Denemek ALTIN - Özgür

Practical Network Security - First Edition 2018

filled-star
Practical Network Security

Magzter GOLD ile Sınırsız Olun

Okumak Practical Network Security sadece bir abonelikle 9.000'den fazla diğer dergi ve gazeteyle birlikte  

Kataloğu Görüntüle

1 Ay

$14.99

1 Yıl

$149.99

$12/month

(OR)

Yalnızca Practical Network Security dergisine abone olun

Bu sayıyı satın alın: First Edition 2018

undefined sayı First Edition 2018 tarihinden itibaren başlıyor

undefined sayı First Edition 2018 tarihinden itibaren başlıyor

Bu sayıyı satın al

$4.99

Please choose your subscription plan

İstediğiniz zaman iptal edebilirsiniz.

(Hiçbir Taahhüt Yok) ⓘ

Abonelikten memnun kalmazsanız, aboneliğin başlangıç tarihinden itibaren 7 gün içinde help@magzter.com adresine e-posta göndererek tam para iadesi alabilirsiniz. Soru sorulmaz - Söz veriyoruz! (Not: Tek sayı satın alımları için geçerli değildir)

Dijital Abonelik

Anında Erişim ⓘ

Magzter web sitesi, iOS, Android ve Amazon uygulamalarında anında okumaya başlamak için hemen abone olun.

Doğrulanmış Güvenli

ödeme ⓘ

Magzter, doğrulanmış bir Authorize.Net satıcısıdır. Daha Fazla Bilgi Edinin

Bu sayıda

First Edition 2018

Practical Network Security Description:

Prepare yourself for any type of audit and minimise security findings

Key Features

It follows a lifecycle approach to information security by understanding:

● Why we need Information security

● How we can implement

● How to operate securely and maintain a secure posture

● How to face audits

Description

This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies.

With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditor’s process and expectations.

What will you learn

● This book is solely focused on aspects of Information security that Network professionals (Network engineer, manager and trainee) need to deal with, for different types of Audits.

● Information Security Basics, security concepts in detail, threat

● Securing the Network focuses on network security design aspects and how policies influence network design decisions.

● Secure Operations is all about incorporating security in Network operations.

● Managing Audits is the real test.

Who this book is for

IT Heads, Network managers, Network planning engineers, Network Operation engineer or anybody interested in understanding holistic network security.

Table of Contents

1. Basics of Information Security

2. Threat Paradigm

3. Information Security Controls

4. Decoding Policies Standards Procedures & Guidelines

5. Network security design

6. Know your assets

7. Implementing Network Security

8. Secure Change Management

9. Vulnerability and Risk Management

10. Access Control

11. Capacity Management

12. Log Management

13. Network Monitoring

14. Information Security Audit

15. Technical Compliance Audit

16. Penetration Testing

About the Author

Neha Saxena is currently teaching at Symbiosis International (Deemed University) as guest faculty and working as a Freelance security consultant with various organizations.

She has previously worked with HP Singapore, Etihad airways Abu Dhabi, Quadrant Risk Management Dubai, Noor Islamic bank Dubai as Information security Officer (ISO), Senior Consultant and Team Lead. Her recently concluded projects include ISO27001 audit preparation for one of Dubai’s government subsidiary and Process Gap assessment at a Bank in Abu Dhabi.

During her tenure at various jobs she wore many hats including Pen Tester, Application security assessor, Security Trainer, ISO27001 Implementer etc. Later on she moved to leading Audit and Compliance team. Currently she enjoys the thrill of challenges posed by doing different type of security/ teaching assignments as well as flexibility of working as a Freelancer. She takes each project as an opportunity to learn new things, new environment and meet interesting people around the world.

She holds a Master’s degree in Computer Applications from Symbiosis International (Deemed University). She resides with her family in Pune, India currently. When not working she indulges herself in reading books, watching movies & paranormal/fantasy TV series, yoga and meditation.Prepare yourself for any type of audit and minimise security findings

Key Features

It follows a lifecycle approach to information security by understanding:

● Why we need Information security

● How we can implement

● How to operate securely and maintain a secure posture

● How to face audits

Description

This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies.

With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditor’s process and expectations.

What will you learn

● This book is solely focused on aspects of Information security that Network professionals (Network engineer, manager and trainee) need to deal with, for different types of Audits.

● Information Security Basics, security concepts in detail, threat

● Securing the Network focuses on network security design aspects and how policies influence network design decisions.

● Secure Operations is all about incorporating security in Network operations.

● Managing Audits is the real test.

Who this book is for

IT Heads, Network managers, Network planning engineers, Network Operation engineer or anybody interested in understanding holistic network security.

Table of Contents

1. Basics of Information Security

2. Threat Paradigm

3. Information Security Controls

4. Decoding Policies Standards Procedures & Guidelines

5. Network security design

6. Know your assets

7. Implementing Network Security

8. Secure Change Management

9. Vulnerability and Risk Management

10. Access Control

11. Capacity Management

12. Log Management

13. Network Monitoring

14. Information Security Audit

15. Technical Compliance Audit

16. Penetration Testing

About the Author

Neha Saxena is currently teaching at Symbiosis International (Deemed University) as guest faculty and working as a Freelance security consultant with various organizations.

She has previously worked with HP Singapore, Etihad airways Abu Dhabi, Quadrant Risk Management Dubai, Noor Islamic bank Dubai as Information security Officer (ISO), Senior Consultant and Team Lead. Her recently concluded projects include ISO27001 audit preparation for one of Dubai’s government subsidiary and Process Gap assessment at a Bank in Abu Dhabi.

