Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner 1st Edition by Seth James Nielson – Ebook PDF Instant Download/Delivery: 1484295595 978-1484295595
Full download Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner 1st edition after payment

Product details:
ISBN 10: 1484295595
ISBN 13: 978-1484295595
Author: Seth James Nielson
The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization’s mission.
This book introduces major technologies that are employed in today’s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.
What You Will Learn
- Authentication technologies, including secure password storage and how hackers “crack” password lists
- Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC
- Core cryptography technology, including AES encryption and public key signatures
- Classical host security technologies that protect against malware (viruses, trojans, ransomware)
- Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems
- Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them
- Email and social media security threats such as spam, phishing, social media, and other email threats
Who This Book Is For
Professionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.
Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner 1st Table of contents:
Preface
- Introduction to the World of Cybersecurity
- How to Use This Book
- Why Cybersecurity Matters
Chapter 1: Introduction to Cybersecurity
- What is Cybersecurity?
- The Importance of Cybersecurity in the Digital Age
- Key Threats and Vulnerabilities in Cyberspace
- The Role of Cybersecurity Professionals
Chapter 2: Understanding Cyber Threats
- Types of Cyber Attacks: Malware, Phishing, and More
- How Cyber Attacks Impact Organizations and Individuals
- The Anatomy of a Cyber Attack
- Cybercrime and Hacktivism
Chapter 3: The Fundamentals of Network Security
- What is a Computer Network?
- Securing Network Infrastructure: Firewalls and Routers
- Understanding TCP/IP and Network Protocols
- Basic Network Security Tools and Techniques
Chapter 4: Cryptography: Securing Information
- Introduction to Cryptography
- Symmetric and Asymmetric Encryption
- Hashing and Digital Signatures
- How Encryption Protects Data in Transit and at Rest
Chapter 5: Operating Systems and Security
- Securing Operating Systems: Windows, Linux, and macOS
- Permissions, Authentication, and User Management
- Securing File Systems and Directories
- Protecting Against OS Vulnerabilities
Chapter 6: Cybersecurity Risk Management
- Understanding Cybersecurity Risks and Threats
- Risk Assessment and Mitigation Strategies
- The Importance of Cyber Hygiene
- Developing a Security Policy for Organizations
Chapter 7: Identity and Access Management
- What is Identity and Access Management (IAM)?
- Authentication Methods: Passwords, Biometrics, and Multi-Factor Authentication
- Role-Based Access Control (RBAC)
- Protecting Sensitive Data and Personal Information
Chapter 8: Security Tools and Software
- Anti-virus and Anti-malware Software
- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
- Encryption Tools and VPNs (Virtual Private Networks)
- Penetration Testing and Vulnerability Scanners
Chapter 9: Incident Response and Recovery
- What to Do in Case of a Cyber Attack
- Steps in Incident Response: Identification, Containment, Eradication
- Disaster Recovery and Business Continuity Planning
- Building an Effective Incident Response Team
Chapter 10: The Legal and Ethical Aspects of Cybersecurity
- Cybersecurity Laws and Regulations: GDPR, HIPAA, and More
- Ethical Hacking and the Role of White-Hat Hackers
- Privacy Concerns and Ethical Dilemmas in Cybersecurity
- Protecting User Privacy in the Digital World
Chapter 11: Emerging Trends in Cybersecurity
- The Impact of Artificial Intelligence and Machine Learning on Cybersecurity
- Cybersecurity in the Internet of Things (IoT)
- Cloud Security and Securing Virtual Environments
- The Rise of Ransomware and How to Defend Against It
Chapter 12: Building a Career in Cybersecurity
- Pathways to Becoming a Cybersecurity Professional
- Essential Skills and Certifications for Cybersecurity Careers
- Networking and Professional Development in Cybersecurity
- The Future of Cybersecurity Careers
Conclusion
- Key Takeaways and Next Steps in Your Cybersecurity Journey
- How to Stay Current in the Ever-Evolving Field of Cybersecurity
Appendices
- A: Glossary of Key Cybersecurity Terms
- B: Resources for Further Learning (Books, Websites, Courses)
- C: Index
References
People also search for Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner 1st :
discovering cybersecurity a technical introduction for the absolute beginner
technical skills required for cyber security
technical interview questions for cyber security
introduction to cybersecurity knowledge & skills
introduction to cybersecurity textbook
Tags:
Seth James Nielson,Discovering Cybersecurity,Absolute Beginner