Cybersecurity: The Beginner's Guide

Understand the nitty-gritty of Cybersecurity with ease Key Features Align your security knowledge with industry leading

3,592 870 29MB

English Year 2019

Report DMCA / Copyright

DOWNLOAD FILE

Cybersecurity: The Beginner's Guide

Table of contents :
Cover
Title Page
Copyright and Credits
Acknowledment
About Packt
Contributors
Table of Contents
Preface
Chapter 1: Importance of Cybersecurity
The history of data breaches
Scenarios for security
Understanding the attack surface
The threat landscape
The importance of securing the network and applications
The history of breaches
1984 --
The TRW data breach
1990s --
Beginning of computer viruses and worms
The years 2000-2010
How security helps to build trust
Summary
Chapter 2: Security Evolution --
From Legacy to Advanced, to ML and AI
Legacy cybersecurity systems Signature-based security systemsNetwork cyber attacks
Network security tools
Transformations in cybersecurity
Layered security
New security threats
Responses to the new threats
Advancements in security technology to security 2.0
Anomaly-based security systems
How ML and AI will play a larger role in cybersecurity
Summary
Further reading
Chapter 3: Learning Cybersecurity Technologies
Mobile security
Loss or theft
Software-related security issues
Advanced data security
Cloud security
Modern day regulations
Incidence response and forensics
Enterprise security at scale Penetration testingTruSec training
CQURE Academy
Training with Troy Hunt
Have I Been Pwned?
DevSecOps
IoT security
User behavior analytics (UBA)
Endpoint detection and response (EDR)
Summary
Further reading
Chapter 4: Skills We Need for a Cybersecurity Career
General cybersecurity roles
Penetration testers and vulnerability testers
Cybersecurity consultants
Cybersecurity managers
Cybersecurity analysts
Cybersecurity engineers
Chief Information Security Officers (CISOs)
Chief Security Officers (CSOs)
Computer system administrators
Cryptographers
Computer forensic experts Network security engineersInformation assurance technicians
Data security analysts
IT security compliance analysts
System security specialists
Skills to acquire in cybersecurity
Foundation skills
Risk management
Networking
Situational awareness
Toolkits
Security analyst skills
Threat assessment
Vulnerability assessment
Log collection and analysis
Active analysis
Incidence response
Disaster recovery
Forensics
Penetration testing skills
Intelligence gathering
Incidence reporting
Restraint
Security architecture skills
Identity and access management
Network configuration System hardeningChoosing skills to pick up based on current professional experience and skills
Ethical hacking skills
Application security skills
Cloud security skills
DevSecOps skills
Threat and vulnerability assessment skills
Information security management skills
Cybersecurity litigation support skills
Regulatory compliance and auditing skills
Summary
Further reading
Chapter 5: Attacker Mindset
The category of hackers
The traits of hackers
They are patient
They are determined
They are insensitive
They are risk-takers
They are careful
They are deviant

Polecaj historie