Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
The Complete Guide to Defense in Depth

You're reading from   The Complete Guide to Defense in Depth Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach

Arrow left icon
Product type Paperback
Published in Jul 2024
Publisher Packt
ISBN-13 9781835468265
Length 298 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Akash Mukherjee Akash Mukherjee
Author Profile Icon Akash Mukherjee
Akash Mukherjee
Arrow right icon
View More author details
Toc

Table of Contents (16) Chapters Close

Preface 1. Part 1: Understanding Defense in Depth – The Core Principle FREE CHAPTER
2. Chapter 1: Navigating Risk, Classifying Assets, and Unveiling Threats 3. Chapter 2: Practical Guide to Defense in Depth 4. Chapter 3: Building a Framework for Layered Security 5. Part 2: Building a Layered Security Strategy – Thinking Like an Attacker
6. Chapter 4: Understanding the Attacker Mindset 7. Chapter 5: Uncovering Weak Points through an Adversarial Lens 8. Chapter 6: Mapping Attack Vectors and Gaining an Edge 9. Chapter 7: Building a Proactive Layered Defense Strategy 10. Part 3: Adapting and Evolving with Defense in Depth – The Threat Landscape
11. Chapter 8: Understanding Emerging Threats and Defense in Depth 12. Chapter 9: The Human Factor – Security Awareness and Training 13. Chapter 10: Defense in Depth – A Living, Breathing Approach to Security 14. Index 15. Other Books You May Enjoy

Other Books You May Enjoy

If you enjoyed this book, you may be interested in these other books by Packt:

Mastering Cloud Security Posture Management (CSPM)

Qamar Nomani

ISBN: 978-1-83763-840-6

  • Find out how to deploy and onboard cloud accounts using CSPM tools
  • Understand security posture aspects such as the dashboard, asset inventory, and risks
  • Explore the Kusto Query Language (KQL) and write threat hunting queries
  • Explore security recommendations and operational best practices
  • Get to grips with vulnerability, patch, and compliance management, and governance
  • Familiarize yourself with security alerts, monitoring, and workload protection best practices
  • Manage IaC scan policies and learn how to handle exceptions

Endpoint Detection and Response Essentials

Guven Boyraz

ISBN: 978-1-83546-326-0

  • Gain insight into current cybersecurity threats targeting endpoints...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image