During her tenure at various jobs she wore many hats including Pen Tester, Application security assessor, Security Trainer, ISO27001 Implementer etc. Later on she moved to leading Audit and Compliance team. Currently she enjoys the thrill of challenges posed by doing different type of security/ teaching assignments as well as flexibility of working as a Freelancer. She takes each project as an opportunity to learn new things, new environment and meet interesting people around the world.

She holds a Master’s degree in Computer Applications from Symbiosis International (Deemed University). She resides with her family in Pune, India currently. When not working she indulges herself in reading books, watching movies & paranormal/fantasy TV series, yoga and meditation.Prepare yourself for any type of audit and minimise security findings

Key Features

It follows a lifecycle approach to information security by understanding:

● Why we need Information security

● How we can implement

● How to operate securely and maintain a secure posture

● How to face audits

Description

This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies.

With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditor’s process and expectations.

What will you learn

● This book is solely focused on aspects of Information security that Network professionals (Network engineer, manager and trainee) need to deal with, for different types of Audits.

● Information Security Basics, security concepts in detail, threat

● Securing the Network focuses on network security design aspects and how policies influence network design decisions.

● Secure Operations is all about incorporating security in Network operations.

● Managing Audits is the real test.

Who this book is for

IT Heads, Network managers, Network planning engineers, Network Operation engineer or anybody interested in understanding holistic network security.

Table of Contents

1. Basics of Information Security

2. Threat Paradigm

3. Information Security Controls

4. Decoding Policies Standards Procedures & Guidelines

5. Network security design

6. Know your assets

7. Implementing Network Security

8. Secure Change Management

9. Vulnerability and Risk Management

10. Access Control

11. Capacity Management

12. Log Management

13. Network Monitoring

14. Information Security Audit

15. Technical Compliance Audit

16. Penetration Testing

About the Author

Neha Saxena is currently teaching at Symbiosis International (Deemed University) as guest faculty and working as a Freelance security consultant with various organizations.

She has previously worked with HP Singapore, Etihad airways Abu Dhabi, Quadrant Risk Management Dubai, Noor Islamic bank Dubai as Information security Officer (ISO), Senior Consultant and Team Lead. Her recently concluded projects include ISO27001 audit preparation for one of Dubai’s government subsidiary and Process Gap assessment at a Bank in Abu Dhabi.

During her tenure at various jobs she wore many hats including Pen Tester, Application security assessor, Security Trainer, ISO27001 Implementer etc. Later on she moved to leading Audit and Compliance team. Currently she enjoys the thrill of challenges posed by doing different type of security/ teaching assignments as well as flexibility of working as a Freelancer. She takes each project as an opportunity to learn new things, new environment and meet interesting people around the world.

She holds a Master’s degree in Computer Applications from Symbiosis International (Deemed University). She resides with her family in Pune, India currently. When not working she indulges herself in reading books, watching movies & paranormal/fantasy TV series, yoga and meditation.Prepare yourself for any type of audit and minimise security findings

Key Features

It follows a lifecycle approach to information security by understanding:

● Why we need Information security

● How we can implement

● How to operate securely and maintain a secure posture

● How to face audits

Description

This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies.

With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditor’s process and expectations.

What will you learn

● This book is solely focused on aspects of Information security that Network professionals (Network engineer, manager and trainee) need to deal with, for different types of Audits.

● Information Security Basics, security concepts in detail, threat

● Securing the Network focuses on network security design aspects and how policies influence network design decisions.

● Secure Operations is all about incorporating security in Network operations.

● Managing Audits is the real test.

Who this book is for

IT Heads, Network managers, Network planning engineers, Network Operation engineer or anybody interested in understanding holistic network security.

Table of Contents

1. Basics of Information Security

2. Threat Paradigm

3. Information Security Controls

4. Decoding Policies Standards Procedures & Guidelines

5. Network security design

6. Know your assets

7. Implementing Network Security

8. Secure Change Management

9. Vulnerability and Risk Management

10. Access Control

11. Capacity Management

12. Log Management

13. Network Monitoring

14. Information Security Audit

15. Technical Compliance Audit

16. Penetration Testing

About the Author

Neha Saxena is currently teaching at Symbiosis International (Deemed University) as guest faculty and working as a Freelance security consultant with various organizations.

She has previously worked with HP Singapore, Etihad airways Abu Dhabi, Quadrant Risk Management Dubai, Noor Islamic bank Dubai as Information security Officer (ISO), Senior Consultant and Team Lead. Her recently concluded projects include ISO27001 audit preparation for one of Dubai’s government subsidiary and Process Gap assessment at a Bank in Abu Dhabi.

During her tenure at various jobs she wore many hats including Pen Tester, Application security assessor, Security Trainer, ISO27001 Implementer etc. Later on she moved to leading Audit and Compliance team. Currently she enjoys the thrill of challenges posed by doing different type of security/ teaching assignments as well as flexibility of working as a Freelancer. She takes each project as an opportunity to learn new things, new environment and meet interesting people around the world.

She holds a Master’s degree in Computer Applications from Symbiosis International (Deemed University). She resides with her family in Pune, India currently. When not working she indulges herself in reading books, watching movies & paranormal/fantasy TV series, yoga and meditation.

İlgili Başlıklar

Popüler Kategoriler