CYBERSECURITY ESSENTIALS /
"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devic...
Main Authors: | , , , |
---|---|
Format: | text |
Language: | eng |
Published: |
Indianapolis, Indiana : John Wiley & Sons Inc.,
201
|
Subjects: |
_version_ | 1796760439155064832 |
---|---|
author | Brooks, Charles J., author 625046 Craig, Philip, author 625048 Short, Donald, author 625049 Grow, Christophe, author 625047 |
author_facet | Brooks, Charles J., author 625046 Craig, Philip, author 625048 Short, Donald, author 625049 Grow, Christophe, author 625047 |
author_sort | Brooks, Charles J., author 625046 |
collection | OCEAN |
description | "Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts |
first_indexed | 2024-03-05T16:11:46Z |
format | text |
id | KOHA-OAI-TEST:553519 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T16:11:46Z |
publishDate | 201 |
publisher | Indianapolis, Indiana : John Wiley & Sons Inc., |
record_format | dspace |
spelling | KOHA-OAI-TEST:5535192022-01-10T02:39:29ZCYBERSECURITY ESSENTIALS / Brooks, Charles J., author 625046 Craig, Philip, author 625048 Short, Donald, author 625049 Grow, Christophe, author 625047 textIndianapolis, Indiana : John Wiley & Sons Inc.,♭2018 2018eng"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key conceptsPart 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key conceptsRashid Taha Siham RashidPSZJBLComputer networksComputer securityURN:ISBN:9781119362395 |
spellingShingle | Computer networks Computer security Brooks, Charles J., author 625046 Craig, Philip, author 625048 Short, Donald, author 625049 Grow, Christophe, author 625047 CYBERSECURITY ESSENTIALS / |
title | CYBERSECURITY ESSENTIALS / |
title_full | CYBERSECURITY ESSENTIALS / |
title_fullStr | CYBERSECURITY ESSENTIALS / |
title_full_unstemmed | CYBERSECURITY ESSENTIALS / |
title_short | CYBERSECURITY ESSENTIALS / |
title_sort | cybersecurity essentials |
topic | Computer networks Computer security |
work_keys_str_mv | AT brookscharlesjauthor625046 cybersecurityessentials AT craigphilipauthor625048 cybersecurityessentials AT shortdonaldauthor625049 cybersecurityessentials AT growchristopheauthor625047 cybersecurityessentials |