Investigating the Cyber Breach

The Digital Forensics Guide for the Network Engineer

Nonfiction, Computers, General Computing, Skills, Application Software, Computer Security
Cover of the book Investigating the Cyber Breach by Joseph Muniz, Aamir Lakhani, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Joseph Muniz, Aamir Lakhani ISBN: 9780134755816
Publisher: Pearson Education Publication: January 31, 2018
Imprint: Cisco Press Language: English
Author: Joseph Muniz, Aamir Lakhani
ISBN: 9780134755816
Publisher: Pearson Education
Publication: January 31, 2018
Imprint: Cisco Press
Language: English

Investigating the Cyber Breach

The Digital Forensics Guide for the Network Engineer

·         Understand the realities of cybercrime and today’s attacks

·         Build a digital forensics lab to test tools and methods, and gain expertise

·         Take the right actions as soon as you discover a breach

·         Determine the full scope of an investigation and the role you’ll play

·         Properly collect, document, and preserve evidence and data

·         Collect and analyze data from PCs, Macs, IoT devices, and other endpoints

·         Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence

·         Analyze iOS and Android devices, and understand encryption-related obstacles to investigation

·         Investigate and trace email, and identify fraud or abuse

·         Use social media to investigate individuals or online identities

·         Gather, extract, and analyze breach data with Cisco tools and techniques

·         Walk through common breaches and responses from start to finish

·         Choose the right tool for each task, and explore alternatives that might also be helpful

 

The professional’s go-to digital forensics resource for countering attacks right now

Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that.

Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You’ll learn how to make the most of today’s best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more.

Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now.

This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

 

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Investigating the Cyber Breach

The Digital Forensics Guide for the Network Engineer

·         Understand the realities of cybercrime and today’s attacks

·         Build a digital forensics lab to test tools and methods, and gain expertise

·         Take the right actions as soon as you discover a breach

·         Determine the full scope of an investigation and the role you’ll play

·         Properly collect, document, and preserve evidence and data

·         Collect and analyze data from PCs, Macs, IoT devices, and other endpoints

·         Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence

·         Analyze iOS and Android devices, and understand encryption-related obstacles to investigation

·         Investigate and trace email, and identify fraud or abuse

·         Use social media to investigate individuals or online identities

·         Gather, extract, and analyze breach data with Cisco tools and techniques

·         Walk through common breaches and responses from start to finish

·         Choose the right tool for each task, and explore alternatives that might also be helpful

 

The professional’s go-to digital forensics resource for countering attacks right now

Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that.

Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You’ll learn how to make the most of today’s best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more.

Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now.

This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

 

 

More books from Pearson Education

Cover of the book AngularJS for .NET Developers in 24 Hours, Sams Teach Yourself by Joseph Muniz, Aamir Lakhani
Cover of the book Investment Opportunities in Emerging Markets by Joseph Muniz, Aamir Lakhani
Cover of the book Level 2: The Scarlett Letter by Joseph Muniz, Aamir Lakhani
Cover of the book Level 3: Hamlet by Joseph Muniz, Aamir Lakhani
Cover of the book Apple Pro Training Series by Joseph Muniz, Aamir Lakhani
Cover of the book Learn How to Lead and Succeed (Collection) by Joseph Muniz, Aamir Lakhani
Cover of the book Mastering Risk and Procurement in Project Management by Joseph Muniz, Aamir Lakhani
Cover of the book Creative 52 by Joseph Muniz, Aamir Lakhani
Cover of the book There Are No Dumb Questions About Money by Joseph Muniz, Aamir Lakhani
Cover of the book The Photographer's Pricing System by Joseph Muniz, Aamir Lakhani
Cover of the book Real World Video Compression by Joseph Muniz, Aamir Lakhani
Cover of the book Deploying ACI by Joseph Muniz, Aamir Lakhani
Cover of the book Exam Ref 70-518 Designing and Developing Windows Applications Using Microsoft .NET Framework 4 (MCPD) by Joseph Muniz, Aamir Lakhani
Cover of the book Level 2: Moby Dick by Joseph Muniz, Aamir Lakhani
Cover of the book The Seven Cs of Consulting by Joseph Muniz, Aamir Lakhani
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy