Book description
Bugs: they’re everywhere. Software, firmware, hardware — they all have them. Bugs even live in the cloud. And when one of these bugs is leveraged to wreak havoc or steal sensitive information, a company’s prized technology assets suddenly become serious liabilities.
Fortunately, exploitable security weaknesses are entirely preventable; you just have to find them before the bad guys do. Practical Vulnerability Management will help you achieve this goal on a budget, with a proactive process for detecting bugs and squashing the threat they pose.
The book starts by introducing the practice of vulnerability management, its tools and components, and detailing the ways it improves an enterprise’s overall security posture. Then it’s time to get your hands dirty! As the content shifts from conceptual to practical, you’re guided through creating a vulnerability-management system from the ground up, using open-source software.
Along the way, you’ll learn how to:
•Generate accurate and usable vulnerability intelligence
•Scan your networked systems to identify and assess bugs and vulnerabilities
•Prioritize and respond to various security risks
•Automate scans, data analysis, reporting, and other repetitive tasks
•Customize the provided scripts to adapt them to your own needs
Playing whack-a-bug won’t cut it against today’s advanced adversaries. Use this book to set up, maintain, and enhance an effective vulnerability management system, and ensure your organization is always a step ahead of hacks and attacks.
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication
- About the Author
- BRIEF CONTENTS
- CONTENTS IN DETAIL
- ACKNOWLEDGMENTS
- INTRODUCTION
- PART I: VULNERABILITY MANAGEMENT BASICS
- 1 BASIC CONCEPTS
- 2 SOURCES OF INFORMATION
- 3 VULNERABILITY SCANNERS
- 4 AUTOMATING VULNERABILITY MANAGEMENT
- 5 DEALING WITH VULNERABILITIES
- 6 ORGANIZATIONAL SUPPORT AND OFFICE POLITICS
- PART II: HANDS-ON VULNERABILITY MANAGEMENT
- 7 SETTING UP YOUR ENVIRONMENT
- 8 USING THE DATA COLLECTION TOOLS
- 9 CREATING AN ASSET AND VULNERABILITY DATABASE
- 10 MAINTAINING THE DATABASE
- 11 GENERATING ASSET AND VULNERABILITY REPORTS
- 12 AUTOMATING SCANS AND REPORTING
- 13 ADVANCED REPORTING
- 14 ADVANCED TOPICS
- 15 CONCLUSION
- INDEX
Product information
- Title: Practical Vulnerability Management
- Author(s):
- Release date: September 2020
- Publisher(s): No Starch Press
- ISBN: 9781593279882
You might also like
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …
book
Python for Cybersecurity
Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for …
book
Cybersecurity Risk Management
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran …
book
Python Crash Course, 3rd Edition
Python Crash Course is the world's best-selling guide to the Python guide programming language, with over …