Basic understanding of cybersecurity tools and practices will help you get the most out of this book.
To get the most out of this book
Download the color images
We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: https://www.packtpub.com/sites/default/files/downloads/9781788836296_ColorImages.pdf.
Conventions used
There are a number of text conventions used throughout this book.
Any command-line input or output is written as follows:
Set-MpPreference -EnableNetworkProtection Enabled
Warnings or important notes appear like this.
Tips and tricks appear like this.