Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7

Plug the gaps in your network’s infrastructure with resilient network security models


Key Features:


Develop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement network enumeration with Nessus and Network Mapper (Nmap)


Book Description:


Digitization drives technology today, which is why it’s so important for organizations to design security mechanisms for their network infrastructures. Analyzing vulnerabilities is one of the best ways to secure your network infrastructure.


This Learning Path begins by introducing you to the various concepts of network security assessment, workflows, and architectures. You will learn to employ open source tools to perform both active and passive network scanning and use these results to analyze and design a threat model for network security. With a firm understanding of the basics, you will then explore how to use Nessus and Nmap to scan your network for vulnerabilities and open ports and gain back door entry into a network. As you progress through the chapters, you will gain insights into how to carry out various key scanning tasks, including firewall detection, OS detection, and access management to detect vulnerabilities in your network.


By the end of this Learning Path, you will be familiar with the tools you need for network scanning and techniques for vulnerability scanning and network protection.


This Learning Path includes content from the following Packt books:


Network Scanning Cookbook by Sairam JettyNetwork Vulnerability Assessment by Sagar Rahalkar


What you will learn:


Explore various standards and frameworks for vulnerability assessments and penetration testingGain insight into vulnerability scoring and reportingDiscover the importance of patching and security hardeningDevelop metrics to measure the success of a vulnerability management programPerform configuration audits for various platforms using NessusWrite custom Nessus and Nmap scripts on your ownInstall and configure Nmap and Nessus in your network infrastructurePerform host discovery to identify network devices


Who this book is for:


This Learning Path is designed for security analysts, threat analysts, and security professionals responsible for developing a network threat model for an organization. Professionals who want to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program will also find this Learning Path useful.


Sairam Jetty has more than 5 years of hands-on experience in many verticals of penetration testing, compliance, digital forensics, and malware research. He is currently working with Paladion Networks, Abu Dhabi, as a senior analyst and team lead. He has assisted and associated with various financial, telecom, and industrial institutions for testing and securing their applications and environments. Sairam has industry-standard certifications, such as OSCP, Digital Forensic Analyst, Digital Forensic Investigator, and Mobile Security Expert. He also specializes in source code review and mobile application security. He has acquired a great knowledge of SCADA/ICS and nuclear security from his corporate experience and self-learning. Sagar Rahalkar is a seasoned information security professional with an experience of 12 years in various verticals of IS. His domain expertise is in Cybercrime investigations, Forensics, AppSec, VA/PT, Compliance, IT GRC and so on. He has a master's degree in computer science and several certifications, including Cyber Crime Investigator, CEH, ECSA, ISO 27001 LA, IBM AppScan Certified, CISM, and PRINCE2. He has been associated with Indian law enforcement agencies for around 4 years for dealing with cybercrime investigations and related training. He has received several awards and appreciations from senior officials of the police and defense organizations in India. He has also been a reviewer and author for various books and online publications.

1131041889
Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7

Plug the gaps in your network’s infrastructure with resilient network security models


Key Features:


Develop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement network enumeration with Nessus and Network Mapper (Nmap)


Book Description:


Digitization drives technology today, which is why it’s so important for organizations to design security mechanisms for their network infrastructures. Analyzing vulnerabilities is one of the best ways to secure your network infrastructure.


This Learning Path begins by introducing you to the various concepts of network security assessment, workflows, and architectures. You will learn to employ open source tools to perform both active and passive network scanning and use these results to analyze and design a threat model for network security. With a firm understanding of the basics, you will then explore how to use Nessus and Nmap to scan your network for vulnerabilities and open ports and gain back door entry into a network. As you progress through the chapters, you will gain insights into how to carry out various key scanning tasks, including firewall detection, OS detection, and access management to detect vulnerabilities in your network.


By the end of this Learning Path, you will be familiar with the tools you need for network scanning and techniques for vulnerability scanning and network protection.


This Learning Path includes content from the following Packt books:


Network Scanning Cookbook by Sairam JettyNetwork Vulnerability Assessment by Sagar Rahalkar


What you will learn:


Explore various standards and frameworks for vulnerability assessments and penetration testingGain insight into vulnerability scoring and reportingDiscover the importance of patching and security hardeningDevelop metrics to measure the success of a vulnerability management programPerform configuration audits for various platforms using NessusWrite custom Nessus and Nmap scripts on your ownInstall and configure Nmap and Nessus in your network infrastructurePerform host discovery to identify network devices


Who this book is for:


This Learning Path is designed for security analysts, threat analysts, and security professionals responsible for developing a network threat model for an organization. Professionals who want to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program will also find this Learning Path useful.


Sairam Jetty has more than 5 years of hands-on experience in many verticals of penetration testing, compliance, digital forensics, and malware research. He is currently working with Paladion Networks, Abu Dhabi, as a senior analyst and team lead. He has assisted and associated with various financial, telecom, and industrial institutions for testing and securing their applications and environments. Sairam has industry-standard certifications, such as OSCP, Digital Forensic Analyst, Digital Forensic Investigator, and Mobile Security Expert. He also specializes in source code review and mobile application security. He has acquired a great knowledge of SCADA/ICS and nuclear security from his corporate experience and self-learning. Sagar Rahalkar is a seasoned information security professional with an experience of 12 years in various verticals of IS. His domain expertise is in Cybercrime investigations, Forensics, AppSec, VA/PT, Compliance, IT GRC and so on. He has a master's degree in computer science and several certifications, including Cyber Crime Investigator, CEH, ECSA, ISO 27001 LA, IBM AppScan Certified, CISM, and PRINCE2. He has been associated with Indian law enforcement agencies for around 4 years for dealing with cybercrime investigations and related training. He has received several awards and appreciations from senior officials of the police and defense organizations in India. He has also been a reviewer and author for various books and online publications.

