$19.99
per month
Paperback
Oct 2018
784 pages
1st Edition
-
Explore the security and surveillance fundamentals
-
Understand network topologies, protocols, and strategies
-
Supplement your learning with summaries and additional suggested exercises
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.
Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.
Cybersecurity Essentials gives you the building blocks for entry-level security certification and provides a foundation of cybersecurity knowledge.
Cybersecurity Essentials is ideal for students preparing for a career in IT, networking, or cybersecurity. This book is also beneficial for network professionals who want to improve their network security skills. Management personnel, who want to understand the cybersecurity threats that they face and basic options to resolve those threats, can also use this book.
-
Secure and protect remote access and devices
-
Explore in detail the basic security and surveillance systems
-
Learn about intrusion detection and reporting systems
-
Understand how to set up localhost security
-
Discover ways to protect the inner perimeter and deal with remote access
-
Identify threats and mount an effective defense