文件名称:Cybersecurity Essentials
文件大小:95.05MB
文件格式:PDF
更新时间:2022-02-02 12:51:52
Cybersecurit
Cybersecurity Essentials By 作者: Charles J. *s – Christopher Grow – Philip Craig – Donald Short ISBN-10 书号: 1119362393 ISBN-13 书号: 9781119362395 Edition 版本: 1 出版日期: 2018-10-05 pages 页数: (767) $40 An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. Learn security and surveillance fundamentals Secure and protect remote access and devices Understand network topologies, protocols, and strategies Identify threats and mount an effective defense Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge COVER TABLE OF CONTENTS ACKNOWLEDGMENTS ABOUT THE AUTHORS INTRODUCTION PART l:Securing the Infrastructure +CHAPTER 1:Infrastructure Security in the Real World 4CHAPTER 2:Understanding Access-Control and Monitoring Systems +CHAPTER 3:Understanding Video Surveillance Systems +CHAPTER 4:Understanding Intrusion-Detection and Reporting Systems +CHAPTER 5:Infrastructure Security:Review Questions and Hands-On Exercises PART ll:Securing Local Hosts +CHAPTER 6:Local Host Security in the Real World +CHAPTER 7:Securing Devices +CHAPTER 8:Protecting the Inner Perimeter +CHAPTER 9:Protecting Remote Access +CHAPTER 10:Local Host Security:Review Questions and Hands-On Exercises PART ll:Securing Local Networks +CHAPTER 11:Local Network Security in the Real World +CHAPTER 12:Networking Basics +CHAPTER 13:Understanding Networking Protocols +CHAPTER 14:Understanding Network Servers +CHAPTER 15:Understanding Network Connectivity Devices 4CHAPTER 16:Understanding Network Transmission Media Security +CHAPTER 17:Local Network Security:Review Questions PART IV:Securing the Perimeter +CHAPTER 18:Perimeter Security in the Real World +CHAPTER 19:Understanding the Environment +CHAPTER 20:Hiding the Private Network +CHAPTER 21:Protecting the Perimeter +CHAPTER 22:Protecting Data Moving Through the Internet 4CHAPTER 23:Tools and Utilities +CHAPTER 24:Ildentifying and Defending Against Vulnerabilities +CHAPTER 25:Perimeter Security:Review Questions and Hands-On Exercises APPENDIX A:Glossary APPENDIX B:Acronyms APPENDIX C:NIST Preliminary Cybersecurity Framework INDEX END USER LICENSE AGREEMENT