Cybersecurity Essentials
close menu
Bookswagon
search
My Account
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology Books > Computer networking and communications > Network security > Cybersecurity Essentials
Cybersecurity Essentials

Cybersecurity Essentials


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

An accessible introduction to cybersecurity concepts and practices

Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.

Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.

  • Learn security and surveillance fundamentals
  • Secure and protect remote access and devices
  • Understand network topologies, protocols, and strategies
  • Identify threats and mount an effective defense

Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge



Table of Contents:

Introduction xix

PART I SECURING THE INFRASTRUCTURE 1

Chapter 1 Infrastructure Security in the Real World 3

Security Challenges 3

Infrastructure Security Scenario 1 4

Infrastructure Security Scenario 2 6

Summary 8

Chapter 2 Understanding Access-Control and Monitoring Systems 9

A Quick Primer on Infrastructure Security 9

Access Control 12

Security Policies 14

Physical Security Controls 15

Locks and Keys 16

Standard Key-Locking Deadbolts 17

Solenoid-Operated Deadbolt Locks 18

Cipher Locks 19

Access-Control Gates 20

Sliding Gates 20

Swinging Gates 21

Control Relays 21

Authentication Systems 23

Magnetic Stripe Readers 24

Smart Cards 25

RFID Badges 26

Biometric Scanners 27

Remote-Access Monitoring 29

Opened- and Closed-Condition Monitoring 30

Automated Access-Control Systems 32

Hands-On Exercises 33

Discussion 34

Procedure 35

Review Questions 43

Chapter 3 Understanding Video Surveillance Systems 45

Video Surveillance Systems 45

Cameras 46

Hands-On Exercises 60

Discussion 61

Procedure 61

Review Questions 69

Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71

Intrusion-Detection and Reporting Systems 71

Security Controllers 74

Sensors 77

Vehicle-Detection Sensors 82

Fire-Detection Sensors 85

Output Devices 87

Hands-On Exercises 90

Discussion 90

Procedure 92

Review Questions 94

Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97

Summary Points 97

Security Challenge Scenarios 101

Infrastructure Security Scenario 1 101

Infrastructure Security Scenario 2 102

Professional Feedback 102

Review Questions 107

Exam Questions 109

PART II SECURING LOCAL HOSTS 113

Chapter 6 Local Host Security in the Real World 115

Security Challenges 115

Computing Device Security Scenario 1 116

Computing Device Security Scenario 2 117

Summary 120

Chapter 7 Securing Devices 121

The Three Layers of Security 121

Securing Host Devices 123

Securing Outer-Perimeter Portals 124

Additional Inner-Perimeter Access Options 127

Hands-On Exercises 137

Objectives 137

Procedure 137

Review Questions 148

Chapter 8 Protecting the Inner Perimeter 149

The Inner Perimeter 149

Operating Systems 151

Operating System Security Choices 168

Common Operating System Security Tools 169

Using Local Administrative Tools 177

Implementing Data Encryption 182

Hands-On Exercises 188

Objectives 188

Resources 188

Discussion 189

Procedures 190

Tables 200

Lab Questions 201

Chapter 9 Protecting Remote Access 203

Protecting Local Computing Devices 203

Using a Secure Connection 204

Establishing and Using a Firewall 204

Installing and Using Anti-Malware Software 205

Removing Unnecessary Software 205

Disabling Nonessential Services 205

Disabling Unnecessary OS Default Features 205

Securing the Web Browser 205

Applying Updates and Patches 206

Requiring Strong Passwords 206

Implementing Local Protection Tools 206

Software-Based Local Firewalls 207

Using Local Intrusion-Detection Tools 209

Profile-Based Anomaly-Detection Systems 210

Threshold-Based Anomaly-Detection Systems 211

Configuring Browser Security Options 211

Configuring Security Levels 213

