Cybersecurity Essentials

Book description

An accessible introduction to cybersecurity concepts and practices

Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.

Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.

  • Learn security and surveillance fundamentals
  • Secure and protect remote access and devices
  • Understand network topologies, protocols, and strategies
  • Identify threats and mount an effective defense

Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge

Table of contents

  1. COVER
  2. ACKNOWLEDGMENTS
  3. ABOUT THE AUTHORS
  4. INTRODUCTION
    1. Who Should Read This Book
    2. What Is Covered in This Book
    3. The Essentials Series
    4. How to Contact the Author
  5. PART I: Securing the Infrastructure
    1. CHAPTER 1: Infrastructure Security in the Real World
      1. Security Challenges
      2. Summary
    2. CHAPTER 2: Understanding Access-Control and Monitoring Systems
      1. A Quick Primer on Infrastructure Security
      2. Access Control
      3. Security Policies
      4. Physical Security Controls
      5. Access-Control Gates
      6. Authentication Systems
      7. Remote-Access Monitoring
      8. Hands-On Exercises
    3. CHAPTER 3: Understanding Video Surveillance Systems
      1. Video Surveillance Systems
      2. Hands-On Exercises
    4. CHAPTER 4: Understanding Intrusion-Detection and Reporting Systems
      1. Intrusion-Detection and Reporting Systems
      2. Hands-On Exercises
    5. CHAPTER 5: Infrastructure Security: Review Questions and Hands-On Exercises
      1. Summary Points
      2. Security Challenge Scenarios
      3. Review Questions
      4. Exam Questions
  6. PART II: Securing Local Hosts
    1. CHAPTER 6: Local Host Security in the Real World
      1. Security Challenges
      2. Summary
    2. CHAPTER 7: Securing Devices
      1. The Three Layers of Security
      2. Securing Host Devices
      3. Hands-On Exercises
    3. CHAPTER 8: Protecting the Inner Perimeter
      1. The Inner Perimeter
      2. Hands-On Exercises
    4. CHAPTER 9: Protecting Remote Access
      1. Protecting Local Computing Devices
      2. Implementing Local Protection Tools
      3. Using Local Intrusion-Detection Tools
      4. Configuring Browser Security Options
      5. Defending Against Malicious Software
      6. Hardening Operating Systems
      7. Overseeing Application Software Security
      8. Applying Software Updates and Patches
      9. Hands-On Exercises
    5. CHAPTER 10: Local Host Security: Review Questions and Hands-On Exercises
      1. Summary Points
      2. Security Challenge Scenarios
      3. Review Questions
      4. Exam Questions
  7. PART III: Securing Local Networks
    1. CHAPTER 11: Local Network Security in the Real World
      1. Security Challenges
      2. Summary
    2. CHAPTER 12: Networking Basics
      1. Understanding the Basics of Networking
      2. The OSI Networking Model
      3. Data Transmission Packets
      4. OSI Layer Security
      5. Network Topologies
      6. Logical Topologies
      7. Hands-On Exercises
    3. CHAPTER 13: Understanding Networking Protocols
      1. The Basics of Networking Protocols
      2. Network Control Strategies
      3. Hands-On Exercises
    4. CHAPTER 14: Understanding Network Servers
      1. The Basics of Network Servers
      2. Hands-On Exercises
    5. CHAPTER 15: Understanding Network Connectivity Devices
      1. Network Switches
      2. Routers
      3. Gateways
      4. Network Bridges
      5. Wireless Network Connectivity
      6. Hands-On Exercises
    6. CHAPTER 16: Understanding Network Transmission Media Security
      1. The Basics of Network Transmission MEDIA
      2. Transmission Media Vulnerabilities
      3. Hands-On Exercises
    7. CHAPTER 17: Local Network Security: Review Questions
      1. Summary Points
      2. Security Challenge Scenarios
      3. Review Questions
  8. PART IV: Securing the Perimeter
    1. CHAPTER 18: Perimeter Security in the Real World
      1. Security Challenges
      2. Summary
    2. CHAPTER 19: Understanding the Environment
      1. The Basics of Internet Security
      2. Understanding the Environment
      3. Hands-On Exercises
    3. CHAPTER 20: Hiding the Private Network
      1. Understanding Private Networks
      2. Hands-On Exercises
    4. CHAPTER 21: Protecting the Perimeter
      1. Understanding the Perimeter
      2. Firewalls
      3. Network Appliances
      4. Proxy Servers
      5. Demilitarized Zones (DMZs)
      6. Honeypots
      7. Extranets
      8. Hands-On Exercises
    5. CHAPTER 22: Protecting Data Moving Through the Internet
      1. Securing Data in Motion
      2. Cryptography
      3. Hands-On Exercises
    6. CHAPTER 23: Tools and Utilities
      1. Using Basic Tools
      2. Monitoring Tools and Software
      3. Hands-On Exercises
    7. CHAPTER 24: Identifying and Defending Against Vulnerabilities
      1. Zero Day Vulnerabilities
      2. Software Exploits
      3. Social Engineering Exploits
      4. Network Threats and Attacks
      5. Dictionary Attacks
      6. Denial of Service (DoS) Attacks
      7. Spam
      8. Other Exploits
      9. Hands-On Exercises
    8. CHAPTER 25: Perimeter Security: Review Questions and Hands-On Exercises
      1. Summary Points
      2. Security Scenario Review
      3. Review Questions
      4. Exam Questions
  9. APPENDIX A: Glossary
  10. APPENDIX B: Acronyms
  11. APPENDIX C: NIST Preliminary Cybersecurity Framework
  12. INDEX
  13. END USER LICENSE AGREEMENT

Product information

  • Title: Cybersecurity Essentials
  • Author(s): Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short
  • Release date: October 2018
  • Publisher(s): Sybex
  • ISBN: 9781119362395