Defense and Deception: Confuse and Frustrate the Hackers by Kevin Cardwell



*Price before tax (where applicable.)

Defense and Deception: Confuse and Frustrate the Hackers

Though we are offering this book as an additional resource for your cybersecurity library, the views, thoughts, and opinions expressed in the text belong solely to the author.

*Note: Ships to US and Canada ONLY!


About This Book

The reason I decided to write this book is to show that we have to rethink how we look at security. We continue to use the same methods and the threat continues to evolve and bypass it, so we need to understand we need a paradigm shift and this book is to help you with this shift. The book takes you from the essential and fundamentals of defense required to protect our modern networks to the advanced concepts of segmentation and isolation to mitigate the risk, then we introduce you to the methods of deploying deception decoys on the network. With this book, you will learn how to flip the model. For years, we have listened to the statement “the attackers are at the advantage, because they only have to find one way in and we cannot secure every way in.” This is true, but with the concepts covered in this book you can flip the model and turn the advantage to the defender, and as a result, you take control of your network! One packet is all we need to identify when they are within our network! We can control the path and route that the attackers pursue and simulate and present a replication of the required data within the sement while moving the real data to a safe location.

About the Author

Kevin Cardwell

Kevin Cardwell currently works as a freelance consultant and provides consulting services for companies all over the world. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman and developed the team to man the first Commercial Security Operations Center there. He has worked extensively with banks and financial institutions throughout the Middle East, Africa, Europe, and the UK. He currently provides consultancy services to commercial companies, governments, major banks, and financial institutions across the globe. He is the author of the book Backtrack – Testing Wireless Network Security, Packt Publishing.

Who This Book Is For

If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pentesting labs in varying industry scenarios, this is the book for you. This book is ideal if you want to build and enhance your existing pentesting methods and skills. Basic knowledge of network security features is expected along with web application testing experience.

What You Will Learn

  • Build routers, firewalls, and web servers to hone your pentesting skills
  • Deploy and then find the weaknesses in a firewall architecture
  • Construct a layered architecture and perform a systematic process and methodology to use for conducting an external test
  • Get introduced to several of the different security testing methodologies
  • Design monitored environments and evade them
  • Create complex architecture
  • Bypass antivirus and other protection
  • Practice methods of evasion against today’s top defenses
  • Leverage the client configuration