Cybersecurity Essentials is organized into four parts that cover the four distinct challenges of creating an effective cybersecurity securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Each part begins with a chapter summarizing the fundamental concepts of that challenge, including real-world scenarios that show readers how these vulnerabilities look in everyday computing. Each part concludes with a chapter that provides a summary of the key concepts, review questions that help readers assess their understanding of key concepts, and hands-on exercises (which circle back to the scenarios they were presented in the summary chapter at the outset of the part) that empower readers to use their new skills. Cybersecurity Essentials
Infrastructure Security Fundamentals Basic Security and Surveillance Systems Intrusion Detection and Reporting Systems Local Host Security Securing Devices Protecting the Inner Perimeter Protecting Remote Access Local Network Security Network Topologies and Protocols Network Control Strategies Network Servers and Connectivity Devices Network Transmission Security and Hardening Hiding Private Networks Protecting Data Moving Through the Internet Identifying and Defending Against Vulnerabilities