Incident Response for Windows
portes grátis
Incident Response for Windows
Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems
Volkov, Dmitry; Ostrovskaya, Svetlana; Tykushin, Anatoly
Packt Publishing Limited
08/2024
244
Mole
9781804619322
15 a 20 dias
Descrição não disponível.
Table of Contents
Introduction to the Threat Landscape
Understanding the Attack Life Cycle
Phases of an Efficient Incident Response on Windows Infrastructure
Endpoint Forensic Evidence Collection
Gaining Access to the Network
Establishing a Foothold
Network and Key Assets Discovery
Network Propagation
Data Collection and Exfiltration
Impact
Threat Hunting and Analysis of TTPs
Incident Containment, Eradication, and Recovery
Incident Investigation Closure and Reporting
Introduction to the Threat Landscape
Understanding the Attack Life Cycle
Phases of an Efficient Incident Response on Windows Infrastructure
Endpoint Forensic Evidence Collection
Gaining Access to the Network
Establishing a Foothold
Network and Key Assets Discovery
Network Propagation
Data Collection and Exfiltration
Impact
Threat Hunting and Analysis of TTPs
Incident Containment, Eradication, and Recovery
Incident Investigation Closure and Reporting
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cyber security; security analysis; cybersecurity books; cybersecurity tools; information technology; cyber threat; cyber attack
Table of Contents
Introduction to the Threat Landscape
Understanding the Attack Life Cycle
Phases of an Efficient Incident Response on Windows Infrastructure
Endpoint Forensic Evidence Collection
Gaining Access to the Network
Establishing a Foothold
Network and Key Assets Discovery
Network Propagation
Data Collection and Exfiltration
Impact
Threat Hunting and Analysis of TTPs
Incident Containment, Eradication, and Recovery
Incident Investigation Closure and Reporting
Introduction to the Threat Landscape
Understanding the Attack Life Cycle
Phases of an Efficient Incident Response on Windows Infrastructure
Endpoint Forensic Evidence Collection
Gaining Access to the Network
Establishing a Foothold
Network and Key Assets Discovery
Network Propagation
Data Collection and Exfiltration
Impact
Threat Hunting and Analysis of TTPs
Incident Containment, Eradication, and Recovery
Incident Investigation Closure and Reporting
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.