Publisher's Synopsis
Don't waste time and join this exciting journey into the world of Cybersecurity right now, as it will provide you with crucial knowledge for the challenges faced in scenarios of digital attacks against servers!
The content of this book is aimed at anyone interested in Hacking, Information Security, people who work or want to enter the area, enthusiasts and technology professionals in general. An exciting read that will explore topics related to technology and information security, from the basics to the advanced, in order to level the knowledge of the entire target audience, with content related to attacks and techniques used to exploit vulnerabilities and their respective mitigations, and also explore good practices for prevention and Hardening on servers. The book has 189 pages, filled with theory and practice (where we will carry out attack and defense labs) to help the reader to fix the concepts. It is divided into the following chapters: Introduction - A Little About My Story - Chapter 1I will tell the behind the scenes of my trajectory, the challenges I faced in detail, a peculiar, motivational and interesting story, it is worth checking out The Age of Technology - Chapter 2 and Basic Concepts of Technology: Networks and Linux - Chapter 3
We will do a great immersion in the entire age of technology and knowledge that will serve as a basis for learning Information Security Concepts - Chapter 4
We will delve into the bases and pillars of Information Security Hands-on Preparing the Environment - Chapter 5
Yes my friends, we will have many practical labs with hands-on, to get away from theory a little bit Offensive Security Performing Attacks and Defenses - Chapter 6
I will show step-by-step details of attacks (in a security approach offensive) and also in a practical way how to protect servers, including scenarios in Windows and Linux Protection and Hardening - Chapter 7
This is the part where I bring several techniques, good Hardening practices to help you protect and shield your servers against invasions Raising Awareness for Everyone - Chapter 8
In this chapter I address the cultural challenges faced in information security, strategies, methodologies, concepts and techniques that can help you Closing and Conclusion - Chapter 9
About the Author I hope you enjoy the content and enjoy learning about the topics presented here!