Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line
E**R
Great introduction to using bash for network security tasks
I would highly recommend this book to anyone who works in computer networks or computer security but also to computer students. Each topic starts with a gentle and general introduction which then leads to in-depth examples that could be game changing to anyone getting started in these areas, as well as potentially very useful to experienced users.Computer network and security work often means operating remotely on systems and other situations that don't have a convenient GUI. Doing work on working systems, such as servers in operation, means specialized tools may be unavailable. Installing such tools, even when possible, could cause serious problems. (Also, many such tools use require the same command line skills.) So the skills and techniques described in this book are extremely useful and marketable for everyone working in networked systems or security. With a little learning, the command line quickly becomes the the preferred way and bash is the right command line environment to get started. It's also a great way to get introduced to some of the fundamental day-to-day tasks of network security. Each chapter also comes with Workshop problems, perfect for filling out a repertoire of skills from those given and the accompanying online materials.I've been working on the command line for 30+ years and teaching it for 20+ but it still surprises me how much one can get out of it. This book shows how to start to get the most out of bash for security and what it teaches is applicable for many other kinds of computer work.One more thing: This valuable content is not only for those working with Linux/Unix type machines. There are many examples for Windows, including various ways to get a bash prompt in Windows, working with the Windows Registry, and other Windows-specific lessons. All extremely useful!
A**X
A great book to get into Cybersecurity
This book is very helpful for those who are starting out and want to learn about both how to attack and defend. Very helpful that you can follow along and do the same as what is mention in the book. Recommend this book for those who want to learn more and delve into cybersecurity or security in general.
A**R
An Awesome Deep Dive into bash
Caveat: I'm only about 2/3s of the way through, but definitely feel like I'm getting my money's worth.Pros:- clear and concise description of commands, not a lot of fluff- logical and well thought out introduction and progression of commands- examples and knowledge questions usually consist of tasks that are actually interesting\useful. For example there's a knowledge question to create a script that interacts with the VirusTotal API to upload a file, check a hash, and to check a URL.Cons:- the solutions to the end of chapter knowledge questions are located on the book's website. I personally would of preferred if the solutions were included in the book. Not all of the solutions appear to be posted.- while I personally found "Part I: Foundations" to be very useful, I can't imagine it being useful to someone who's already an expert in bash.Overall loved the concept of the book and feel like it's a great way to learn bash. If your work involves monitoring systems or even if you just want to up your bash game, "Cybersecurity Ops with bash" is worth a read.
D**S
Great context that matches the title
This book does an excellent job demonstrating how to take advantage of current command-line applications that are standard in bash - grep, awk, cut, tail, etc... All GNU licensed applications that are works of art by great programmers provided from the GNU project. The author gives examples of using the Git Bash CLI to access windows commands as well. Microsoft has done something awesome and integrated a full Linux Kernel subsystem with Windows Substem Linux (WSL) 2.0. This book allows you to take advantage of the Linux command line on Windows and shows you how to use these tested and proven commands. This book has excellent examples to show you the power of CLI in Cybersecurity.
B**L
Superb book for the novice and for the experienced cyber security professional
The authors have done a commendable job discussing and exploring the powerful capabilities buried in the command line language BASH. While there is a growing constellation of GUI tools for attacking, defending and analyzing cyber events, understanding the powerful capabilities available at the command line in the various forms of Line and the Windows operating systems can only make one a more proficient operator in this environment.As an IT professional whose career path has taken me away from my technical background to senior executive positions, I had no trouble following the book and examples. Further, I truly believe that courses should be built around this excellent resource. I highly recommend this book!
S**T
Good
This is keeping me quite busy. Book feels long in a good way.
C**N
execute the code on the pages
you'll like what you see if you follow the guides in this book!!
S**Y
Good solid Cyber Book
Well done, full of scripts!
B**7
Great book!
Very nice and detailed book. Master it and it will give you a very solid skillset on the CLI.
A**A
Libro indispensable
Si estás adentrado en las tecnologías de la información, sabes perfectamente que es necesario tener herramientas que ayuden a defenderse de los intrusos informáticos. Este libro es una gran opción, indispensable tenerlo a la mano.
A**R
Great book
Great book so far. The only reason why I give it 4 stars instead of 5 is about the font size. Personally, I think it small to compare with other books.
M**A
Bash !!!!!
Alle Linux-Benutzer sollten BASH lernen und dieses Buch lesen.
Trustpilot
3 weeks ago
5 days ago