Python for Cybersecurity: Using Python for Cyber Offense and Defense

  • 2h 51m
  • Howard E. Poston
  • John Wiley & Sons (US)
  • 2022

Discover an up-to-date and authoritative exploration of Python cybersecurity strategies

Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today.

Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including:

  • Reconnaissance, resource development, initial access, and execution
  • Persistence, privilege escalation, defense evasion, and credential access
  • Discovery, lateral movement, collection, and command and control
  • Exfiltration and impact

Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.

About the Author

HOWARD POSTON (Dayton, OH) is a freelance consultant and content creator with a focus on blockchain and cybersecurity. Howard has over a decade of experience in programming with Python, and it is his preferred language for scripting and coding for cybersecurity. He has developed and taught over a dozen courses exploring and explaining various aspects of cybersecurity and has written hundreds of articles on the subject on different outlets. Howard is also the author of several academic articles on security topics and has spoken on blockchain and cybersecurity at international security conferences.

In this Book

  • Introduction
  • Fulfilling Pre-ATT&CK Objectives
  • Gaining Initial Access
  • Achieving Code Execution
  • Maintaining Persistence
  • Performing Privilege Escalation
  • Evading Defenses
  • Accessing Credentials
  • Performing Discovery
  • Moving Laterally
  • Collecting Intelligence
  • Implementing Command and Control
  • Exfiltrating Data
  • Achieving Impact
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 63 users Rating 4.6 of 63 users (63)
Rating 5.0 of 5 users Rating 5.0 of 5 users (5)