SitePoint
  • Premium
  • Library
  • Community
  • Jobs
  • Blog
LoginStart Free Trial
Cybersecurity Essentials
CYBERSECURITY ESSENTIALS
ACKNOWLEDGMENTS
ABOUT THE AUTHORS
INTRODUCTION
Who Should Read This Book
What Is Covered in This Book
The Essentials Series
How to Contact the Author
Security Challenges
Summary
A Quick Primer on Infrastructure Security
Access Control
Security Policies
Physical Security Controls
Access-Control Gates
Authentication Systems
Remote-Access Monitoring
Hands-On Exercises
Video Surveillance Systems
Hands-On Exercises
Intrusion-Detection and Reporting Systems
Hands-On Exercises
Summary Points
Security Challenge Scenarios
Review Questions
Exam Questions
Security Challenges
Summary
The Three Layers of Security
Securing Host Devices
Hands-On Exercises
The Inner Perimeter
Hands-On Exercises
Protecting Local Computing Devices
Implementing Local Protection Tools
Using Local Intrusion-Detection Tools
Configuring Browser Security Options
Defending Against Malicious Software
Hardening Operating Systems
Overseeing Application Software Security
Applying Software Updates and Patches
Hands-On Exercises
Summary Points
Security Challenge Scenarios
Review Questions
Exam Questions
Security Challenges
Summary
Understanding the Basics of Networking
The OSI Networking Model
Data Transmission Packets
OSI Layer Security
Network Topologies
Logical Topologies
Hands-On Exercises
The Basics of Networking Protocols
Network Control Strategies
Hands-On Exercises
The Basics of Network Servers
Hands-On Exercises
Network Switches
Routers
Gateways
Network Bridges
Wireless Network Connectivity
Hands-On Exercises
The Basics of Network Transmission MEDIA
Transmission Media Vulnerabilities
Hands-On Exercises
Summary Points
Security Challenge Scenarios
Review Questions
Security Challenges
Summary
The Basics of Internet Security
Understanding the Environment
Hands-On Exercises
Understanding Private Networks
Hands-On Exercises
Understanding the Perimeter
Firewalls
Network Appliances
Proxy Servers
Demilitarized Zones (DMZs)
Honeypots
Extranets
Hands-On Exercises
Securing Data in Motion
Cryptography
Hands-On Exercises
Using Basic Tools
Monitoring Tools and Software
Hands-On Exercises
Zero Day Vulnerabilities
Software Exploits
Social Engineering Exploits
Network Threats and Attacks
Dictionary Attacks
Denial of Service (DoS) Attacks
Spam
Other Exploits
Hands-On Exercises
Summary Points
Security Scenario Review
Review Questions
Exam Questions
Glossary
Acronyms
NIST Preliminary Cybersecurity Framework
WILEY END USER LICENSE AGREEMENT

Community Questions