𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cybersecurity: The Beginner's Guide

✍ Scribed by Ozkaya, Erdal


Year
2019
Tongue
English
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Understand the nitty-gritty of Cybersecurity with ease

Key Features

  • Align your security knowledge with industry leading concepts and tools
  • Acquire required skills and certifications to survive the ever changing market needs
  • Learn from industry experts to analyse, implement, and maintain a robust environment

    Book Description

    It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time.

    This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the...

  • ✦ Table of Contents


    Cover
    Title Page
    Copyright and Credits
    Acknowledment
    About Packt
    Contributors
    Table of Contents
    Preface
    Chapter 1: Importance of Cybersecurity
    The history of data breaches
    Scenarios for security
    Understanding the attack surface
    The threat landscape
    The importance of securing the network and applications
    The history of breaches
    1984 --
    The TRW data breach
    1990s --
    Beginning of computer viruses and worms
    The years 2000-2010
    How security helps to build trust
    Summary
    Chapter 2: Security Evolution --
    From Legacy to Advanced, to ML and AI
    Legacy cybersecurity systems Signature-based security systemsNetwork cyber attacks
    Network security tools
    Transformations in cybersecurity
    Layered security
    New security threats
    Responses to the new threats
    Advancements in security technology to security 2.0
    Anomaly-based security systems
    How ML and AI will play a larger role in cybersecurity
    Summary
    Further reading
    Chapter 3: Learning Cybersecurity Technologies
    Mobile security
    Loss or theft
    Software-related security issues
    Advanced data security
    Cloud security
    Modern day regulations
    Incidence response and forensics
    Enterprise security at scale Penetration testingTruSec training
    CQURE Academy
    Training with Troy Hunt
    Have I Been Pwned?
    DevSecOps
    IoT security
    User behavior analytics (UBA)
    Endpoint detection and response (EDR)
    Summary
    Further reading
    Chapter 4: Skills We Need for a Cybersecurity Career
    General cybersecurity roles
    Penetration testers and vulnerability testers
    Cybersecurity consultants
    Cybersecurity managers
    Cybersecurity analysts
    Cybersecurity engineers
    Chief Information Security Officers (CISOs)
    Chief Security Officers (CSOs)
    Computer system administrators
    Cryptographers
    Computer forensic experts Network security engineersInformation assurance technicians
    Data security analysts
    IT security compliance analysts
    System security specialists
    Skills to acquire in cybersecurity
    Foundation skills
    Risk management
    Networking
    Situational awareness
    Toolkits
    Security analyst skills
    Threat assessment
    Vulnerability assessment
    Log collection and analysis
    Active analysis
    Incidence response
    Disaster recovery
    Forensics
    Penetration testing skills
    Intelligence gathering
    Incidence reporting
    Restraint
    Security architecture skills
    Identity and access management
    Network configuration System hardeningChoosing skills to pick up based on current professional experience and skills
    Ethical hacking skills
    Application security skills
    Cloud security skills
    DevSecOps skills
    Threat and vulnerability assessment skills
    Information security management skills
    Cybersecurity litigation support skills
    Regulatory compliance and auditing skills
    Summary
    Further reading
    Chapter 5: Attacker Mindset
    The category of hackers
    The traits of hackers
    They are patient
    They are determined
    They are insensitive
    They are risk-takers
    They are careful
    They are deviant


    πŸ“œ SIMILAR VOLUMES


    Cybersecurity: The Beginner's Guide
    ✍ Erdal Ozkaya πŸ“‚ Library πŸ“… 2019 πŸ› Packt Publishing 🌐 English

    It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Youn

    HTML5 Development: The Beginning Beginne
    ✍ Jason Pfaff πŸ“‚ Library πŸ“… 2016 πŸ› Learn To Program 🌐 English

    HTML5 is a foundational skill for almost all work online. Whether you are learning to program, developing and maintaining a web site or just creating digital-friendly content you need to know HTML5. HTML5 Development: The Beginning Beginner’s Guide is the perfect book to help you learn the foundatio

    HTML5 Development: The Beginning Beginne
    ✍ Pfaff Jason. πŸ“‚ Library 🌐 English

    LearnTo Program Media, 2016. β€” 68 p. β€” ASIN: B01B52FW4K<div class="bb-sep"></div>HTML5 is a foundational skill for almost all work online. Whether you are learning to program, developing and maintaining a web site or just creating digital-friendly content you need to know HTML5. HTML5 Development: T

    HTML5 Development: The Beginning Beginne
    ✍ Pfaff Jason. πŸ“‚ Library 🌐 English

    LearnTo Program Media, 2016. β€” 65 p. β€” ASIN: B01B52FW4K<div class="bb-sep"></div>HTML5 is a foundational skill for almost all work online. Whether you are learning to program, developing and maintaining a web site or just creating digital-friendly content you need to know HTML5. HTML5 Development: T