Part 3:Defense, Social Engineering, IoT, and Cloud
In this part, we take a deeper look into the defender operations of incident response and threat hunting as a means of controlling an incident and proactively looking for areas where incidents could occur. We then pivot to our final focal points, including attackers’ use of social engineering to gain access to networks. We also look at Internet of Things (IoT) and cloud technologies, covering attacks and some mitigation techniques for these special environments.
This section has the following chapters:
- Chapter 11, Incident Response and Threat Hunting
- Chapter 12, Social Engineering
- Chapter 13, Hacking Internet of Things (IoT)
- Chapter 14, Hacking the Cloud