SitePoint
Blog
Forum
Library
Login
Join Premium
Toggle sidebar
Cybersecurity Essentials
Toggle community discussions
Close
Content
Bookmarks
Preface
CYBERSECURITY ESSENTIALS
ACKNOWLEDGMENTS
ABOUT THE AUTHORS
INTRODUCTION
Who Should Read This Book
What Is Covered in This Book
The Essentials Series
How to Contact the Author
1
Infrastructure Security in the Real World
Security Challenges
Summary
Understanding Access-Control and Monitoring Systems
A Quick Primer on Infrastructure Security
Access Control
Security Policies
Physical Security Controls
Access-Control Gates
Authentication Systems
Remote-Access Monitoring
Hands-On Exercises
Understanding Video Surveillance Systems
Video Surveillance Systems
Hands-On Exercises
Understanding Intrusion-Detection and Reporting Systems
Intrusion-Detection and Reporting Systems
Hands-On Exercises
Infrastructure Security: Review Questions and Hands-On Exercises
Summary Points
Security Challenge Scenarios
Review Questions
Exam Questions
Local Host Security in the Real World
Security Challenges
Summary
Securing Devices
The Three Layers of Security
Securing Host Devices
Hands-On Exercises
Protecting the Inner Perimeter
The Inner Perimeter
Hands-On Exercises
Protecting Remote Access
Protecting Local Computing Devices
Implementing Local Protection Tools
Using Local Intrusion-Detection Tools
Configuring Browser Security Options
Defending Against Malicious Software
Hardening Operating Systems
Overseeing Application Software Security
Applying Software Updates and Patches
Hands-On Exercises
Local Host Security: Review Questions and Hands-On Exercises
Summary Points
Security Challenge Scenarios
Review Questions
Exam Questions
Securing Local Networks
Security Challenges
Summary
Networking Basics
Understanding the Basics of Networking
The OSI Networking Model
Data Transmission Packets
OSI Layer Security
Network Topologies
Logical Topologies
Hands-On Exercises
Understanding Networking Protocols
The Basics of Networking Protocols
Network Control Strategies
Hands-On Exercises
Understanding Network Servers
The Basics of Network Servers
Hands-On Exercises
Understanding Network Connectivity Devices
Network Switches
Routers
Gateways
Network Bridges
Wireless Network Connectivity
Hands-On Exercises
Understanding Network Transmission Media Security
The Basics of Network Transmission MEDIA
Transmission Media Vulnerabilities
Hands-On Exercises
Local Network Security: Review Questions
Summary Points
Security Challenge Scenarios
Review Questions
Perimeter Security in the Real World
Security Challenges
Summary
Understanding the Environment
The Basics of Internet Security
Understanding the Environment
Hands-On Exercises
Hiding the Private Network
Understanding Private Networks
Hands-On Exercises
Protecting the Perimeter
Understanding the Perimeter
Firewalls
Network Appliances
Proxy Servers
Demilitarized Zones (DMZs)
Honeypots
Extranets
Hands-On Exercises
Protecting Data Moving Through the Internet
Securing Data in Motion
Cryptography
Hands-On Exercises
Tools and Utilities
Using Basic Tools
Monitoring Tools and Software
Hands-On Exercises
Identifying and Defending Against Vulnerabilities
Zero Day Vulnerabilities
Software Exploits
Social Engineering Exploits
Network Threats and Attacks
Dictionary Attacks
Denial of Service (DoS) Attacks
Spam
Other Exploits
Hands-On Exercises
Perimeter Security: Review Questions and Hands-On Exercises
Summary Points
Security Scenario Review
Review Questions
Exam Questions
APPENDIX A
Glossary
APPENDIX B
Acronyms
APPENDIX C
NIST Preliminary Cybersecurity Framework
INDEX
WILEY END USER LICENSE AGREEMENT
Open text modal
Community Questions
Close