Table of Contents
Preface
Section 1: Mastering Defensive Security Concepts
Chapter 1: A Refresher on Defensive Security Concepts
Technical requirements
Deep dive into the core of cybersecurity
The cybersecurity triad
Types of attacks
Managing cybersecurity's legendary pain point: Passwords
Password breaches
Social engineering attacks using compromised passwords
Brute-force attacks
Dictionary attacks
Creating a secure password
Managing passwords at the enterprise level
Bonus track
Mastering defense in depth
Factors to consider when creating DiD models
Asset identification
Defense by layers
Bonus track
Comparing the blue and red teams
Summary
Further reading
Chapter 2: Managing Threats, Vulnerabilities, and Risks
Technical requirements
Get Mastering Defensive Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.