Take a look at our Network Protocols books. Shulph carries a great selection of Network Protocols books, and we are always adding more.
Develop proficiency in AWS technologies and validate your skills by becoming an AWS Certified Cloud PractitionerKey FeaturesDevelop the skills to design highly available and fault-tolerant solutions in the cloudLearn how to adopt best-practice security measures in your cloud applicationsAchieve credibility through industry-recognized AWS Cloud Practitioner certificationBook DescriptionAmazon Web Services is the largest cloud computing service provider in the world. Its foundational certification, AWS Certified Cloud Practitioner (CLF-C01), is the first step to fast-tracking your career in cloud computing. This certification will add value even to those in non-IT roles, including professionals from sales, legal, and finance who may be working with cloud computing or AWS projects. If you are a seasoned IT professional, this certification will make it easier for you to prepare for more technical certifications to progress up the AWS ladder and improve your career prospects. The book is divided into four parts. The first part focuses on the fundamentals of cloud computing and the AWS global infrastructure. The second part examines key AWS technology services, including compute, network, storage, and database services. The third part covers AWS security, the shared responsibility model, and several security tools. In the final part, you'll study the fundamentals of cloud economics and AWS pricing models and billing practices. Complete with exercises that highlight best practices for designing solutions, detailed use cases for each of the AWS services, quizzes, and two complete practice tests, this CLF-C01 exam study guide will help you gain the knowledge and hands-on experience necessary to ace the AWS Certified Cloud Practitioner exam.What you will learnCreate an AWS account to access AWS cloud services in a secure and isolated environmentUnderstand identity and access management (IAM), encryption, and multifactor authentication (MFA) protectionConfigure multifactor authentication for your IAM accountsConfigure AWS services such as EC2, ECS, Lambda, VPCs, and Route53Explore various storage and database services such as S3, EBS, and Amazon RDSStudy the fundamentals of modern application design to shift from a monolithic to microservices architectureDesign highly available solutions with decoupling ingrained in your design architectureWho this book is forIf you're looking to advance your career and gain expertise in cloud computing, with particular focus on the AWS platform, this book is for you. This guide will help you ace the AWS Certified Cloud Practitioner Certification exam, enabling you to embark on a rewarding career in cloud computing. No previous IT experience is essential to get started with this book, since it covers core IT fundamentals from the ground up.
Prepare yourself for the next generation networking skills and acquire the knowledge needed to secure the routers. Key Features Build foundational Cisco networking skills and prepare yourself for next-generation network transformation Take practice questions and mock tests to check how prepared you are for the CCNA exam Gain a strong understanding of network communication with the help of practical examples Book Description Cisco Certified Network Associate (CCNA) Routing and Switching is one of the most important qualifications for keeping your networking skills up to date. CCNA Routing and Switching 200-125 Certification Guide covers topics included in the latest CCNA exam, along with review and practice questions. This guide introduces you to the structure of IPv4 and IPv6 addresses and examines in detail the creation of IP networks and sub-networks and how to assign addresses in the network. You will then move on to understanding how to configure, verify, and troubleshoot layer 2 and layer 3 protocols. In addition to this, you will discover the functionality, configuration, and troubleshooting of DHCPv4. Combined with router and router simulation practice, this certification guide will help you cover everything you need to know in order to pass the CCNA Routing and Switching 200-125 exam. By the end of this book, you will explore security best practices, as well as get familiar with the protocols that a network administrator can use to monitor the network. What you will learn Gain an in-depth understanding of networking using routers and switches Understand layer 2 technology and its various configurations and connections Configure default, static, and dynamic routing Design and implement subnetted IPv4 and IPv6 addressing schemes Troubleshoot issues and keep your network secure Study the importance of VLANs for security and optimizing the bandwidth Who this book is for This book is for you if you are a network administrator, network technician, or anyone who wants to prepare for CCNA Routing and Switching certification. Basic understanding of networking will help you get the best out of this guide, although sufficient information is provided to those new in this field.
