Cybersecurity is dynamic and multifaceted. The more you learn about the industry, the more you realize there is so much more out there to learn. This book will take a simple and strategic look at best practices and readily available tools that are available to both cybersecurity management and hands-on professionals - whether they be new to the industry or simply looking to gain expertise. Important topics include assessment, configuration, protection and defense strategies, and remediation and offensive measures.
In this book the reader will learn how to use and the right uses for ping, tracert, PuTTY, pathping, sysinternals, NMAP, OpenVAS, HIDS, PacketFence, WireShark, OpenIAM, BareTail, and much more.