Ciberseguridad. Curso Práctico


Book Description

La Ciberseguridad se ha convertido en un pilar imprescindible en este mundo conectado. La base de nuestra sociedad moderna depende cada vez más de sistemas informáticos complejos y datos digitales que requieren protección, seguridad y resiliencia frente a amenazas constantes y en evolución. Este libro elaborado para proporcionar una comprensión práctica y profunda de los principios, herramientas y estrategias esenciales en el campo de la seguridad de redes. A lo largo de sus páginas, se exploran desde los conceptos básicos hasta las últimas tendencias en seguridad cibernética. De forma clara y didáctica se analizan las amenazas que acechan en la oscuridad de la red mundial de Internet, desglosando los fundamentos de la protección de datos y sistemas, y se examinan las mejores prácticas de seguridad de cualquier entorno digital. El propósito de este libro no es sólo impartir conocimientos teóricos sino también proporcionar a los lectores herramientas prácticas y estrategias efectivas. Está diseñado como un faro en el vasto océano digital ayudando a encontrar e implementar soluciones que garanticen la integridad, seguridad y disponibilidad de la información en el universo virtual. Cada capítulo se complementa con ejercicios y reflexiones que fortalecen la compresión de los temas desarrollados y su aplicación práctica.







Penetration Testing


Book Description

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. Learn how to: –Crack passwords and wireless network keys with brute-forcing and wordlists –Test web applications for vulnerabilities –Use the Metasploit Framework to launch exploits and write your own Metasploit modules –Automate social-engineering attacks –Bypass antivirus software –Turn access to one machine into total control of the enterprise in the post exploitation phase You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework. With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.




Enterprise Cybersecurity


Book Description

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise’s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization’s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities.




Network Penetration Testing


Book Description

The Network administrators, Network Engineers, and Network Security engineers should know how hackers penetrate the network, what are the weaknesses of the network protocols that hackers can exploit and what tools they use. By mastering network penetration testing, network security professional can better protect their networks. Regular Penetration testing can potentially uncover any new vulnerabilities in the network.The focus of this book is to guide Network and Security Professionals to perform a complete network penetration test that covers all the network aspects through Kali Linux, Nmap and other tools to find network weaknesses. How to analyze network traffic using Wireshark and Tcpdump; to detect anomalies in the traffic that might represent an alert of attack on the network.




Crisis and Control


Book Description

Crisis and Control explains how neoliberal shifts in political and economic systems are militarizing the policing of protest. The book offers a way to understand the influence of political processes on police practices and provides an empirical study of militarized protest policing from 1995 until the present. Lesley J. Wood shows how protest policing techniques have become more militarized and more dependent on intelligence gathering over the past fifteen years partly as a result of the neoliberal restructuring political, economic and social processes. On an increasingly integrated and tumultuous globe, new militarized technologies, formations and frameworks are diffusing quickly through policing networks. Crisis and Control uses novel theoretical and methodological approaches and a unique range of empirical data to make an important and radical contribution to a growing field.




Ingeniería inversa. Curso práctico


Book Description

La Ingeniería Inversa, se refiere al estudio detallado de las funciones de cualquier archivo binario, paso a paso, con el fin de descubrir cuál es el código responsable por su funcionamiento. Es una de las disciplinas más gratificantes dentro de la seguridad informática. Esta obra te explica de forma secuencial como poner en práctica esta materia a través de explicaciones claras y didácticas, acompañados de ejemplos y ejercicios de autoevaluación. En la primera parte aprenderás el lenguaje de más bajo nivel legible que existe, el lenguaje Ensamblador, y lo harás comenzando desde cero con este orden: A moverte por el mundo de las API de Windows. A enlazar Ensamblador con lenguajes de alto nivel como Python y VB.Net. A crear su propia Shell Inversa en Ensamblador y conectarla con Python. A crear sus propias DLL. En la segunda parte asimilarás a interpretar los programas compilados y aprenderás: A interpretar FIcheros Binarios PE. A poner puntos de ruptura. A crear sus propios parches o cambios en un binario. A cifrar texto por XOR. A reconstruir código intermedio. A analizar un binario contaminado por Malware real.




International Relations: The Key Concepts


Book Description

First Published in 2002. Routledge is an imprint of Taylor & Francis, an informa company.




Niche Diplomacy


Book Description

An examination of the nature of middle power diplomacy in the post-Cold War era. As the rigid hierarchy of the bipolar era wanes, the potential ability of middle powers to open segmented niches opens up. This volume indicates the form and scope of this niche-building diplomatic activity from a bottom up perspective to provide an alternative to the dominant apex-dominated image in international relations.




Mastering Python for Networking and Security


Book Description

Tackle security and networking issues using Python libraries such as Nmap, requests, asyncio, and scapy Key Features Enhance your Python programming skills in securing systems and executing networking tasks Explore Python scripts to debug and secure complex networks Learn to avoid common cyber events with modern Python scripting Book DescriptionIt’s now more apparent than ever that security is a critical aspect of IT infrastructure, and that devastating data breaches can occur from simple network line hacks. As shown in this book, combining the latest version of Python with an increased focus on network security can help you to level up your defenses against cyber attacks and cyber threats. Python is being used for increasingly advanced tasks, with the latest update introducing new libraries and packages featured in the Python 3.7.4 recommended version. Moreover, most scripts are compatible with the latest versions of Python and can also be executed in a virtual environment. This book will guide you through using these updated packages to build a secure network with the help of Python scripting. You’ll cover a range of topics, from building a network to the procedures you need to follow to secure it. Starting by exploring different packages and libraries, you’ll learn about various ways to build a network and connect with the Tor network through Python scripting. You will also learn how to assess a network's vulnerabilities using Python security scripting. Later, you’ll learn how to achieve endpoint protection by leveraging Python packages, along with writing forensic scripts. By the end of this Python book, you’ll be able to use Python to build secure apps using cryptography and steganography techniques.What you will learn Create scripts in Python to automate security and pentesting tasks Explore Python programming tools that are used in network security processes Automate tasks such as analyzing and extracting information from servers Understand how to detect server vulnerabilities and analyze security modules Discover ways to connect to and get information from the Tor network Focus on how to extract information with Python forensics tools Who this book is for This Python network security book is for network engineers, system administrators, or any security professional looking to overcome networking and security challenges. You will also find this book useful if you’re a programmer with prior experience in Python. A basic understanding of general programming structures and the Python programming language is required before getting started.