Network Vulnerability Assessment: Identify security loopholes in your network’s infrastructure


Network Vulnerability Assessment: Identify security loopholes in your network’s infrastructure
Authors: Sagar Rahalkar
ISBN-10: 1788627253
ISBN-13: 9781788627252
Publication Date 出版日期: 2018-08-31
Print Length 页数: 254 pages


Book Description
By finelybook

The tech world has been taken over by digitization to a very large extent,and so it’s become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure.
Network Vulnerability Assessment starts with network security assessment concepts,workflows,and architectures. Then,you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters,you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters,you will dig deeper into concepts such as IP network analysis,Microsoft Services,and mail services. You will also get to grips with various security best practices,which will help you build your network security mechanism.
By the end of this book,you will be in a position to build a security framework fit for an organization.
Contents
1: VULNERABILITY MANAGEMENT GOVERNANCE
2: SETTING UP THE ASSESSMENT ENVIRONMENT
3: SECURITY ASSESSMENT PREREQUISITES
4: INFORMATION GATHERING
5: ENUMERATION AND VULNERABILITY ASSESSMENT
6: GAINING NETWORK ACCESS
7: ASSESSING WEB APPLICATION SECURITY
8: PRIVILEGE ESCALATION
9: MAINTAINING ACCESS AND CLEARING TRACKS
10: VULNERABILITY SCORING
11: THREAT MODELING
12: PATCHING AND SECURITY HARDENING
13: VULNERABILITY REPORTING AND METRICS
What You Will Learn
Develop a cost-effective end-to-end vulnerability management program
Implement a vulnerability management program from a governance perspective
Learn about various standards and frameworks for vulnerability assessments and penetration testing
Understand penetration testing with practical learning on various supporting tools and techniques
Gain insight into vulnerability scoring and reporting
Explore the importance of patching and security hardening
Develop metrics to measure the success of the vulnerability management program
Authors
Sagar Rahalkar
Sagar Rahalkar is a seasoned information security professional with an experience of 12 years in various verticals of IS. His domain expertise is in Cybercrime investigations,Forensics,AppSec,VA/PT,Compliance,IT GRC and so on. He has a master’s degree in computer science and several certifications,including Cyber Crime Investigator,CEH,ECSA,ISO 27001 LA,IBM AppScan Certified,CISM,and PRINCE2. He has been associated with Indian law enforcement agencies for around 4 years for dealing with cybercrime investigations and related training. He has received several awards and appreciations from senior officials of the police and defense organizations in India. He has also been a reviewer and author for various books and online publications.

相关文件下载地址

下载地址 Download解决验证以访问链接!
打赏
未经允许不得转载:finelybook » Network Vulnerability Assessment: Identify security loopholes in your network’s infrastructure

评论 抢沙发

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫

微信扫一扫