Defensive Security Handbook


Book Description

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. Learn fundamentals of starting or redesigning an InfoSec program Create a base set of policies, standards, and procedures Plan and design incident response, disaster recovery, compliance, and physical security Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Explore automated process and tools for vulnerability management Securely develop code to reduce exploitable errors Understand basic penetration testing concepts through purple teaming Delve into IDS, IPS, SOC, logging, and monitoring




PTFM


Book Description

Red teams can show flaws that exist in your network before they are compromised by malicious actors and blue teams traditionally assess current security measures and identify security flaws. The teams can provide valuable feedback to each other, but this is often overlooked, enter the purple team. The purple team allows for the integration of red team tactics and blue team security measures. The purple team field manual is a manual for all security professionals and integrates red and blue team methodologies.




The Founding


Book Description

What do you do with six retired mercenaries, a fae dragon familiar, and thirty twelve-year-olds? Is that a bell I hear ringing? It’s time for school. Welcome to the Braidenhurst Academy where rank has no privilege; from a crown prince to a street urchin, all are treated equally. They will learn the basics of the “three Rs,” along with arcane magic, healing magic, weaponry, wilderness survival skills, and much more. So open up this book and get to your first class.




The Broadcaster


Book Description




Advanced Infrastructure Penetration Testing


Book Description

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure Key Features Advanced exploitation techniques to breach modern operating systems and complex network devices Learn about Docker breakouts, Active Directory delegation, and CRON jobs Practical use cases to deliver an intelligent endpoint-protected system Book Description It has always been difficult to gain hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. This book will be your one-stop solution to compromising complex network devices and modern operating systems. This book provides you with advanced penetration testing techniques that will help you exploit databases, web and application servers, switches or routers, Docker, VLAN, VoIP, and VPN. With this book, you will explore exploitation abilities such as offensive PowerShell tools and techniques, CI servers, database exploitation, Active Directory delegation, kernel exploits, cron jobs, VLAN hopping, and Docker breakouts. Moving on, this book will not only walk you through managing vulnerabilities, but will also teach you how to ensure endpoint protection. Toward the end of this book, you will also discover post-exploitation tips, tools, and methodologies to help your organization build an intelligent security system. By the end of this book, you will have mastered the skills and methodologies needed to breach infrastructures and provide complete endpoint protection for your system. What you will learn Exposure to advanced infrastructure penetration testing techniques and methodologies Gain hands-on experience of penetration testing in Linux system vulnerabilities and memory exploitation Understand what it takes to break into enterprise networks Learn to secure the configuration management environment and continuous delivery pipeline Gain an understanding of how to exploit networks and IoT devices Discover real-world, post-exploitation techniques and countermeasures Who this book is for If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial.




Tally-ho


Book Description




Purple Monkey Rescue (Team Umizoomi)


Book Description

Boys and girls ages 2-5 will love this full-color book in which Nickelodeon's Team Umizoomi help a lost monkey find his way home.




Bulletin


Book Description




Unbinding Your Church


Book Description

Pastors are busy. This collection of fully integrated resources will help your church work and pray through the Unbinding the Gospel Series. Included are step-by-step planning tools as well as worship resources to allow you--the pastor--to spend time on prayer, teaching, and working directly with others in your church. The planning tools include calendars, checklists for church staff, weekly scripture tie-ins, sample church newsletter campaigns, diagrams, simple to elaborate E-vent planning suggestions, web site ideas, specific lesson plans, and much much more. Worship resources include sermons, prayers, and forms that have been placed on the Web for FREE with easy access and downloads. Change Habits, Not Just Minds. From the Unbinding the Gospel Series.




Purple Comet! Math Meet


Book Description