Book description
An accessible introduction to cybersecurity concepts and practicesCybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.
Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.
- Learn security and surveillance fundamentals
- Secure and protect remote access and devices
- Understand network topologies, protocols, and strategies
- Identify threats and mount an effective defense
Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge
Table of contents
- COVER
- ACKNOWLEDGMENTS
- ABOUT THE AUTHORS
- INTRODUCTION
-
PART I: Securing the Infrastructure
- CHAPTER 1: Infrastructure Security in the Real World
- CHAPTER 2: Understanding Access-Control and Monitoring Systems
- CHAPTER 3: Understanding Video Surveillance Systems
- CHAPTER 4: Understanding Intrusion-Detection and Reporting Systems
- CHAPTER 5: Infrastructure Security: Review Questions and Hands-On Exercises
-
PART II: Securing Local Hosts
- CHAPTER 6: Local Host Security in the Real World
- CHAPTER 7: Securing Devices
- CHAPTER 8: Protecting the Inner Perimeter
-
CHAPTER 9: Protecting Remote Access
- Protecting Local Computing Devices
- Implementing Local Protection Tools
- Using Local Intrusion-Detection Tools
- Configuring Browser Security Options
- Defending Against Malicious Software
- Hardening Operating Systems
- Overseeing Application Software Security
- Applying Software Updates and Patches
- Hands-On Exercises
- CHAPTER 10: Local Host Security: Review Questions and Hands-On Exercises
-
PART III: Securing Local Networks
- CHAPTER 11: Local Network Security in the Real World
- CHAPTER 12: Networking Basics
- CHAPTER 13: Understanding Networking Protocols
- CHAPTER 14: Understanding Network Servers
- CHAPTER 15: Understanding Network Connectivity Devices
- CHAPTER 16: Understanding Network Transmission Media Security
- CHAPTER 17: Local Network Security: Review Questions
-
PART IV: Securing the Perimeter
- CHAPTER 18: Perimeter Security in the Real World
- CHAPTER 19: Understanding the Environment
- CHAPTER 20: Hiding the Private Network
- CHAPTER 21: Protecting the Perimeter
- CHAPTER 22: Protecting Data Moving Through the Internet
- CHAPTER 23: Tools and Utilities
- CHAPTER 24: Identifying and Defending Against Vulnerabilities
- CHAPTER 25: Perimeter Security: Review Questions and Hands-On Exercises
- APPENDIX A: Glossary
- APPENDIX B: Acronyms
- APPENDIX C: NIST Preliminary Cybersecurity Framework
- INDEX
- END USER LICENSE AGREEMENT
Product information
- Title: Cybersecurity Essentials
- Author(s):
- Release date: October 2018
- Publisher(s): Sybex
- ISBN: 9781119362395
You might also like
book
Cyber Security Essentials
This volume provides a clear understanding of the concepts behind cyber-prevalent threats, tactics, and procedures. The …
book
Cyber Security, 2nd Edition
Cyber security has never been more essential than it is today, it’s not a case of …
book
Introduction to Computer Networks and Cybersecurity
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity …
book
Security in Computing
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of …