Cybersecurity – Attack and Defense Strategies, 3rd edition: Improve your security posture to mitigate risks and prevent attackers from infiltrating your system
, Third Edition
Updated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and more
Explore the latest tools for ethical hacking, pentesting, and Red/Blue teaming
Includes recent real-world examples to illustrate the best practices to improve security posture
Description
Cybersecurity – Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture.
In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques.
By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.
Who is this book for?
If you are an IT security professional who wants to venture deeper into cybersecurity domains, this book is for you. Cloud security administrators, IT pentesters, security consultants, and ethical hackers will also find this book useful. Basic understanding of operating systems, computer networking, and web applications will be helpful.
What you will learn
Learn to mitigate, recover from, and prevent future cybersecurity events
Understand security hygiene and value of prioritizing protection of your workloads
Explore physical and virtual network segmentation, cloud network visibility, and Zero Trust considerations
Adopt new methods to gather cyber intelligence, identify risk, and demonstrate impact with Red/Blue Team strategies
Explore legendary tools such as Nmap and Metasploit to supercharge your Red Team
Discover identity security and how to perform policy enforcement
Integrate threat detection systems into your SIEM solutions
Discover the MITRE ATT&CK Framework and open-source tools to gather intelligence
Short review about Cybersecurity – Attack and Defense Strategies (3rd Ed) by Yuri Diogenes and Dr Erdal Ozkaya. It has been a few years since I read the first edition of this book, and from what I recall, the first book was a convenient reference on the topic of cybersecurity strategy. Although unfortunately, I did not get to read the book end-to-end, it was valuable at the time in my research on the creation of incident response playbooks.I am pleased to say the third edition has not disappointed me with the depth and quality of the information. Included here is my feedback on some of the select chapters. Chapter 1. Security Posture - An excellent initial readout on the cybersecurity world's current and evolving threat landscape. I liked that it was not presented as a "doom and gloom" readout but as a realistic scenario that cybersecurity practitioners should be aware of and, more importantly, how to be prepared for it. It was also great to see the authors include concepts of Zero Trust concepts in this book. Zero Trust is a simple concept; however, the messaging can easily confuse someone new to this. Hence it is good to see that the authors present the topic in an easy-to-understand fashion especially tying this back to the NIST special publication and the principles captured within that.Chapter 2. Incident Response Process. Since I was familiar with this chapter in the first edition, I was curious to find out what had changed. In my opinion, the core concepts have remained the same. However, it was good to see the inclusion of additional real-world scenarios, which is something the readers will benefit from.Chapter 4. Understanding the Cybersecurity Kill Chain. No serious publication on cybersecurity attacks and a defence strategy will be complete without the cybersecurity kill chain model, and this book provides comprehensive coverage on this topic. Chapter 4 provides the foundations for the kill chain, and the latter chapters go deeper into distinct steps. I also liked that additional focus has been provided on the new and emerging attack vectors, such as IoT security.The remainder of the book focuses on helping organisations build effective security policies and the surrounding threat intelligence platforms. The final chapters are focused more on incident response, vulnerability management and real-world log analysis using on-prem and cloud-based systems.In summary, I really enjoyed this book, and I am also a bit embarrassed to say that it had taken me almost 5 years to read the book end-to-end (all be it was the 3rd edition that I was most interested in reviewing). This book will appeal to a broad audience of IT security practitioners, starting with the Cx team responsible for the overall cybersecurity strategy, to security architects involved in designing and deploying security solutions and equally appealing to the cybersecurity operations team responsible for incident response planning.
Amazon Verified review
Lester ChngOct 19, 2022
5
A ton of knowledge on cybersecurity and the book includes many examples and case studies to illustrate and bring to life the various aspects of cyber.Highly recommended for anyone wanting to learn more about this fascinating space.
Amazon Verified review
erichDec 15, 2022
5
I've found this book to be super helpful for me: an IT professional looking to transition into the Cybersecurity space. It provides a wealth of InfoSec material that any IT professional could benefit from. I strongly recommend it!
Yuri Diogenes has been working at Microsoft since 2006, and currently he is a Principal PM Manager where he manages a Team of PMs for Microsoft CNAPP Solution, Defender for Cloud. Yuri is also a Professor at EC-Council University and Trine University. Yuri has a Master of Science in Cybersecurity Intelligence and Forensics Investigation from Utica College, and he is currently working on his PhD in Cybersecurity Leadership from Capitol Technology University. Yuri has published a total of 32 books, mostly covering information security and Microsoft technologies. Yuri also holds many industry certifications, such as CISSP, E|CND, E|CEH, E|CSA, E|CHFI, E|CTIA, CompTIA Security+, CySA+, Network+, CASP, and MITRE ATT&CK Cyber Threat Intelligence.
Dr. Erdal Ozkaya is named among the Top 50 Technology Leaders by CIO Online & IDC. He is a Chief Cybersecurity Strategist and CISO at Xcitium (Comodo Cybersecurity), and a professor at Charles Sturt University. His expertise spans end-to-end IT solutions, management, communications, and innovation. He's a well-known public speaker, an award-winning technical expert, author, and creator of certifications (courseware and exams) for prestigious organizations such as Microsoft, EC Council, CertNexus, and other expert-level vendors with an esteemed list of credits to his name. He is working with an ardent passion for raising cyber awareness and leveraging new, innovative approaches.
Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.
If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.
Please Note: Packt eBooks are non-returnable and non-refundable.
Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:
You may make copies of your eBook for your own use onto any machine
You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website?
If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:
Register on our website using your email address and the password.
Search for the title by name or ISBN using the search option.
Select the title you want to purchase.
Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title.
Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook?
If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
To view your account details or to download a new copy of the book go to www.packtpub.com/account
Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.
You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.
What are the benefits of eBooks?
You can get the information you need immediately
You can easily take them with you on a laptop
You can download them an unlimited number of times
You can print them out
They are copy-paste enabled
They are searchable
There is no password protection
They are lower price than print
They save resources and space
What is an eBook?
Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.
When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.
For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.