Introduction
Systems and application security
()
1. Malware
Comparing viruses, worms, and Trojans
()
Comparing adware, spyware, and ransomware
()
Understanding backdoors and logic bombs
()
Looking at advanced malware
()
Understanding botnets
()
2. Attack Types
Denial of service attacks
()
Eavesdropping attacks
()
Network attacks
()
Defending against password attacks
()
Watering hole attacks
()
Preventing insider threats
()
3. Social Engineering
Social engineering
()
Impersonation attacks
()
Physical social engineering
()
4. Host Security
Application management
()
Operating system security
()
Malware prevention
()
Host-based network security controls
()
5. Secure Coding Practices
Error and exception handling
()
Code repositories
()
Third-party code
()
Code signing
()
6. Mobile Security
Mobile device security
()
Mobile device management
()
Mobile device tracking
()
Mobile application security
()
Bring your own device (BYOD)
()
7. Virtualization Security
Virtualization
()
Virtualization security
()
Desktop and application virtualization
()
Physical and virtual appliances
()
Software-defined networking (SDN)
()
Port isolation
()
8. Cloud Security
Cloud computing models
()
Public cloud tiers
()
Cloud service models
()
Securing the cloud
()
Regulatory and privacy concerns in the cloud
()
9. Big Data Security
Big data security
()
Conclusion
What's next?
()