Take a look at our Networking books. Shulph carries a great selection of Networking books, and we are always adding more.
Develop technical skills and expertise to automate AWS networking tasks Key Features A fast paced guide that will help you pass the exam with confidence Learn advanced skill sets to build effective AWS networking solutions Enhance your AWS skills with practice exercises and mock tests Book Description Amazon has recently come up a with specialty certifications which validates a particular user's expertise that he/she would want to build a career in. Since the Cloud market now demands of AWS networking skills this becomes the most wanted certification to upheld ones industry portfolio. This book would be your ideal companion to getting skilled with complex and creative networking solutions. Cloud practitioners or associate-level certified individuals interested in validating advanced skills in networking can opt for this practical guide. This book will include topics that will help you design and implement AWS and hybrid IT network architectures along with some network automation tasks. You will also delve deep into topics that will help you design and maintain network architecture for all AWS services. Like most of our certification guides this book will also follow a unique approach of testing your learning with chapter-level practice exercises and certification-based mock tests. The exam mock tests will help you gauge whether you are ready to take the certification exam or not. This book will also be an advanced guide for networking professionals to enhance their networking skills and get certified. By the end of this book, you will be all equipped with AWS networking concepts and techniques and will have mastered core architectural best practices. What you will learn Formulate solution plans and provide guidance on AWS architecture best practices Design and deploy scalable, highly available, and fault-tolerant systems on AWS Identify the tools required to replicate an on-premises network in AWS Analyze the access and egress of data to and from AWS Select the appropriate AWS service based on data, compute, database, or security requirements Estimate AWS costs and identify cost control mechanisms Who this book is for If you are a system administrator, or a network engineer interested in getting certified with an advanced Cloud networking certification then this book is for you. Prior experience in Cloud administration and networking would be necessary.
Develop proficiency in AWS technologies and validate your skills by becoming an AWS Certified Cloud PractitionerKey FeaturesDevelop the skills to design highly available and fault-tolerant solutions in the cloudLearn how to adopt best-practice security measures in your cloud applicationsAchieve credibility through industry-recognized AWS Cloud Practitioner certificationBook DescriptionAmazon Web Services is the largest cloud computing service provider in the world. Its foundational certification, AWS Certified Cloud Practitioner (CLF-C01), is the first step to fast-tracking your career in cloud computing. This certification will add value even to those in non-IT roles, including professionals from sales, legal, and finance who may be working with cloud computing or AWS projects. If you are a seasoned IT professional, this certification will make it easier for you to prepare for more technical certifications to progress up the AWS ladder and improve your career prospects. The book is divided into four parts. The first part focuses on the fundamentals of cloud computing and the AWS global infrastructure. The second part examines key AWS technology services, including compute, network, storage, and database services. The third part covers AWS security, the shared responsibility model, and several security tools. In the final part, you'll study the fundamentals of cloud economics and AWS pricing models and billing practices. Complete with exercises that highlight best practices for designing solutions, detailed use cases for each of the AWS services, quizzes, and two complete practice tests, this CLF-C01 exam study guide will help you gain the knowledge and hands-on experience necessary to ace the AWS Certified Cloud Practitioner exam.What you will learnCreate an AWS account to access AWS cloud services in a secure and isolated environmentUnderstand identity and access management (IAM), encryption, and multifactor authentication (MFA) protectionConfigure multifactor authentication for your IAM accountsConfigure AWS services such as EC2, ECS, Lambda, VPCs, and Route53Explore various storage and database services such as S3, EBS, and Amazon RDSStudy the fundamentals of modern application design to shift from a monolithic to microservices architectureDesign highly available solutions with decoupling ingrained in your design architectureWho this book is forIf you're looking to advance your career and gain expertise in cloud computing, with particular focus on the AWS platform, this book is for you. This guide will help you ace the AWS Certified Cloud Practitioner Certification exam, enabling you to embark on a rewarding career in cloud computing. No previous IT experience is essential to get started with this book, since it covers core IT fundamentals from the ground up.
Learn to distribute network traffic, optimize application delivery, and defend network-level threats. Key Features Quickly get up and running with Azure networking solutions Level-up your cloud networking skills by planning, implementing, configuring, and securing your infrastructure network with Azure Leverage Azure networking services to provide applications highly available and fault tolerant environment Book Description Microsoft provides organizations with an effective way of managing their network with Azure's networking services. No matter the size of your organization, Azure provides a way to highly reliable performance and secure connectivity with its networking services. The book starts with an introduction to the Azure networking like creating Azure virtual networks, designing address spaces and subnets. Then you will learn to create and manage network security groups, application security groups, and IP addresses in Azure. Gradually, we move on to various aspects like S2S, P2S, and Vnet2Vnet connections, DNS and routing, load balancers and traffic manager. This book will cover every aspect and function required to deliver practical recipes to help readers learn from basic cloud networking practices to planning, implementing, and securing their infrastructure network with Azure. Readers will not only be able to upscale their current environment but will also learn to monitor, diagnose, and ensure secure connectivity. After learning to deliver a robust environment readers will also gain meaningful insights from recipes on best practices. By the end of this book, readers will gain hands-on experience in providing cost-effective solutions that benefit organizations. What you will learn Learn to create Azure networking services Understand how to create and work on hybrid connections Configure and manage Azure network services Learn ways to design high availability network solutions in Azure Discover how to monitor and troubleshoot Azure network resources Learn different methods of connecting local networks to Azure virtual networks Who this book is for This book is targeted towards cloud architects, cloud solution providers, or any stakeholders dealing with networking on the Azure cloud. Some prior understanding of Microsoft Azure will be a plus point.
