CYBERSECURITY ESSENTIALS /

"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devic...

Full description

Bibliographic Details
Main Authors: Brooks, Charles J., author 625046, Craig, Philip, author 625048, Short, Donald, author 625049, Grow, Christophe, author 625047
Format: text
Language:eng
Published: Indianapolis, Indiana : John Wiley & Sons Inc., 201
Subjects:
_version_ 1796760439155064832
author Brooks, Charles J., author 625046
Craig, Philip, author 625048
Short, Donald, author 625049
Grow, Christophe, author 625047
author_facet Brooks, Charles J., author 625046
Craig, Philip, author 625048
Short, Donald, author 625049
Grow, Christophe, author 625047
author_sort Brooks, Charles J., author 625046
collection OCEAN
description "Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts
first_indexed 2024-03-05T16:11:46Z
format text
id KOHA-OAI-TEST:553519
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T16:11:46Z
publishDate 201
publisher Indianapolis, Indiana : John Wiley & Sons Inc.,
record_format dspace
spelling KOHA-OAI-TEST:5535192022-01-10T02:39:29ZCYBERSECURITY ESSENTIALS / Brooks, Charles J., author 625046 Craig, Philip, author 625048 Short, Donald, author 625049 Grow, Christophe, author 625047 textIndianapolis, Indiana : John Wiley & Sons Inc.,♭2018 2018eng"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key conceptsPart 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security: review quesitons and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security: review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security: review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the Internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security: review questions and hands-on exercises"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key conceptsRashid Taha Siham RashidPSZJBLComputer networksComputer securityURN:ISBN:9781119362395
spellingShingle Computer networks
Computer security
Brooks, Charles J., author 625046
Craig, Philip, author 625048
Short, Donald, author 625049
Grow, Christophe, author 625047
CYBERSECURITY ESSENTIALS /
title CYBERSECURITY ESSENTIALS /
title_full CYBERSECURITY ESSENTIALS /
title_fullStr CYBERSECURITY ESSENTIALS /
title_full_unstemmed CYBERSECURITY ESSENTIALS /
title_short CYBERSECURITY ESSENTIALS /
title_sort cybersecurity essentials
topic Computer networks
Computer security
work_keys_str_mv AT brookscharlesjauthor625046 cybersecurityessentials
AT craigphilipauthor625048 cybersecurityessentials
AT shortdonaldauthor625049 cybersecurityessentials
AT growchristopheauthor625047 cybersecurityessentials