Sale!

CISCO | Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer by Pearson (Paperback)  | Released: 30-Nov-18

By: Lakhani Joseph, Muniz;Aamir (Author)   Publisher: Pearson Education

22.00% Off Original price was: 950.00$.Current price is: 741.00$.

You save 209.00$
Breach detection is one of the hottest topics in Cyber Security. As more devices become Internet capable, more systems become targets. This in turn increases the need for digital defences meaning the intended audience will continue to grow and expand across all business sectors. This book is a guide for... Read More

In stock

Buy Now
Ships within 1-2 Business Days

100% Orginal Books

Easy Replacement

Certified product

Secure Checkout

On time delivery

Author:

Lakhani Joseph, Muniz;Aamir

Publisher Name:

Pearson Education

Language:

English

Binding:

(Paperback)

About The Book
Breach detection is one of the hottest topics in Cyber Security. As more devices become Internet capable, more systems become targets. This in turn increases the need for digital defences meaning the intended audience will continue to grow and expand across all business sectors. This book is a guide for various levels of technical competencies. Business minded people and executives would benefit from the incident response and policy content. Network administrators will benefit from the breach detection best practices content. Security experts will benefit from the technical forensics tools and exercises. Unlike the very few books on this topic, This book will be developed as a guide that can be easily applied to any organization’s business practice. This book will help administrators 1) Understand how to identify when they are compromised. 2) Improve their network security 3) Develop a incident response plan 4) Maximize security capabilities in existing investments 5) Learn how to use critical digital forensics tools 6) Understand best practices for digital forensics. Table of Contents: Chapter 1 Digital forensics Chapter 2 cybercrime and defences Chapter 3 Building a digital forensics lab Chapter 4 responding to a breach Chapter 5 investigations Chapter 6 collecting and preserving evidence Chapter 7 endpoint forensics Chapter 8 Network forensics Chapter 9 mobile forensics Chapter 10 email and social media Chapter 11 Cisco forensic capabilities Chapter 12 forensic case studies Chapter 13 forensic tools.