Inside Network Security Assessment
Guarding Your IT Infrastructure
Michael Gregg, David Kim - Collection One-Off
Résumé
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the International Information Systems Security Certification Consortium, this book was developed with the goal of being a text for the CISSP continuing education class on Network Security Assessment. You will be provided with step-by-step training on assessing security, from paperwork to penetration testing to ethical hacking. The supporting website will also provide you with access to a variety of tools, checklists, and templates to make your job even easier. You'll save everyone time and money by learning to perform security assessments yourself with the help of Inside Network Security Assessment.
L'auteur - Michael Gregg
Michael Gregg is the president of Superior Solutions, Inc., a Houston-based security assessment and training firm. He has more than 20 years of experience in the IT field. He holds two associate's degrees, a bachelor's degree, and a master's degree. Some of the certifications he maintains include the following: CISSP, MCSE, CCNA, CTT+, A+, N+, Security+, CIW Security Analyst, CEH, NSA IAM, SCNP, DCNP, CCE, and TICSA.
He has consulted and taught for many Fortune 500 companies. Although consulting consumes the bulk of Michael's time, he enjoys teaching. Michael has a proven reputation as a both dynamic and influential speaker. His delivery style is considered energetic and entertaining, yet insightful. Teaching and contributing to the written body of IT security knowledge is how Michael believes he can give something back to the community that has given him so much.
He is a member of the American College of Forensic Examiners and of the Texas Association for Educational Technology. When not working, Michael enjoys traveling and restoring muscle cars.
L'auteur - David Kim
David Kim, President of Security Evolutions, Inc, specializes in IT security consulting, training, and courseware development. He is also the COO of the IISSCC and is responsible for the content and product development for the CISSP and SSCP certification credentials and training materials.
Sommaire
- Introduction
- Introduction to Assessing Network Vulnerabilities
- Foundations and Principles of Security
- Why Risk Assessment
- Risk-Assessment Methodologies
- Scoping the Project
- Understanding the Attacker
- Performing the Assessment
- Tools Used for Assessments and Evaluations
- Preparing the Final Report
- Post-Assessment Activities
- A: Security Assessment Resources
- B: Security Assessment Forms
- C: Security Assessment Sample Report
- D: Dealing with Consultants and Outside Vendors
- E: SIRT Team Report Format Template
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Sams |
Auteur(s) | Michael Gregg, David Kim |
Collection | One-Off |
Parution | 15/12/2005 |
Nb. de pages | 292 |
Format | 17,5 x 23 |
Couverture | Broché |
Poids | 512g |
Intérieur | Noir et Blanc |
EAN13 | 9780672328091 |
ISBN13 | 978-0-672-32809-1 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet