Information leakage is a major security concern and it’s of utmost importance that organizations protect their data from prying eyes. This 50+ page resource is a comprehensive guide for Data Loss Prevention (DLP) that dives deep into a wide array of data loss scenarios. This hands on resource is a great way to learn more about DLP or brush up on your skills if you’re already a vet. Regardless of your motive, it’s a great resource to have on-hand.
This book is not for the casual reader. It is intended to dive deep into security and provide a foundation for building a security program and supporting controls framework. It assumes a basic knowledge of networking and systems. Security managers, security analysts, security engineers, security consultants, and IS auditors will find this book a useful addition to their reference libraries. Each chapter is useful as a standalone reference for the topic it addresses.
62 Page eBook
w3af (Web Application audit and attack framework) is a framework for auditing and exploitation of web applications. In this series of articles we will be looking at almost all the features that w3af has to offer and discuss how to use them for Web application Penetration testing. In the first part of this series we will be working with w3af console and getting ourselves familiar with the commands. We will also be looking at the different types of plugins that w3af has to offer and discuss how to use them for optimal performance.
47 Page Ebook
Backtrack is one of the most popular Linux distributions used for Penetration testing and Security Auditing. The Backtrack development team is sponsored by Offensive Security. On 13th August 2012, Backtrack 5 R3 was released. This included the addition of about 60 new tools, most of which were released during the Defcon and Blackhat conference held in Las Vegas in July 2012. In this series of articles, we will look at most of the new tools that were introduced with Backtrack 5 R3 and look at their usage. Some of the notable changes included tools for mobile penetration testing, GUI tools for Wi-fi cracking and a whole new category of tools called Physical Exploitation.
Over the course of the this 45-Page eBook, we’ll take a look at each one of the domains; give you some insight into what (ISC)² is looking for in that area; give you some supplemental reading material; and by the time we’re done, you should have the foundation of the information you’ll need to pass the CISSP exam as well as to succeed in your security professional career. You will go into your CISSP boot camp well-prepared and come out with your certification!
This Internet Underground short ebook covers the basics of anonymity, hactivism, & hidden parts of the Internet underground, along with some of the things you may find there. Many are still unaware what is available through the Tor network; from assassination hit lists to illegal drug dealing to weapons trade, you can still find it there. This is the beginning PDF and part of the free Introduction to IT Security and Computer Forensics MiniCourse.