Network Vulnerability Assessment: Identify security loopholes in your network s infrastructure
Sagar Rahalkar
- 出版商: Packt Publishing
- 出版日期: 2018-08-31
- 定價: $1,360
- 售價: 8.0 折 $1,088
- 語言: 英文
- 頁數: 254
- 裝訂: Paperback
- ISBN: 1788627253
- ISBN-13: 9781788627252
-
相關分類:
資訊安全
立即出貨 (庫存=1)
相關主題
商品描述
Build a network security threat model with this comprehensive learning guide
Key Features
- Develop a network security threat model for your organization
- Gain hands-on experience in working with network scanning and analyzing tools
- Learn to secure your network infrastructure
Book Description
The tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure.
Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism.
By the end of this book, you will be in a position to build a security framework fit for an organization.
What you will learn
- Develop a cost-effective end-to-end vulnerability management program
- Implement a vulnerability management program from a governance perspective
- Learn about various standards and frameworks for vulnerability assessments and penetration testing
- Understand penetration testing with practical learning on various supporting tools and techniques
- Gain insight into vulnerability scoring and reporting
- Explore the importance of patching and security hardening
- Develop metrics to measure the success of the vulnerability management program
Who this book is for
Network Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program.
Table of Contents
- Vulnerability Management Governance
- Setting up the Assessment Environment
- Security Assessment Prerequisites
- Information Gathering
- Enumeration & Vulnerability Assessment
- Gaining Network Access
- Assessing Web Application Security
- Privilege Escalation
- Maintaining access & clearing tracks
- Vulnerability Scoring
- Threat Modeling
- Patching & Security Hardening
- Vulnerability Reporting and metrics
商品描述(中文翻譯)
建立一個網路安全威脅模型的全面學習指南
主要特點:
- 為您的組織開發網路安全威脅模型
- 獲得使用網路掃描和分析工具的實踐經驗
- 學習保護您的網路基礎設施
書籍描述:
科技世界已被數位化大幅佔據,因此對於組織來說,積極設計網路基礎設施的安全機制變得非常重要。分析漏洞可能是保護您的網路基礎設施的最佳方法之一。
《網路漏洞評估》從網路安全評估概念、工作流程和架構開始。然後,您將使用開源工具進行主動和被動網路掃描。隨著您逐步深入各章節,您將使用這些掃描結果來分析和設計網路安全的威脅模型。在結尾章節中,您將更深入地瞭解IP網路分析、Microsoft服務和郵件服務等概念。您還將掌握各種安全最佳實踐,這將幫助您建立網路安全機制。
通過閱讀本書,您將能夠建立一個適合組織的安全框架。
您將學到什麼:
- 開發具有成本效益的端到端漏洞管理計劃
- 從治理角度實施漏洞管理計劃
- 了解各種漏洞評估和滲透測試的標準和框架
- 通過實際學習各種支援工具和技術來了解滲透測試
- 瞭解漏洞評分和報告的重要性
- 探索修補和安全加固的重要性
- 開發衡量漏洞管理計劃成功的指標
本書適合對開發組織網路威脅模型負責的安全分析師、威脅分析師和任何安全專業人員。本書也適合任何希望成為漏洞管理團隊一員並實施端到端強大漏洞管理計劃的個人。
目錄:
1. 漏洞管理治理
2. 設置評估環境
3. 安全評估先決條件
4. 資訊收集
5. 列舉和漏洞評估
6. 獲取網路訪問權限
7. 評估網路應用程式安全性
8. 權限提升
9. 維持訪問權限和清除痕跡
10. 漏洞評分
11. 威脅建模
12. 修補和安全加固
13. 漏洞報告和指標