26.49 In Stock
Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7

Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7

Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7

Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7

eBook

$26.49  $34.99 Save 24% Current price is $26.49, Original price is $34.99. You Save 24%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Plug the gaps in your network’s infrastructure with resilient network security models


Key Features:


Develop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement network enumeration with Nessus and Network Mapper (Nmap)


Book Description:


Digitization drives technology today, which is why it’s so important for organizations to design security mechanisms for their network infrastructures. Analyzing vulnerabilities is one of the best ways to secure your network infrastructure.


This Learning Path begins by introducing you to the various concepts of network security assessment, workflows, and architectures. You will learn to employ open source tools to perform both active and passive network scanning and use these results to analyze and design a threat model for network security. With a firm understanding of the basics, you will then explore how to use Nessus and Nmap to scan your network for vulnerabilities and open ports and gain back door entry into a network. As you progress through the chapters, you will gain insights into how to carry out various key scanning tasks, including firewall detection, OS detection, and access management to detect vulnerabilities in your network.


By the end of this Learning Path, you will be familiar with the tools you need for network scanning and techniques for vulnerability scanning and network protection.


This Learning Path includes content from the following Packt books:


Network Scanning Cookbook by Sairam JettyNetwork Vulnerability Assessment by Sagar Rahalkar


What you will learn:


Explore various standards and frameworks for vulnerability assessments and penetration testingGain insight into vulnerability scoring and reportingDiscover the importance of patching and security hardeningDevelop metrics to measure the success of a vulnerability management programPerform configuration audits for various platforms using NessusWrite custom Nessus and Nmap scripts on your ownInstall and configure Nmap and Nessus in your network infrastructurePerform host discovery to identify network devices


Who this book is for:


This Learning Path is designed for security analysts, threat analysts, and security professionals responsible for developing a network threat model for an organization. Professionals who want to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program will also find this Learning Path useful.


Sairam Jetty has more than 5 years of hands-on experience in many verticals of penetration testing, compliance, digital forensics, and malware research. He is currently working with Paladion Networks, Abu Dhabi, as a senior analyst and team lead. He has assisted and associated with various financial, telecom, and industrial institutions for testing and securing their applications and environments. Sairam has industry-standard certifications, such as OSCP, Digital Forensic Analyst, Digital Forensic Investigator, and Mobile Security Expert. He also specializes in source code review and mobile application security. He has acquired a great knowledge of SCADA/ICS and nuclear security from his corporate experience and self-learning. Sagar Rahalkar is a seasoned information security professional with an experience of 12 years in various verticals of IS. His domain expertise is in Cybercrime investigations, Forensics, AppSec, VA/PT, Compliance, IT GRC and so on. He has a master's degree in computer science and several certifications, including Cyber Crime Investigator, CEH, ECSA, ISO 27001 LA, IBM AppScan Certified, CISM, and PRINCE2. He has been associated with Indian law enforcement agencies for around 4 years for dealing with cybercrime investigations and related training. He has received several awards and appreciations from senior officials of the police and defense organizations in India. He has also been a reviewer and author for various books and online publications.


Product Details

ISBN-13: 9781838646974
Publisher: Packt Publishing
Publication date: 03/26/2019
Sold by: Barnes & Noble
Format: eBook
Pages: 538
File size: 40 MB
Note: This product may take a few minutes to download.

About the Author

Sairam Jetty has more than 5 years of hands-on experience in many verticals of penetration testing, compliance, digital forensics, and malware research. He is currently working with Paladion Networks, Abu Dhabi, as a senior analyst and team lead. He has assisted and associated with various financial, telecom, and industrial institutions for testing and securing their applications and environments. Sairam has industry-standard certifications, such as OSCP, Digital Forensic Analyst, Digital Forensic Investigator, and Mobile Security Expert. He also specializes in source code review and mobile application security. He has acquired a great knowledge of SCADA/ICS and nuclear security from his corporate experience and self-learning.



Sagar Rahalkar is a seasoned information security professional with an experience of 12 years in various verticals of IS. His domain expertise is in Cybercrime investigations, Forensics, AppSec, VA/PT, Compliance, IT GRC and so on. He has a master's degree in computer science and several certifications, including Cyber Crime Investigator, CEH, ECSA, ISO 27001 LA, IBM AppScan Certified, CISM, and PRINCE2. He has been associated with Indian law enforcement agencies for around 4 years for dealing with cybercrime investigations and related training. He has received several awards and appreciations from senior officials of the police and defense organizations in India. He has also been a reviewer and author for various books and online publications.

Table of Contents

Table of Contents
  1. Introduction to Network Vulnerability Scanning
  2. Understanding Network Scanning Tools
  3. Port Scanning
  4. Vulnerability Scanning
  5. Configuration Audits
  6. Report Analysis and Confirmation
  7. Understanding the Customization and Optimization of Nessus and Nmap
  8. Network Scanning for IoT, SCADA/ICS
  9. Vulnerability Management Governance
  10. Setting Up the Assessment Environment
  11. Security Assessment Prerequisites
  12. Information Gathering
  13. Enumeration and Vulnerability Assessment
  14. Gaining Network Access
  15. Assessing Web Application Security
  16. Privilege Escalation
  17. Maintaining Access and Clearing Tracks
  18. Vulnerability Scoring
  19. Threat Modeling
  20. Patching and Security Hardening
  21. Vulnerability Reporting and Metrics
From the B&N Reads Blog

Customer Reviews