Architect, engineer, integrate, and implement security across increasingly complex, hybrid enterprise networksKey FeaturesLearn how to apply industry best practices and earn the CASP+ certificationExplore over 400 CASP+ questions to test your understanding of key concepts and help you prepare for the examDiscover over 300 illustrations and diagrams that will assist you in understanding advanced CASP+ conceptsBook DescriptionCompTIA Advanced Security Practitioner (CASP+) ensures that security practitioners stay on top of the ever-changing security landscape. The CompTIA CASP+ CAS-004 Certification Guide offers complete, up-to-date coverage of the CompTIA CAS-004 exam so you can take it with confidence, fully equipped to pass on the first attempt.Written in a clear, succinct way with self-assessment questions, exam tips, and mock exams with detailed explanations, this book covers security architecture, security operations, security engineering, cryptography, governance, risk, and compliance. You'll begin by developing the skills to architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise. Moving on, you'll discover how to monitor and detect security incidents, implement incident response, and use automation to proactively support ongoing security operations. The book also shows you how to apply security practices in the cloud, on-premises, to endpoints, and to mobile infrastructure. Finally, you'll understand the impact of governance, risk, and compliance requirements throughout the enterprise.By the end of this CASP study guide, you'll have covered everything you need to pass the CompTIA CASP+ CAS-004 certification exam and have a handy reference guide.What you will learnUnderstand Cloud Security Alliance (CSA) and the FedRAMP programsRespond to Advanced Persistent Threats (APT) by deploying hunt teamsUnderstand the Cyber Kill Chain framework as well as MITRE ATT&CK and Diamond ModelsDeploy advanced cryptographic solutions using the latest FIPS standardsUnderstand compliance requirements for GDPR, PCI, DSS, and COPPASecure Internet of Things (IoT), Industrial control systems (ICS), and SCADAPlan for incident response and digital forensics using advanced toolsWho this book is forThis CompTIA book is for CASP+ CAS-004 exam candidates who want to achieve CASP+ certification to advance their career. Security architects, senior security engineers, SOC managers, security analysts, IT cybersecurity specialists/INFOSEC specialists, and cyber risk analysts will benefit from this book. Experience in an IT technical role or CompTIA Security+ certification or equivalent is assumed.
Understand the nitty-gritty of Cybersecurity with ease Key Features Align your security knowledge with industry leading concepts and tools Acquire required skills and certifications to survive the ever changing market needs Learn from industry experts to analyse, implement, and maintain a robust environment Book Description It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field. What you will learn Get an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you best Plan your transition into cybersecurity in an efficient and effective way Learn how to build upon your existing skills and experience in order to prepare for your career in cybersecurity Who this book is for This book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful.
Advance your career as an information security professional by turning theory into robust solutions to secure your organizationKey FeaturesConvert the theory of your security certifications into actionable changes to secure your organizationDiscover how to structure policies and procedures in order to operationalize your organization's information security strategyLearn how to achieve security goals in your organization and reduce software riskBook DescriptionInformation security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats. The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security. By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security.What you will learnUnderstand and operationalize risk management concepts and important security operations activitiesDiscover how to identify, classify, and maintain information and assetsAssess and mitigate vulnerabilities in information systemsDetermine how security control testing will be undertakenIncorporate security into the SDLC (software development life cycle)Improve the security of developed software and mitigate the risks of using unsafe softwareWho this book is forIf you are looking to begin your career in an information security role, then this book is for you. Anyone who is studying to achieve industry-standard certification such as the CISSP or CISM, but looking for a way to convert concepts (and the seemingly endless number of acronyms) from theory into practice and start making a difference in your day-to-day work will find this book useful.
Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devicesKey FeaturesExplore free and commercial tools for carrying out data extractions and analysis for digital forensicsLearn to look for key artifacts, recover deleted mobile data, and investigate processed dataGet up and running with extracting full filesystem images and jailbreak devices to gather the most data possibleBook DescriptionProfessionals working in the mobile forensics industry will be able to put their knowledge to work with this practical guide to learning how to extract and analyze all available data from an iOS device. This book is a comprehensive, how-to guide that leads investigators through the process of collecting mobile devices and preserving, extracting, and analyzing data, as well as building a report. Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this book starts by covering the fundamentals of mobile forensics and how to overcome challenges in extracting data from iOS devices. Once you've walked through the basics of iOS, you'll learn how to use commercial tools to extract and process data and manually search for artifacts stored in database files. Next, you'll find out the correct workflows for handling iOS devices and understand how to extract valuable information to track device usage. You'll also get to grips with analyzing key artifacts, such as browser history, the pattern of life data, location data, and social network forensics. By the end of this book, you'll be able to establish a proper workflow for handling iOS devices, extracting all available data, and analyzing it to gather precious insights that can be reported as prosecutable evidence.What you will learnBecome familiar with the mobile forensics workflowUnderstand how to legally seize iOS devices and preserve their dataExtract evidence through logical and filesystem acquisitionsPerform a deep-dive analysis of user data and system dataGain insights by analyzing third-party applicationsGet to grips with gathering evidence stored on iCloudWho this book is forForensic analysts and investigators interested in extending their skills to extract data from iOS devices, including system logs, device usage, and third-party application data, will find this book useful. Anyone familiar with the principles of digital forensics and looking to expand their knowledge base in deep iOS examinations will also benefit from this book.Knowledge of mobile forensic principles, data extraction, Unix/Linux terminal, and some hands-on understanding of databases and SQL query language is assumed.
Develop advanced skills for working with Linux systems on-premises and in the cloudKey FeaturesBecome proficient in everyday Linux administration tasks by mastering the Linux command line and using automationWork with the Linux filesystem, packages, users, processes, and daemonsDeploy Linux to the cloud with AWS, Azure, and KubernetesBook DescriptionLinux plays a significant role in modern data center management and provides great versatility in deploying and managing your workloads on-premises and in the cloud. This book covers the important topics you need to know about for your everyday Linux administration tasks. The book starts by helping you understand the Linux command line and how to work with files, packages, and filesystems. You'll then begin administering network services and hardening security, and learn about cloud computing, containers, and orchestration. Once you've learned how to work with the command line, you'll explore the essential Linux commands for managing users, processes, and daemons and discover how to secure your Linux environment using application security frameworks and firewall managers. As you advance through the chapters, you'll work with containers, hypervisors, virtual machines, Ansible, and Kubernetes. You'll also learn how to deploy Linux to the cloud using AWS and Azure. By the end of this Linux book, you'll be well-versed with Linux and have mastered everyday administrative tasks using workflows spanning from on-premises to the cloud. If you also find yourself adopting DevOps practices in the process, we'll consider our mission accomplished.What you will learnUnderstand how Linux works and learn basic to advanced Linux administration skillsExplore the most widely used commands for managing the Linux filesystem, network, security, and moreGet to grips with different networking and messaging protocolsFind out how Linux security works and how to configure SELinux, AppArmor, and Linux iptablesWork with virtual machines and containers and understand container orchestration with KubernetesWork with containerized workflows using Docker and KubernetesAutomate your configuration management workloads with AnsibleWho this book is forIf you are a Linux administrator who wants to understand the fundamentals and as well as modern concepts of Linux system administration, this book is for you. Windows System Administrators looking to extend their knowledge to the Linux OS will also benefit from this book.
Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishingKey FeaturesLearn the ins and outs of log forwarding and troubleshooting issuesSet up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issuesGain an in-depth understanding of user credential detection to prevent data leaks Book DescriptionThis book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection.What you will learnUnderstand how log forwarding is configured on the firewallFocus on effectively enabling remote accessExplore alternative ways for connecting users and remote networksProtect against phishing with credential detectionUnderstand how to troubleshoot complex issues confidentlyStrengthen the security posture of your firewallsWho this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.