Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Cybersecurity – Attack and Defense Strategies, 3rd edition
Cybersecurity – Attack and Defense Strategies, 3rd edition

Cybersecurity – Attack and Defense Strategies, 3rd edition: Improve your security posture to mitigate risks and prevent attackers from infiltrating your system , Third Edition

Arrow left icon
Profile Icon Yuri Diogenes Profile Icon Dr. Erdal Ozkaya
Arrow right icon
€22.99 €25.99
Full star icon Full star icon Full star icon Full star icon Half star icon 4.9 (42 Ratings)
eBook Sep 2022 570 pages 3rd Edition
eBook
€22.99 €25.99
Paperback
€31.99
Subscription
Free Trial
Renews at €18.99p/m
Arrow left icon
Profile Icon Yuri Diogenes Profile Icon Dr. Erdal Ozkaya
Arrow right icon
€22.99 €25.99
Full star icon Full star icon Full star icon Full star icon Half star icon 4.9 (42 Ratings)
eBook Sep 2022 570 pages 3rd Edition
eBook
€22.99 €25.99
Paperback
€31.99
Subscription
Free Trial
Renews at €18.99p/m
eBook
€22.99 €25.99
Paperback
€31.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Cybersecurity – Attack and Defense Strategies, 3rd edition

Left arrow icon Right arrow icon

Key benefits

  • Updated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and more
  • Explore the latest tools for ethical hacking, pentesting, and Red/Blue teaming
  • Includes recent real-world examples to illustrate the best practices to improve security posture

Description

Cybersecurity – Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques. By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.

Who is this book for?

If you are an IT security professional who wants to venture deeper into cybersecurity domains, this book is for you. Cloud security administrators, IT pentesters, security consultants, and ethical hackers will also find this book useful. Basic understanding of operating systems, computer networking, and web applications will be helpful.

What you will learn

  • Learn to mitigate, recover from, and prevent future cybersecurity events
  • Understand security hygiene and value of prioritizing protection of your workloads
  • Explore physical and virtual network segmentation, cloud network visibility, and Zero Trust considerations
  • Adopt new methods to gather cyber intelligence, identify risk, and demonstrate impact with Red/Blue Team strategies
  • Explore legendary tools such as Nmap and Metasploit to supercharge your Red Team
  • Discover identity security and how to perform policy enforcement
  • Integrate threat detection systems into your SIEM solutions
  • Discover the MITRE ATT&CK Framework and open-source tools to gather intelligence

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Sep 30, 2022
Length: 570 pages
Edition : 3rd
Language : English
ISBN-13 : 9781803243955
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Sep 30, 2022
Length: 570 pages
Edition : 3rd
Language : English
ISBN-13 : 9781803243955
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 115.97
Cybersecurity – Attack and Defense Strategies, 3rd edition
€31.99
The Ultimate Kali Linux Book
€41.99
Mastering Windows Security and Hardening
€41.99
Total 115.97 Stars icon

Table of Contents

19 Chapters
Security Posture Chevron down icon Chevron up icon
Incident Response Process Chevron down icon Chevron up icon
What is a Cyber Strategy? Chevron down icon Chevron up icon
Understanding the Cybersecurity Kill Chain Chevron down icon Chevron up icon
Reconnaissance Chevron down icon Chevron up icon
Compromising the System Chevron down icon Chevron up icon
Chasing a User’s Identity Chevron down icon Chevron up icon
Lateral Movement Chevron down icon Chevron up icon
Privilege Escalation Chevron down icon Chevron up icon
Security Policy Chevron down icon Chevron up icon
Network Security Chevron down icon Chevron up icon
Active Sensors Chevron down icon Chevron up icon
Threat Intelligence Chevron down icon Chevron up icon
Investigating an Incident Chevron down icon Chevron up icon
Recovery Process Chevron down icon Chevron up icon
Vulnerability Management Chevron down icon Chevron up icon
Log Analysis Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.9
(42 Ratings)
5 star 90.5%
4 star 9.5%
3 star 0%
2 star 0%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




N/A Feb 21, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Feefo Verified review Feefo
Marek Zima Feb 13, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Feefo Verified review Feefo
SRP Oct 03, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Short review about Cybersecurity – Attack and Defense Strategies (3rd Ed) by Yuri Diogenes and Dr Erdal Ozkaya. It has been a few years since I read the first edition of this book, and from what I recall, the first book was a convenient reference on the topic of cybersecurity strategy. Although unfortunately, I did not get to read the book end-to-end, it was valuable at the time in my research on the creation of incident response playbooks.I am pleased to say the third edition has not disappointed me with the depth and quality of the information. Included here is my feedback on some of the select chapters. Chapter 1. Security Posture - An excellent initial readout on the cybersecurity world's current and evolving threat landscape. I liked that it was not presented as a "doom and gloom" readout but as a realistic scenario that cybersecurity practitioners should be aware of and, more importantly, how to be prepared for it. It was also great to see the authors include concepts of Zero Trust concepts in this book. Zero Trust is a simple concept; however, the messaging can easily confuse someone new to this. Hence it is good to see that the authors present the topic in an easy-to-understand fashion especially tying this back to the NIST special publication and the principles captured within that.Chapter 2. Incident Response Process. Since I was familiar with this chapter in the first edition, I was curious to find out what had changed. In my opinion, the core concepts have remained the same. However, it was good to see the inclusion of additional real-world scenarios, which is something the readers will benefit from.Chapter 4. Understanding the Cybersecurity Kill Chain. No serious publication on cybersecurity attacks and a defence strategy will be complete without the cybersecurity kill chain model, and this book provides comprehensive coverage on this topic. Chapter 4 provides the foundations for the kill chain, and the latter chapters go deeper into distinct steps. I also liked that additional focus has been provided on the new and emerging attack vectors, such as IoT security.The remainder of the book focuses on helping organisations build effective security policies and the surrounding threat intelligence platforms. The final chapters are focused more on incident response, vulnerability management and real-world log analysis using on-prem and cloud-based systems.In summary, I really enjoyed this book, and I am also a bit embarrassed to say that it had taken me almost 5 years to read the book end-to-end (all be it was the 3rd edition that I was most interested in reviewing). This book will appeal to a broad audience of IT security practitioners, starting with the Cx team responsible for the overall cybersecurity strategy, to security architects involved in designing and deploying security solutions and equally appealing to the cybersecurity operations team responsible for incident response planning.
Amazon Verified review Amazon
Lester Chng Oct 19, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
A ton of knowledge on cybersecurity and the book includes many examples and case studies to illustrate and bring to life the various aspects of cyber.Highly recommended for anyone wanting to learn more about this fascinating space.
Amazon Verified review Amazon
erich Dec 15, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I've found this book to be super helpful for me: an IT professional looking to transition into the Cybersecurity space. It provides a wealth of InfoSec material that any IT professional could benefit from. I strongly recommend it!
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.