Get hands-on experience on concepts of Bug Bounty Hunting Key Features Get well-versed with the fundamentals of Bug Bounty Hunting Hands-on experience on using different tools for bug hunting Learn to write a bug bounty report according to the different vulnerabilities and its analysis Book Description Bug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers. This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed. This book will get you started with bug bounty hunting and its fundamentals. What you will learn Learn the basics of bug bounty hunting Hunt bugs in web applications Hunt bugs in Android applications Analyze the top 300 bug reports Discover bug bounty hunting research methodologies Explore different tools used for Bug Hunting Who this book is for This book is targeted towards white-hat hackers, or anyone who wants to understand the concept behind bug bounty hunting and understand this brilliant way of penetration testing. This book does not require any knowledge on bug bounty hunting.
Get hands-on experience in using Burp Suite to execute attacks and perform web assessments Key Features Explore the tools in Burp Suite to meet your web infrastructure security demands Configure Burp to fine-tune the suite of tools specific to the target Use Burp extensions to assist with different technologies commonly found in application stacks Book Description Burp Suite is a Java-based platform for testing the security of your web applications, and has been adopted widely by professional enterprise testers. The Burp Suite Cookbook contains recipes to tackle challenges in determining and exploring vulnerabilities in web applications. You will learn how to uncover security flaws with various test cases for complex environments. After you have configured Burp for your environment, you will use Burp tools such as Spider, Scanner, Intruder, Repeater, and Decoder, among others, to resolve specific problems faced by pentesters. You will also explore working with various modes of Burp and then perform operations on the web. Toward the end, you will cover recipes that target specific test scenarios and resolve them using best practices. By the end of the book, you will be up and running with deploying Burp for securing web applications. What you will learn Configure Burp Suite for your web applications Perform authentication, authorization, business logic, and data validation testing Explore session management and client-side testing Understand unrestricted file uploads and server-side request forgery Execute XML external entity attacks with Burp Perform remote code execution with Burp Who this book is for If you are a security professional, web pentester, or software developer who wants to adopt Burp Suite for applications security, this book is for you.
Prepare yourself for the next generation networking skills and acquire the knowledge needed to secure the routers. Key Features Build foundational Cisco networking skills and prepare yourself for next-generation network transformation Take practice questions and mock tests to check how prepared you are for the CCNA exam Gain a strong understanding of network communication with the help of practical examples Book Description Cisco Certified Network Associate (CCNA) Routing and Switching is one of the most important qualifications for keeping your networking skills up to date. CCNA Routing and Switching 200-125 Certification Guide covers topics included in the latest CCNA exam, along with review and practice questions. This guide introduces you to the structure of IPv4 and IPv6 addresses and examines in detail the creation of IP networks and sub-networks and how to assign addresses in the network. You will then move on to understanding how to configure, verify, and troubleshoot layer 2 and layer 3 protocols. In addition to this, you will discover the functionality, configuration, and troubleshooting of DHCPv4. Combined with router and router simulation practice, this certification guide will help you cover everything you need to know in order to pass the CCNA Routing and Switching 200-125 exam. By the end of this book, you will explore security best practices, as well as get familiar with the protocols that a network administrator can use to monitor the network. What you will learn Gain an in-depth understanding of networking using routers and switches Understand layer 2 technology and its various configurations and connections Configure default, static, and dynamic routing Design and implement subnetted IPv4 and IPv6 addressing schemes Troubleshoot issues and keep your network secure Study the importance of VLANs for security and optimizing the bandwidth Who this book is for This book is for you if you are a network administrator, network technician, or anyone who wants to prepare for CCNA Routing and Switching certification. Basic understanding of networking will help you get the best out of this guide, although sufficient information is provided to those new in this field.
A comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples for leveraging Azure, AWS, and GCP built-in services and capabilitiesKey FeaturesDiscover practical techniques for implementing cloud securityLearn how to secure your data and core cloud infrastructure to suit your business needsImplement encryption, detect cloud threats and misconfiguration, and achieve compliance in the cloudBook DescriptionSecuring resources in the cloud is challenging, given that each provider has different mechanisms and processes. Cloud Security Handbook helps you to understand how to embed security best practices in each of the infrastructure building blocks that exist in public clouds.This book will enable information security and cloud engineers to recognize the risks involved in public cloud and find out how to implement security controls as they design, build, and maintain environments in the cloud. You'll begin by learning about the shared responsibility model, cloud service models, and cloud deployment models, before getting to grips with the fundamentals of compute, storage, networking, identity management, encryption, and more. Next, you'll explore common threats and discover how to stay in compliance in cloud environments. As you make progress, you'll implement security in small-scale cloud environments through to production-ready large-scale environments, including hybrid clouds and multi-cloud environments. This book not only focuses on cloud services in general, but it also provides actual examples for using AWS, Azure, and GCP built-in services and capabilities.By the end of this cloud security book, you'll have gained a solid understanding of how to implement security in cloud environments effectively.What you will learnSecure compute, storage, and networking services in the cloudGet to grips with identity management in the cloudAudit and monitor cloud services from a security point of viewIdentify common threats and implement encryption solutions in cloud servicesMaintain security and compliance in the cloudImplement security in hybrid and multi-cloud environmentsDesign and maintain security in a large-scale cloud environmentWho this book is forThis book is for IT or information security personnel taking their first steps in the public cloud or migrating existing environments to the cloud. Cloud engineers, cloud architects, or cloud security professionals maintaining production environments in the cloud will also benefit from this book. Prior experience of deploying virtual machines, using storage services, and networking will help you to get the most out of this book.
Architect, engineer, integrate, and implement security across increasingly complex, hybrid enterprise networksKey FeaturesLearn how to apply industry best practices and earn the CASP+ certificationExplore over 400 CASP+ questions to test your understanding of key concepts and help you prepare for the examDiscover over 300 illustrations and diagrams that will assist you in understanding advanced CASP+ conceptsBook DescriptionCompTIA Advanced Security Practitioner (CASP+) ensures that security practitioners stay on top of the ever-changing security landscape. The CompTIA CASP+ CAS-004 Certification Guide offers complete, up-to-date coverage of the CompTIA CAS-004 exam so you can take it with confidence, fully equipped to pass on the first attempt.Written in a clear, succinct way with self-assessment questions, exam tips, and mock exams with detailed explanations, this book covers security architecture, security operations, security engineering, cryptography, governance, risk, and compliance. You'll begin by developing the skills to architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise. Moving on, you'll discover how to monitor and detect security incidents, implement incident response, and use automation to proactively support ongoing security operations. The book also shows you how to apply security practices in the cloud, on-premises, to endpoints, and to mobile infrastructure. Finally, you'll understand the impact of governance, risk, and compliance requirements throughout the enterprise.By the end of this CASP study guide, you'll have covered everything you need to pass the CompTIA CASP+ CAS-004 certification exam and have a handy reference guide.What you will learnUnderstand Cloud Security Alliance (CSA) and the FedRAMP programsRespond to Advanced Persistent Threats (APT) by deploying hunt teamsUnderstand the Cyber Kill Chain framework as well as MITRE ATT&CK and Diamond ModelsDeploy advanced cryptographic solutions using the latest FIPS standardsUnderstand compliance requirements for GDPR, PCI, DSS, and COPPASecure Internet of Things (IoT), Industrial control systems (ICS), and SCADAPlan for incident response and digital forensics using advanced toolsWho this book is forThis CompTIA book is for CASP+ CAS-004 exam candidates who want to achieve CASP+ certification to advance their career. Security architects, senior security engineers, SOC managers, security analysts, IT cybersecurity specialists/INFOSEC specialists, and cyber risk analysts will benefit from this book. Experience in an IT technical role or CompTIA Security+ certification or equivalent is assumed.
This is a practical certification guide covering all the exam topics in an easy-to-follow manner backed with self-assessment scenarios for better preparation. Key Features A step-by-step guide to give you a clear understanding of the Network+ Certification Learn about network architecture, protocols, security, and network troubleshooting Confidently ace the N10-007 exam with the help of practice tests Book Description CompTIA certified professionals have always had the upper hand in the information technology industry. This book will be your ideal guide to efficiently passing and achieving this certification. Learn from industry experts and implement their practices to resolve complex IT issues. This book revolves around networking concepts where readers will learn topics like network architecture, security, network monitoring, and troubleshooting. This book will not only prepare the readers conceptually but will also help them pass the N10-007 exam. This guide will also provide practice exercise after every chapter where readers can ensure their concepts are clear. By the end of this book, readers will leverage this guide and the included practice questions to boost their confidence in appearing for the actual certificate. What you will learn Explain the purpose of a variety of networking concepts and implement them appropriately Understand physical security and common attacks while securing wired and wireless networks Understand the fundamentals of IPv4 and IPv6 Determine and explain the appropriate cabling, device, and storage technologies Understand network troubleshooting methodology and appropriate tools to support connectivity and performance Use best practices to manage the network, determine policies, and ensure business continuity Who this book is for This book is ideal for readers wanting to pass the CompTIA Network+ certificate. Rookie network engineers and system administrators interested in enhancing their networking skills would also benefit from this book. No Prior knowledge on networking would be needed.
Understand the nitty-gritty of Cybersecurity with ease Key Features Align your security knowledge with industry leading concepts and tools Acquire required skills and certifications to survive the ever changing market needs Learn from industry experts to analyse, implement, and maintain a robust environment Book Description It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field. What you will learn Get an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you best Plan your transition into cybersecurity in an efficient and effective way Learn how to build upon your existing skills and experience in order to prepare for your career in cybersecurity Who this book is for This book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful.