Mastering Cybersecurity
eBook - ePub

Mastering Cybersecurity

A Practical Guide to Cyber Tools and Techniques (Volume 2)

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Mastering Cybersecurity

A Practical Guide to Cyber Tools and Techniques (Volume 2)

About this book

Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today's evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises.

This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations. As the world becomes increasingly interconnected, this book dedicates several chapters to the Internet of Things (IoT), uncovering its vulnerabilities and showcasing threat surface attack assessments through real device testing and threat mapping frameworks. Readers learn to analyze device security and apply countermeasures such as secure boot, blockchain integration, and anomaly detection.

The volume also delves into the dark web, shedding light on anonymous networks like TOR and I2P and equipping readers with methods to investigate hidden services safely. It explains how to extract intelligence using automation, analyze illicit activity, and integrate findings into broader cybersecurity frameworks. Culminating with advanced cyber threat intelligence (CTI), this book examines intelligence cycles, tools, and platforms, enabling readers to move from theory to practice. From indicator of compromise analysis and threat actor profiling to automation and incident response, readers gain the skills to leverage CTI for strategic defense.

Designed for cybersecurity students, professionals, and enthusiasts, this book offers a balanced blend of technical depth, ethical awareness, and actionable guidance. By the end, readers will not only understand key cybersecurity domains but also be prepared to apply their knowledge in practical, high-stakes environments, making them valuable assets in the fight against cyber threats.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Mastering Cybersecurity by Akashdeep Bhardwaj in PDF and/or ePUB format, as well as other popular books in Computer Science & Architecture General. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Table of Contents
  6. Foreword
  7. Preface
  8. Author Biography
  9. 1 Deciphering network packets for cyber professionals
  10. 2 Network attacks decoded
  11. 3 Open-source intelligence: Harnessing intelligence from digital space
  12. 4 Hands-on OSINT investigations
  13. 5 Securing smart interconnected devices
  14. 6 Ethical hacking of smart IoT devices
  15. 7 Into the shadows of dark web investigations
  16. 8 Hands-on dark web investigations
  17. 9 Hunting the unknown: Unveil threats with cyber threat intelligence
  18. 10 Practical cyber threat intelligence