Beschreibung:
Sam Grubb is a cybersecurity consultant for a managed service provider that works with a large variety of clients. He has six years of experience teaching cybersecurity to both adults and teenagers and holds several cybersecurity certifications, including the Certified Information Systems Security Professional (CISSP) certification.
Chapter 1: An Introduction to Cybersecurity
Chapter 2: Attack Targets on the Internet
Chapter 3: Phishing Tactics
Chapter 4: Malware Infections
Chapter 5: Password Thefts and Other Account Access Tricks
Chapter 6: Network Tapping
Chapter 7: Attacks in the Cloud
Chapter 8: Wireless Network Pirating
Chapter 9: Encryption Cracking
Chapter 10: How to Defeat Black Hats
How Cybersecurity Really Works is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.
How Cybersecurity Really Works is the perfect introduction to cybersecurity. Whether you re a computer science student or a business professional, it will teach you the basics without all the jargon.
This beginners guide covers different types of attacks, common tactics used by online adversaries, and defensive strategies you can use to protect yourself. You ll learn what security professionals do, what an attack looks like from a cybercriminal s viewpoint, and how to implement sophisticated cybersecurity measures on your own devices.
In addition, you ll find explanations of topics like malware, phishing, and social engineering attacks, coupled with real-world examples and hands-on exercises to help you apply what you ve learned. You ll explore ways to bypass access controls, prevent infections from worms and viruses, and protect your cloud accounts from attackers.
You ll also learn how to:
Analyze emails to detect phishing attempts
Use SQL injection to attack a website
Examine malware from the safety of a sandbox environment
Use the command line to evaluate and improve your computer and network security
Deploy encryption and hashing to protect your files
Create a comprehensive risk management plan
You can t afford to ignore cybersecurity anymore, but attackers won t wait while you read a long technical manual. That s why How Cybersecurity Really Works teaches you just the essentials you need to think beyond antivirus and make the right decisions to keep the online monsters at bay.