(2)
Summary
248(1)
Chapter 10 Google Cloud Engine
249(30)
Traditional Architecture
250(21)
Database
251(7)
Application Server
258(3)
Web Server
261(8)
Load Balancer
269(2)
Cloud-Native
271(6)
Containers
272(4)
Databases
276(1)
Summary
277(2)
Chapter 11 Automation
279(18)
DevOps and DevSecOps
280(4)
Command Line Access
284(7)
Infrastructure as Code
291(3)
Summary
294(3)
Index 297
Ric Messier, CEH, CISSP, is an IT security professional with decades of experience working with service provider and enterprise networks. Ric has been a contributor to Hakin9 and PenTest Magazines and has spoken at Interop, New York. Ric currently teaches networking and security courses to graduate students at Brandeis University and to undergraduates at Champlain College. He has also developed two video training titles on ethical hacking and computer forensics.