Privileged Access Management
Protect your most sensitive accounts and systems. Covers privileged access management (PAM), credential vaulting, just-in-time access, session recording, and defending against privileged attack vectors.
Key Terms
Recommended Books
Identity Attack Vectors
Morey J. Haber
Identity Attack Vectors
Morey J. Haber, Darran Rolls
Identity Attack Vectors explores the threat landscape targeting identity systems and provides practical guidance for implementing effective IAM solutions. It covers privileged access management, identity governance, attack patterns targeting credentials and identity stores, and defensive strategies.
Privileged Attack Vectors
Morey J. Haber
Privileged Attack Vectors
Morey J. Haber
This book examines how attackers exploit privileged accounts and provides comprehensive guidance on building a privileged access management program. It covers PAM architecture, credential vaulting, session management, just-in-time access, and measuring PAM program effectiveness.
Cybersecurity Ops with bash
Paul Troncone
Cybersecurity Ops with bash
Paul Troncone, Carl Albing
Learn how to use the bash command line for cybersecurity operations including log analysis, network monitoring, malware analysis, and security auditing. Practical recipes for both offensive and defensive security tasks.