£58.19

Packt Publishing Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition

Price data last checked 23 day(s) ago - will refresh soon

View at Amazon

Price History & Forecast

Last 68 days • 68 data points (No recent data available)

Historical
Generating forecast...
£58.19 £58.07 £58.10 £58.12 £58.15 £58.17 £58.20 25 January 2026 10 February 2026 27 February 2026 16 March 2026 02 April 2026

Price Distribution

Price distribution over 68 days • 1 price levels

Days at Price
68 days 0 17 34 51 68 £58 Days at Price

Price Analysis

Most common price: £58 (68 days, 100.0%)

Price range: £58 - £58

Price levels: 1 different prices over 68 days

Description

Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more Book Description Cybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack - the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system. This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system. What you will learn The importance of having a solid foundation for your security posture Use cyber security kill chain to understand the attack strategy Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails Perform an incident investigation using Azure Security Center and Azure Sentinel Get an in-depth understanding of the disaster recovery process Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure Who this book is for For the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial. Table of Contents Security Posture Incident Response Process What is a Cyber Strategy? Understanding the Cybersecurity Kill Chain Reconnaissance Compromising the System Chasing a User's Identity Lateral Movement Privilege Escalation Security Policy Network Segmentation Active Sensors Threat Intelligence Investigating an Incident Recovery Process Vulnerability Management Log Analysis

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
31 December 2019
Listed Since
21 November 2019

Barcode

No barcode data available

Similar Products You Might Like

Mastering Cybersecurity: Strategies, Technologies, and Best Practices
95% match

Mastering Cybersecurity: Strategies, Technologies, and Best Practices

Apress

£41.38 29 Jan 2026
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity
95% match

Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity

Packt Publishing

£31.31 28 Jan 2026
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources
95% match

Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources

Apress

£44.80 16 Feb 2026
Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition
95% match

Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition

Apress

£40.89 30 Jan 2026
Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles
94% match

Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles

Packt Publishing

£39.80 06 Jan 2026
Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture
94% match

Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture

Packt Publishing

£44.99 19 Apr 2026
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
94% match

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

Apress

£43.64 16 Feb 2026
Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects
94% match

Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects

Packt Publishing

£43.35 07 Jan 2026
Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
94% match

Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs

Packt Publishing

£44.99 12 Jan 2026
Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks, 2nd Edition
94% match

Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks, 2nd Edition

Packt Publishing

£38.99 07 Mar 2026
Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner
94% match

Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner

Apress

£38.58 09 Feb 2026
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
94% match

Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict

Packt Publishing

£41.99 15 Feb 2026
Securing Networks Through Penetration Testing: A Practical Guide
94% match

Securing Networks Through Penetration Testing: A Practical Guide

£43.61 15 Feb 2026
Cyber Security Essentials
94% match

Cyber Security Essentials

CRC Press

£62.55 25 Feb 2026
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
94% match

Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Apress

£49.45 12 Dec 2025
Advanced Cybersecurity Technologies
94% match

Advanced Cybersecurity Technologies

CRC Press

£46.23 17 Feb 2026
Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
94% match

Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture

Packt Publishing

£41.99 30 Jan 2026
Cyber-Security Threats, Actors, and Dynamic Mitigation
94% match

Cyber-Security Threats, Actors, and Dynamic Mitigation

CRC Press

£99.00 11 Apr 2026
Industrial Cybersecurity: Efficiently secure critical infrastructure systems
94% match

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Packt Publishing

£41.64 11 Jan 2026
Mastering Identity and Access Management with Microsoft Azure: Empower users by managing and protecting identities and data, 2nd Edition
94% match

Mastering Identity and Access Management with Microsoft Azure: Empower users by managing and protecting identities and data, 2nd Edition

Packt Publishing

£46.99 06 Mar 2026
A Day in the Life of a CISO: Personal Mentorship from 24+ Battle-Tested CISOs — Mentoring We Never Got
93% match

A Day in the Life of a CISO: Personal Mentorship from 24+ Battle-Tested CISOs — Mentoring We Never Got

Packt Publishing

£44.99 08 Jan 2026
Security in Computing
93% match

Security in Computing

PEARSON EDUCATION

£77.93 16 Mar 2026
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
93% match

Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

£59.06 07 Jan 2026
Cyber Strategy: Risk-Driven Security and Resiliency
93% match

Cyber Strategy: Risk-Driven Security and Resiliency

CRC Press

£102.58 09 Mar 2026