Cybersecurity Essentials 1st edition by Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short – Ebook PDF Instant Download/DeliveryISBN: 1119362458, 9781119362456
Full download Cybersecurity Essentials 1st edition after payment
Product details:
ISBN-10 : 1119362458
ISBN-13 : 9781119362456
Author : Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.
Cybersecurity Essentials 1st Table of contents:
PART I: Securing the Infrastructure
CHAPTER 1: Infrastructure Security in the Real World
Security Challenges
Summary
CHAPTER 2: Understanding Access-Control and Monitoring Systems
A Quick Primer on Infrastructure Security
Access Control
Security Policies
Physical Security Controls
Access-Control Gates
Authentication Systems
Remote-Access Monitoring
Hands-On Exercises
CHAPTER 3: Understanding Video Surveillance Systems
Video Surveillance Systems
Hands-On Exercises
CHAPTER 4: Understanding Intrusion-Detection and Reporting Systems
Intrusion-Detection and Reporting Systems
Hands-On Exercises
CHAPTER 5: Infrastructure Security: Review Questions and Hands-On Exercises
Summary Points
Security Challenge Scenarios
Review Questions
Exam Questions
PART II: Securing Local Hosts
CHAPTER 6: Local Host Security in the Real World
Security Challenges
Summary
CHAPTER 7: Securing Devices
The Three Layers of Security
Securing Host Devices
Hands-On Exercises
CHAPTER 8: Protecting the Inner Perimeter
The Inner Perimeter
Hands-On Exercises
CHAPTER 9: Protecting Remote Access
Protecting Local Computing Devices
Implementing Local Protection Tools
Using Local Intrusion-Detection Tools
Configuring Browser Security Options
Defending Against Malicious Software
Hardening Operating Systems
Overseeing Application Software Security
Applying Software Updates and Patches
Hands-On Exercises
CHAPTER 10: Local Host Security: Review Questions and Hands-On Exercises
Summary Points
Security Challenge Scenarios
Review Questions
Exam Questions
PART III: Securing Local Networks
CHAPTER 11: Local Network Security in the Real World
Security Challenges
Summary
CHAPTER 12: Networking Basics
Understanding the Basics of Networking
The OSI Networking Model
Data Transmission Packets
OSI Layer Security
Network Topologies
Logical Topologies
Hands-On Exercises
CHAPTER 13: Understanding Networking Protocols
The Basics of Networking Protocols
Network Control Strategies
Hands-On Exercises
CHAPTER 14: Understanding Network Servers
The Basics of Network Servers
Hands-On Exercises
CHAPTER 15: Understanding Network Connectivity Devices
Network Switches
Routers
Gateways
Network Bridges
Wireless Network Connectivity
Hands-On Exercises
CHAPTER 16: Understanding Network Transmission Media Security
The Basics of Network Transmission MEDIA
Transmission Media Vulnerabilities
Hands-On Exercises
CHAPTER 17: Local Network Security: Review Questions
Summary Points
Security Challenge Scenarios
Review Questions
PART IV: Securing the Perimeter
CHAPTER 18: Perimeter Security in the Real World
Security Challenges
Summary
CHAPTER 19: Understanding the Environment
The Basics of Internet Security
Understanding the Environment
Hands-On Exercises
CHAPTER 20: Hiding the Private Network
Understanding Private Networks
Hands-On Exercises
CHAPTER 21: Protecting the Perimeter
Understanding the Perimeter
Firewalls
Network Appliances
Proxy Servers
Demilitarized Zones (DMZs)
Honeypots
Extranets
Hands-On Exercises
CHAPTER 22: Protecting Data Moving Through the Internet
Securing Data in Motion
Cryptography
Hands-On Exercises
CHAPTER 23: Tools and Utilities
Using Basic Tools
Monitoring Tools and Software
Hands-On Exercises
CHAPTER 24: Identifying and Defending Against Vulnerabilities
Zero Day Vulnerabilities
Software Exploits
Social Engineering Exploits
Network Threats and Attacks
Dictionary Attacks
Denial of Service (DoS) Attacks
Spam
Other Exploits
Hands-On Exercises
CHAPTER 25: Perimeter Security: Review Questions and Hands-On Exercises
Summary Points
Security Scenario Review
Review Questions
People also search for Cybersecurity Essentials 1st:
cisco cybersecurity essentials
cisco cybersecurity essentials quiz answers
cisco cybersecurity essentials final quiz answers
cisco cybersecurity essentials pdf
netacad cybersecurity essentials
Tags:
Cybersecurity,Essentials,Charles Brooks,Christopher Grow,Philip Craig,Donald Short