Cybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment

If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on the rise! Small, medi

148 22 457KB

English Pages 247 Year 2023

Report DMCA / Copyright

DOWNLOAD FILE

Cybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment

Table of contents :
Cover Page
Security 3
Introduction
Chapter 1 Secure Networking Protocols
Chapter 2 Host or Application Security Solutions
Chapter 3 Coding, Fuzzing & Quality Testing
Chapter 4 How to Implement Secure Network Designs
Chapter 5 Network Access Control, Port Security & Loop Protection
Chapter 6 Spanning Tree, DHCP Snooping & MAC Filtering
Chapter 7 Access Control Lists & Route Security
Chapter 8 Intrusion Detection and Prevention
Chapter 9 Firewalls & Unified Threat Management
Chapter 10 How to Install and Configure Wireless Security
Chapter 11 How to Implement Secure Mobile Solutions
Chapter 12 Geo-tagging & Context-Aware Authentication
Chapter 13 How to Apply Cybersecurity Solutions to the Cloud
Chapter 14 How to Implement Identity and Account Management Controls
Chapter 15 How to Implement Authentication and Authorization Solutions
Chapter 16 How to Implement Public Key Infrastructure
Conclusion
About Richie Miller

Polecaj historie