Preaload Image
Back

Certified Cybercop – Blue Team

What you'll learn

  • CHAPTER 1-Blue Team Methodology
  • CHAPTER 2-Intro to Linux
  • CHAPTER 3-Identity and Access (IAM)
  • CHAPTER 4-Vulnerability Scanning
  • CHAPTER 5-Linux Firewalls
  • CHAPTER 6-Security Information and Event Management (SIEM)
  • CHAPTER 7-Incident Response Toolkit
  • CHAPTER 8-Digital Forensics
  • CHAPTER 9-SOAR – Security Orchestration Automation Response
  • CHAPTER 10-Policies to Mitigate Risk
  • CHAPTER 11-Software Development Life Cycle (SDLC)
  • CHAPTER 12-Setting Localization Options
  • CHAPTER 13-Sifting through Services
  • CHAPTER 14-Threat and Vulnerability Management
  • CHAPTER 15-Cryptography and PKI
  • CHAPTER 16-Package Management and Repositories
  • CHAPTER 17-Mobile Device Hacking
  • CHAPTER 18-Kali Linux Bash Scripting
  • CHAPTER 19-Recruiting Blue Team Members

Certified Cybercop – Blue Team kindle version (preview)

Certified Cybercop – Blue Team e-Book

Certified Cybercop – Blue Team Text book