Defensive Cybersecurity Fundamentals | O’Reilly


Defensive Cybersecurity Fundamentals | O’Reilly
English | Size: 943.25 MB
Genre: eLearning

Everyone talks about the intrusion kill chain (sometimes called the “cyber kill chain”)—a model for actionable intelligence in which defenders align enterprise defensive capabilities to the specific processes an adversary might undertake to target that enterprise. However, much of what’s discussed publicly is misinformation and scare tactics.

Join expert Amanda Berlin to learn the most effective steps you can take to protect your organization from the vast majority of threats with defensive mitigation and monitoring. Through use cases such as ransomware, data exfiltration, and lateral movement, you’ll see how to improve the standard of defense at each level, then discover step-by-step what you can accurately cover using the kill chain by working through use cases that outline the specifics of attacks. You’ll also gain hands-on experience through tabletop exercises and drills to strengthen your understanding.

Much of what’s covered will be hands-on walk-throughs in a Microsoft Windows environment. Windows domains are the most popular target for attackers as they’re frequently the most insecurely configured.

What you’ll learn and how you can apply it
By the end of this course, you’ll understand:

Offensive and defensive tactics, techniques, and procedures surrounding three important use cases that constantly are a threat to enterprises
How to complete 10 or more specific configuration changes to increase the security against the use cases listed
And you’ll be able to:

Gather open source intelligence (OSINT), including names and emails that an attacker may be able to take advantage of
Navigate several built-in Windows tools, including Group Policy and AdsiEdit
Implement LAPS

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.