Size: 2.24 GB
Table of contents
Chapter 1: Introduction to Network Threats
Yes, You Are a Target
Typical Attacks Against a Network
Chapter 2: How a Malicious Hacker Goes About Breaking into Your Network
A Malicious Hacker’s Methodology
What We Can Learn from Malicious Hackers
Scanning Tools and Methodology
Getting Sneaky with MiTM and DDOS Attacks
Chapter 3: Securing Your Network Through Your Users
What is an Insider Threat?
Why Employee Training is Important and Some Tips
Why You Need to Strike a Balance Between Security and Ease of Use
Chapter 4: Securing Your Machines
Antivirus and Console Tools
Fake Error Messages, a Look at Scareware and What it is
Limiting User Rights
Application Reduction, Why You Should Slim It Down
VPN (What it is, Why They are Important)
Chapter 5: Logs and Auditing
System Log Files
Network Alert Software and Monitoring (Meraki)
IP (What is IP Addresses, Why They are Important)
Chapter 6: Phishing and Spear Phishing Attacks
About Phishing Emails
Identifying Phishing Emails
Running a Phishing Campaign
Chapter 7: Red Teams and Blue Team Approach
What is a Red Team?
What is a Blue Team?
In-house or Contracted?
Chapter 8: Tracking the Attacker (OSINT)
What is OSINT?
Trace Labs OSINT VM
Tracking by IP
Chapter 9: Recovering from an Attack
Damage Control and Assessment
Backup and Recovery
Developing and Learning from Your Attack