Cybersecurity Essentials 1st Edition by Charles Brooks, Christopher Grow – Ebook PDF Instant Download/Delivery. 9781119362456 ,1119362458
Full download Cybersecurity Essentials 1st Edition after payment
Product details:
ISBN 10: 1119362458
ISBN 13: 9781119362456
Author: Charles Brooks, Christopher Grow
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.
Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.
- Learn security and surveillance fundamentals
- Secure and protect remote access and devices
- Understand network topologies, protocols, and strategies
- Identify threats and mount an effective defense
Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge
Cybersecurity Essentials 1st Edition Table of contents:
PART I: Securing the Infrastructure
CHAPTER 1: Infrastructure Security in the Real World
Security Challenges
Summary
CHAPTER 2: Understanding Access-Control and Monitoring Systems
A Quick Primer on Infrastructure Security
Access Control
Security Policies
Physical Security Controls
Access-Control Gates
Authentication Systems
Remote-Access Monitoring
Hands-On Exercises
CHAPTER 3: Understanding Video Surveillance Systems
Video Surveillance Systems
Hands-On Exercises
CHAPTER 4: Understanding Intrusion-Detection and Reporting Systems
Intrusion-Detection and Reporting Systems
Hands-On Exercises
CHAPTER 5: Infrastructure Security: Review Questions and Hands-On Exercises
Summary Points
Security Challenge Scenarios
Review Questions
Exam Questions
PART II: Securing Local Hosts
CHAPTER 6: Local Host Security in the Real World
Security Challenges
Summary
CHAPTER 7: Securing Devices
The Three Layers of Security
Securing Host Devices
Hands-On Exercises
CHAPTER 8: Protecting the Inner Perimeter
The Inner Perimeter
Hands-On Exercises
CHAPTER 9: Protecting Remote Access
Protecting Local Computing Devices
Implementing Local Protection Tools
Using Local Intrusion-Detection Tools
Configuring Browser Security Options
Defending Against Malicious Software
Hardening Operating Systems
Overseeing Application Software Security
Applying Software Updates and Patches
Hands-On Exercises
CHAPTER 10: Local Host Security: Review Questions and Hands-On Exercises
Summary Points
Security Challenge Scenarios
Review Questions
Exam Questions
PART III: Securing Local Networks
CHAPTER 11: Local Network Security in the Real World
Security Challenges
Summary
CHAPTER 12: Networking Basics
Understanding the Basics of Networking
The OSI Networking Model
Data Transmission Packets
OSI Layer Security
Network Topologies
Logical Topologies
Hands-On Exercises
CHAPTER 13: Understanding Networking Protocols
The Basics of Networking Protocols
Network Control Strategies
Hands-On Exercises
CHAPTER 14: Understanding Network Servers
The Basics of Network Servers
Hands-On Exercises
CHAPTER 15: Understanding Network Connectivity Devices
Network Switches
Routers
Gateways
Network Bridges
Wireless Network Connectivity
Hands-On Exercises
CHAPTER 16: Understanding Network Transmission Media Security
The Basics of Network Transmission MEDIA
Transmission Media Vulnerabilities
Hands-On Exercises
CHAPTER 17: Local Network Security: Review Questions
Summary Points
Security Challenge Scenarios
Review Questions
PART IV: Securing the Perimeter
CHAPTER 18: Perimeter Security in the Real World
Security Challenges
Summary
CHAPTER 19: Understanding the Environment
The Basics of Internet Security
Understanding the Environment
Hands-On Exercises
CHAPTER 20: Hiding the Private Network
Understanding Private Networks
Hands-On Exercises
CHAPTER 21: Protecting the Perimeter
Understanding the Perimeter
Firewalls
Network Appliances
Proxy Servers
Demilitarized Zones (DMZs)
Honeypots
Extranets
Hands-On Exercises
CHAPTER 22: Protecting Data Moving Through the Internet
Securing Data in Motion
Cryptography
Hands-On Exercises
CHAPTER 23: Tools and Utilities
Using Basic Tools
Monitoring Tools and Software
Hands-On Exercises
CHAPTER 24: Identifying and Defending Against Vulnerabilities
Zero Day Vulnerabilities
Software Exploits
Social Engineering Exploits
Network Threats and Attacks
Dictionary Attacks
Denial of Service (DoS) Attacks
Spam
Other Exploits
Hands-On Exercises
CHAPTER 25: Perimeter Security: Review Questions and Hands-On Exercises
Summary Points
Security Scenario Review
Review Questions
Exam Questions
APPENDIX A: Glossary
APPENDIX B: Acronyms
APPENDIX C: NIST Preliminary Cybersecurity Framework
INDEX
People also search for Cybersecurity Essentials 1st Edition:
cisco cybersecurity essentials quiz answers
cisco cybersecurity essentials final quiz answers
cisco cybersecurity essentials pdf
cybersecurity essentials certification