SitePoint
  • Premium
  • Library
  • Community
  • Jobs
  • Blog
LoginStart Free Trial

The home for developers

Track your course progress, manage projects, and find your dream job - all in one place.

Start Your Free Trial

7 Day Free Trial. Cancel Anytime.

SitePoint Premium

  • Access to 700+ courses
  • Publish articles on SitePoint
  • Daily curated jobs
  • Learning Paths
  • Discounts to dev tools
  • Library/
  • Text courses/
  • Cybersecurity Essentials
Cybersecurity Essentials

Cybersecurity Essentials


Course details

4.0∙1 Rating1 review

Published
August 2018
Publisher
Wiley
Chapters
29

About the course

An accessible introduction to cybersecurity concepts and practices

Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.

Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.

  • Learn security and surveillance fundamentals
  • Secure and protect remote access and devices
  • Identify threats and mount an effective defense

Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge

Authors

Charles J. Brooks

Charles J. Brooks

Charles J. Brooks is currently co-owner and vice president of Educational Technologies Group Inc., as well as co-owner of eITPrep LLP, an online training company. He is in charge of research and product development at both organizations.
Christopher M. Grow

Christopher M. Grow

Christopher M. Grow is currently the Technical Services Manager for Educational Technologies Group. He is responsible for product support, solution development, onsite implementation/installation, and instructor support and training for a wealth of cybersecurity and information technology products. He also is involved in program management and contributes in R&D of new products and revisions of current offerings.
Philip Craig

Philip Craig

Philip Craig is the founder of BlackByte Cyber Security, LLC, a consultancy supporting the Pacific Northwest National Laboratory (PNNL) research and national security agendas as well as the National Rural Electric Cooperative Association and National Rural Telecommunications Cooperative.
Donald Short

Donald Short

Donald Short is the President of One World Telecommunications, Inc., an Internet Service Provider in Kennewick, Washington, where he both manages the business and programs web and database applications.

Course Outline

Chapter 1: Infrastructure Security in the Real World
Chapter 2: Understanding Access-Control and Monitoring Systems
Chapter 3: Understanding Video Surveillance Systems
Chapter 4: Understanding Intrusion-Detection and Reporting Systems
Chapter 5: Infrastructure Security: Review Questions and Hands-On Exercises
Chapter 6: Local Host Security in the Real World
Chapter 7: Securing Devices
Chapter 8: Protecting the Inner Perimeter
Chapter 9: Protecting Remote Access
Chapter 10: Local Host Security: Review Questions and Hands-On Exercises
Chapter 11: Securing Local Networks
Chapter 12: Networking Basics
Chapter 13: Understanding Networking Protocols
Chapter 14: Understanding Network Servers
Chapter 15: Understanding Network Connectivity Devices
Chapter 16: Understanding Network Transmission Media Security
Chapter 17: Local Network Security: Review Questions
Chapter 18: Perimeter Security in the Real World
Chapter 19: Understanding the Environment
Chapter 20: Hiding the Private Network
Chapter 21: Protecting the Perimeter
Chapter 22: Protecting Data Moving Through the Internet
Chapter 23: Tools and Utilities
Chapter 24: Identifying and Defending Against Vulnerabilities
Chapter 25: Perimeter Security: Review Questions and Hands-On Exercises
Chapter 26: APPENDIX A
Chapter 27: APPENDIX B
Chapter 28: APPENDIX C
Chapter 29: INDEX

Reviews
4.0

1 total

0
1
0
0
0

Course details

4.0∙1 Rating1 review

Published
August 2018
Publisher
Wiley
Chapters
29

SitePoint

Stuff we do

  • Premium
  • Newsletters
  • Learning paths
  • Library
  • Forums

Contact

  • Contact us
  • FAQ
  • Publish your book
  • Write an article
  • Advertise

About

  • Our Story
  • Corporate Memberships
  • Start free trial
  • Login

Connect

  • RSS
  • Facebook
  • Twitter (X)
  • Instagram

Subscribe to our newsletter

Get the freshest news and resources for developers, designers and digital creators in your inbox each week

© 2000 – 2025 SitePoint Pty. Ltd.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Terms of usePrivacy policy