How Cybersecurity Really Works
- 0 %

How Cybersecurity Really Works

A Hands-On Guide for Total Beginners
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9781718501287
Veröffentl:
2021
Erscheinungsdatum:
16.06.2021
Seiten:
216
Autor:
Sam Grubb
Gewicht:
436 g
Format:
234x175x14 mm
Sprache:
Englisch
Beschreibung:

Sam Grubb is a cybersecurity consultant for a managed service provider that works with a large variety of clients. He has six years of experience teaching cybersecurity to both adults and teenagers and holds several cybersecurity certifications, including the Certified Information Systems Security Professional (CISSP) certification.
Chapter 1: An Introduction to Cybersecurity
Chapter 2: Attack Targets on the Internet
Chapter 3: Phishing Tactics
Chapter 4: Malware Infections
Chapter 5: Password Thefts and Other Account Access Tricks
Chapter 6: Network Tapping
Chapter 7: Attacks in the Cloud
Chapter 8: Wireless Network Pirating
Chapter 9: Encryption Cracking
Chapter 10: How to Defeat Black Hats
How Cybersecurity Really Works is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.

How Cybersecurity Really Works is the perfect introduction to cybersecurity. Whether you re a computer science student or a business professional, it will teach you the basics without all the jargon.

This beginners guide covers different types of attacks, common tactics used by online adversaries, and defensive strategies you can use to protect yourself. You ll learn what security professionals do, what an attack looks like from a cybercriminal s viewpoint, and how to implement sophisticated cybersecurity measures on your own devices.

In addition, you ll find explanations of topics like malware, phishing, and social engineering attacks, coupled with real-world examples and hands-on exercises to help you apply what you ve learned. You ll explore ways to bypass access controls, prevent infections from worms and viruses, and protect your cloud accounts from attackers.

You ll also learn how to:

     Analyze emails to detect phishing attempts
     Use SQL injection to attack a website
     Examine malware from the safety of a sandbox environment
     Use the command line to evaluate and improve your computer and network security
     Deploy encryption and hashing to protect your files
     Create a comprehensive risk management plan 
You can t afford to ignore cybersecurity anymore, but attackers won t wait while you read a long technical manual. That s why How Cybersecurity Really Works teaches you just the essentials you need to think beyond antivirus and make the right decisions to keep the online monsters at bay.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.