Configuring Script Support 214

Defending Against Malicious Software 218

Using Antivirus Programs 220

Using Antispyware 221

Hardening Operating Systems 222

Service Packs 222

Patches 222

Updates 223

Overseeing Application Software Security 223

Software Exploitation 223

Applying Software Updates and Patches 224

Hands-On Exercises 225

Objectives 225

Resources 225

Discussion 225

Procedures 226

Tables 241

Lab Questions 242

Chapter 10 Local Host Security: Review Questions and Hands-On Exercises 243

Summary Points 243

Security Challenge Scenarios 248

Computing Device Security Scenario 1 248

Computing Device Security Scenario 2 248

Professional Feedback 248

Review Questions 257

Exam Questions 259

PART III SECURING LOCAL NETWORKS 263

Chapter 11 Local Network Security in the Real World 265

Security Challenges 266

Local Network Security Scenario 1 266

Local Network Security Scenario 2 270

Summary 272

Chapter 12 Networking Basics 273

Understanding the Basics of Networking 273

Campus Area Networks or Corporate Area Networks (CANs) 274

Metropolitan Area Networks (MANs) 274

Wireless Local Area Networks (WLANs) 274

Storage Area Networks (SANs) 274

The OSI Networking Model 275

Layer 1: Physical 276

Layer 2: Data Link 276

Layer 3: Network 276

Layer 4: Transport 276

Layer 5: Session 276

Layer 6: Presentation 277

Layer 7: Application 277

Data Transmission Packets 277

OSI Layer Security 278

Network Topologies 280

Bus Topology 280

Ring Topology 280

Star Topology 281

Mesh Topology 282

Logical Topologies 282

Hands-On Exercises 283

Objectives 283

Resources 283

Discussion 283

Procedure 284

Lab Questions 295

Lab Answers 295

Chapter 13 Understanding Networking Protocols 297

The Basics of Networking Protocols 297

MAC Addresses 298

TCP/IP 299

Ethernet 309

Network Control Strategies 311

Hands-On Exercises 313

Objectives 313

Discussion 313

Procedures 314

Lab Questions 325

Lab Answers 326

Chapter 14 Understanding Network Servers 327

The Basics of Network Servers 327

Server Security 330

Network Administrators 331

Server Software Security 335

User Accounts 341

Network Authentication Options 347

Establishing Resource Controls 348

Maintaining Server Security 352

Vulnerability Scanning 358

Hands-On Exercises 361

Objectives 361

Resources 361

Discussion 362

Procedures 362

Lab Questions 382

Lab Answers 382

Chapter 15 Understanding Network Connectivity Devices 385

Network Switches 386

Routers 388

Gateways 390

Network Bridges 391

Wireless Network Connectivity 392

Network Connectivity Device Vulnerabilities 392

Network Connectivity Device Attacks 393

Network Connectivity Defense 397

Network Hardening 398

Hands-On Exercises 399

Objectives 399

Resources 399

Procedures 399

Lab Questions 404

Lab Answers 404

Chapter 16 Understanding Network Transmission Media Security 407

The Basics of Network Transmission Media 407

Copper Wire 408

Light Waves 410

Wireless Signals 412

Transmission Media Vulnerabilities 415

Securing Wireless Networks 415

Hands-On Exercises 417

Objectives 417

Resources 417

Procedure 417

Lab Questions 421

Lab Answers 421

Chapter 17 Local Network Security: Review Questions 423

Summary Points 423

Security Challenge Scenarios 432

Local Network Security Scenario 1 432

Local Network Security Scenario 2 432

Professional Feedback 432

Review Questions 443

PART IV SECURING THE PERIMETER 449

Chapter 18 Perimeter Security in the Real World 451

Security Challenges 451

Internet Security Scenario 1 451

Internet Security Scenario 2 454

Summary 455

Chapter 19 Understanding the Environment 457

The Basics of Internet Security 457

Understanding the Environment 460

Basic Internet Concepts 461

Internet Services 468

Standards and RFCs 470

Hands-On Exercises 471

Objectives 471

Resources 472

Discussion 472

Procedures 472

Lab Questions 486

Lab Answers 486

Chapter 20 Hiding the Private Network 487

Understanding Private Networks 487

Network Address Translation 488

Port Address Translation 489

Port Forwarding or Mapping 490

Network Segmentation 492

Software-Defined Networking 494

Hands-On Exercises 496

Objectives 496

Resources 496

Discussion 496

Procedure 497

Lab Questions 508

Lab Answers 509

Chapter 21 Protecting the Perimeter 511

Understanding the Perimeter 511

Firewalls 515

Firewall Considerations 517

Network Appliances 519

Proxy Servers 520

Demilitarized Zones (DMZs) 522

Single-Firewall DMZs 523

Dual-Firewall DMZs 524

Honeypots 525

Extranets 526

Hands-On Exercises 528

Objectives 528

Resources 528

Procedures 528

Lab Questions 534

Lab Answers 534

Chapter 22 Protecting Data Moving Through the Internet 535

Securing Data in Motion 535

Authentication 536

Encryption 542

Cryptography 543

Digital Certificates 545

Hash Tables 548

Cookies 548

CAPTCHAs 549

Virtual Private Networks 550

Hands-On Exercises 552

Objectives 552

Resources 552

Discussion 552

Procedures 552

Lab Questions 563

Lab Answers 563

Chapter 23 Tools and Utilities 565

Using Basic Tools 565

IFconfig/IPconfig 565

Whois 566

Nslookup 567

PING 567

Traceroute 568

Telnet 569

Secure Shell 570

Monitoring Tools and Software 570

Nagios 572

SolarWinds 572

Microsoft Network Monitor 572

Wireshark 572

Snort 573

Nmap 575

Nikto 575

OpenVAS 575

Metasploit 575

The Browser Exploitation Framework (BeEF) 576

Other Products 576

Hands-On Exercises 578

Objectives 578

Resources 578

Discussion 578

Procedures 579

Capturing a PING 583

Lab Questions 589

Lab Answers 589

Chapter 24 Identifying and Defending Against Vulnerabilities 591

Zero Day Vulnerabilities 591

Software Exploits 592

SQL Injection 594

Java 597

Other Software Exploits 599

Social Engineering Exploits 600

Phishing Attacks 600

Network Threats and Attacks 603

Broadcast Storms 603

Session-Hijacking Attacks 604

Dictionary Attacks 606

Denial of Service (DoS) Attacks 606

Tarpitting 611

Spam 612

Protecting Against Spam Exploits 613

Other Exploits 614

Transport Layer Security (TLS) Exploits 614

FREAK Exploits 615

Logjam Exploits 615

Hands-On Exercises 616

Objectives 616

Resources 616

Discussion 616

Procedures 616

Chapter 25 Perimeter Security: Review Questions and Hands-On Exercises 627

Summary Points 627

Security Scenario Review 637

Network Security Scenario 1 637

Network Security Scenario 2 637

Professional Feedback 637

Review Questions 644

Exam Questions 647

Appendix A 651

Appendix B 703

Appendix C 715

Index 727



About the Author :

CHARLES J. BROOKS is co-owner and vice president of Educational Technologies Group Inc., as well as co-owner of eITPrep LLP, an online training company.

CHRISTOPHER GROW
is the president of A.C.C.N.S. Consulting and the Technichal Services manager for Educational Technologies Group L.L.C. with 20+ years of IT/IS and cyber security experience.

PHILIP CRAIG
is the founder of BlackByte Cyber Security, LLC, a consultancy supporting the Pacific Northwest National Laboratory (PNNL) research and national security agendas.

DONALD SHORT is the President of One World Telecommunications, Inc., an Internet Service Provider in Kennewick.



Review :

"This book does very much what it says it does on the blurb, and thoroughly, effectively, and visually too." (Irish Tech News)


Best Sellers


Product Details
  • ISBN-13: 9781119362456
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Standards Information Network
  • Language: English
  • ISBN-10: 1119362458
  • Publisher Date: 31 Aug 2018
  • Binding: Digital (delivered electronically)
  • No of Pages: 784


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cybersecurity Essentials
John Wiley & Sons Inc -
Cybersecurity Essentials
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cybersecurity Essentials

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!