Read more
Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today's evolving threat landscape.
List of contents
11. Chapter 1: Networking for Cyber Professionals
Learn about the basics of networking, protocols, ports from Cybersecurity perspectives.
12. Chapter 2: Deciphering Data Streams: Network Traffic Analysis
Master the art of network traffic analysis using industry-standard tools to identify suspicious network activity and potential data breaches.
13. Chapter 3: Open-Source Intelligence: Harnessing Intelligence from Digital space
Discover the power of OSINT and learn to unveil digital footprints.
14. Chapter 4: Hands-on OSINT Investigations
Conduct real-world OSINT investigations, harnessing social media, web, and publicly available sources for gathering valuable intelligence.
15. Chapter 5: Securing of Smart Interconnected Devices
Explore the unique challenges of securing smart devices and internet-connected devices (IoT).
16. Chapter 6: Ethical Hacking of Smart IoT Devices
Perform penetration testing of Smart interconnected ecosystems to expose and exploit vulnerabilities.
17. Chapter 7: Into the Shadows: Theory of Dark Web Investigations
Go beyond the surface web and delve into the hidden online world of the dark web.
18. Chapter 8: Hands-on Dark Web Investigations
Learn safe exploration techniques to gather intelligence from hidden forums and marketplaces to stay ahead of potential threats.
19. Chapter 9: Exploit the Gaps: Theory of Ethical Exploitation and Reporting
Master the art of Ethical Hacking during penetration testing. Learn to document your findings.
20. Chapter 10: Hands-on Exploitation of OS & Apps
Master the art of exploiting vulnerabilities ethically during pen testing. Write compelling penetration testing reports that provide actionable insights for remediation.
About the author
Dr. Akashdeep Bhardwaj is working as Professor and Head of Cybersecurity (Center of Excellence) at University of Petroleum & Energy Studies (UPES), Dehradun, India. An eminent IT Industry expert with over 28 years of experience in areas such as Cybersecurity, Digital Forensics and IT Operations, Dr. Akashdeep mentors' Cyber graduates, masters and doctoral students and leads industry projects and research in his university.
Dr. Akashdeep is a Post-Doctoral from Majmaah University, Saudi Arabia, and a Ph.D. in Computer Science. Dr. Akashdeep has published over 135 research works (including copyrights, patents, research papers, authored & edited books) in highly referred international journals. Dr. Akashdeep has worked as Technology Leader for several multinational organizations during his time in the IT industry. Dr. Akashdeep is certified in IT, Cybersecurity and Digital Forensics technologies including Compliance Audits, Networking Cybersecurity, Digital Forensics and holds multiple industry certifications.