Sale!
CISCO | Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer by Pearson (Paperback) | Released: 30-Nov-18
By: Lakhani Joseph, Muniz;Aamir (Author) Publisher: Pearson Education22.00% Off Original price was: 950.00$.741.00$Current price is: 741.00$.
You save 209.00$
Breach detection is one of the hottest topics in Cyber Security. As more devices become Internet capable, more systems become targets. This in turn increases the need for digital defences meaning the intended audience will continue to grow and expand across all business sectors. This book is a guide for... Read More
In stock
Ships within 1-2 Business Days
100% Orginal Books
Easy Replacement
Certified product
Secure Checkout
On time delivery
Author:
Lakhani Joseph, Muniz;Aamir
Publisher Name:
Pearson Education
Language:
English
Binding:
(Paperback)
About The Book
Breach detection is one of the hottest topics in Cyber Security. As more devices become Internet capable, more systems become targets. This in turn increases the need for digital defences meaning the intended audience will continue to grow and expand across all business sectors. This book is a guide for various levels of technical competencies. Business minded people and executives would benefit from the incident response and policy content. Network administrators will benefit from the breach detection best practices content. Security experts will benefit from the technical forensics tools and exercises. Unlike the very few books on this topic, This book will be developed as a guide that can be easily applied to any organization’s business practice. This book will help administrators 1) Understand how to identify when they are compromised. 2) Improve their network security 3) Develop a incident response plan 4) Maximize security capabilities in existing investments 5) Learn how to use critical digital forensics tools 6) Understand best practices for digital forensics. Table of Contents:
Chapter 1 Digital forensics
Chapter 2 cybercrime and defences
Chapter 3 Building a digital forensics lab
Chapter 4 responding to a breach
Chapter 5 investigations
Chapter 6 collecting and preserving evidence
Chapter 7 endpoint forensics
Chapter 8 Network forensics
Chapter 9 mobile forensics
Chapter 10 email and social media
Chapter 11 Cisco forensic capabilities
Chapter 12 forensic case studies
Chapter 13 forensic tools.