bOOKS

PRACTICAL TRAINING

CYBER SECURITY

The book Cyber Security is for anyone interested in the world of information security and wants to learn the secrets of the profession. The uniqueness of this book is an emphasis on practice, which brings the reader to a high level of knowledge, with maximum experience.

TIER 1

TIER 1 is an essential course that covers main topics from the cyber world and allows the participants to get a quick view of the complex world of digital crimes. 

LINUX OPERATIONS

Linux Operations book is designed for experienced computer users who have limited or no previous exposure to Linux, whether they are working in an individual or Enterprise environment.

NETWORK RESEARCH

The Network Research book aims to address cyber challenges experienced on the network level. It will cover various attack techniques and how to defend them. 

SIEM/SOC INTERMEDIATE

Those responsible for the initial triage of an incident are the SOC analysts and incident responders; This book covers the necessary skills and practices to train such SOC personnel and successfully operate a modern-day SOC. 

SIEM/SOC ADVANCED

This SOC Operation book is designed for SOC organizations implementing a SOC solution and provides full guidance on the necessary skills and procedures to operate it.

WINDOWS FORENSICS

The Windows Forensics book is for private investigators and enforcement agencies. This book offers a wide range of tools and techniques to access information found on Windows systems.

PENETRATION TESTING

The book Penetration Testing contains intrusion techniques for computer systems, applications, and networking equipment. This book is for people with knowledge of networks, virtual systems, and information security.

NETWORK SECURITY

Network Security book is to discover security vulnerabilities across the entire network by using network hacking techniques and vulnerability scanning. The book explains various types of firewalls for hardening security for both Windows and Linux servers.

WINDOWS FORENSICS

The Windows Forensics book is for private investigators and enforcement agencies. This book offers a wide range of tools and techniques to access information found on Windows systems.

MALWARE ANALYSIS

The Malware Analysis book explains the fundamentals of the C and Assembly languages, which is crucial to understand all the processes that are running behind the scenes.

REVERSE ENGINEERING

Reverse Engineering is a technique used to analyze software to identify and understand its components and its flows. It is a process of understanding code infringement processes and analyzing software weaknesses.

מבוא לאבטחת מידע

הספר, מבוא לאבטחת מידע, מיועד לכל מי שמתעניין בעולם אבטחת המידע ורוצה ללמוד את בסיסי המקצוע. ייחודו של ספר זה הוא דגש על תרגול, שיביא את הקורא לרמת ידע גבוהה בתחום, עם ניסיון מעשי מקסימאלי.

ניתוח נוזקות

ספר חקירת נוזקות נועד ללמידה וניתוח מתקדם של נוזקות בסביבת ויינדוס ולינוקס, הלמידה מבוצעת בצורה דינמית וסטטית בשילוב של כלים מעודכנים.

NETWORK FORENSICS

Network forensics training is about the analysis of network traffic to identify intrusions or anomalous activity.

בדיקות חדירות

ספר מבחני חדירה, הוא ספר ייחודי ומעמיק המתמקד בתרגול של בוחני חדירה מיומנים (PT) וידע רחב במציאת חולשות באבטחת הארגון. במסגרת ספר זה, התלמידים ירכשו יכולות לזיהוי חולשות ברמה האפליקטיבית והתשתית בארגון ואיסוף מידע פסיבי ואקטיבי.

OSINT & THREAT INTEL

Threat Intelligence and OSINT training teach to collect, analyze, and apply targeted cyber intelligence to defensive operations in order to proactively act on sophisticated cyber-attacks.

CRYPTOGRAPHY

Cryptography is an indispensable tool for protecting information in computer systems. In this book, you will learn the inner workings of cryptographic systems and how to use them in real-world applications correctly.

© 2020 by ThinkCyber

THE 2020

CYBERIUM