万本电子书0元读

万本电子书0元读

顶部广告

Cybersecurity: The Beginner's Guide电子书

售       价:¥

3人正在读 | 0人评论 9.8

作       者:Dr. Erdal Ozkaya

出  版  社:Packt Publishing

出版时间:2019-05-27

字       数:62.2万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Understand the nitty-gritty of Cybersecurity with ease Key Features * Align your security knowledge with industry leading concepts and tools * Acquire required skills and certifications to survive the ever changing market needs * Learn from industry experts to analyse, implement, and maintain a robust environment Book Description It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field. What you will learn * Get an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you best * Plan your transition into cybersecurity in an efficient and effective way * Learn how to build upon your existing skills and experience in order to prepare for your career in cybersecurity Who this book is for This book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful.
目录展开

Acknowledment

About Packt

Why subscribe?

Packt.com

Contributors

About the author

About the reviewers

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the color images

Conventions used

Get in touch

Reviews

Disclaimer

Importance of Cybersecurity

The history of data breaches

Scenarios for security

Understanding the attack surface

The threat landscape

The importance of securing the network and applications

The history of breaches

1984 – The TRW data breach

1990s – Beginning of computer viruses and worms

The years 2000-2010

How security helps to build trust

Summary

Security Evolution — From Legacy to Advanced, to ML and AI

Legacy cybersecurity systems

Signature-based security systems

Network cyber attacks

Network security tools

Transformations in cybersecurity

Layered security

New security threats

Responses to the new threats

Advancements in security technology to security 2.0

Anomaly-based security systems

How ML and AI will play a larger role in cybersecurity

Summary

Further reading

Learning Cybersecurity Technologies

Mobile security

Loss or theft

Software-related security issues

Advanced data security

Cloud security

Modern day regulations

Incidence response and forensics

Enterprise security at scale

Penetration testing

TruSec training

CQURE Academy

Training with Troy Hunt

Have I Been Pwned ?

DevSecOps

IoT security

User behavior analytics (UBA)

Endpoint detection and response (EDR)

Summary

Further reading

Skills We Need for a Cybersecurity Career

General cybersecurity roles

Penetration testers and vulnerability testers

Cybersecurity consultants

Cybersecurity managers

Cybersecurity analysts

Cybersecurity engineers

Chief Information Security Officers (CISOs)

Chief Security Officers (CSOs)

Computer system administrators

Cryptographers

Computer forensic experts

Network security engineers

Information assurance technicians

Data security analysts

IT security compliance analysts

System security specialists

Skills to acquire in cybersecurity

Foundation skills

Risk management

Networking

Situational awareness

Toolkits

Security analyst skills

Threat assessment

Vulnerability assessment

Log collection and analysis

Active analysis

Incidence response

Disaster recovery

Forensics

Penetration testing skills

Intelligence gathering

Incidence reporting

Restraint

Security architecture skills

Identity and access management

Network configuration

System hardening

Choosing skills to pick up based on current professional experience and skills

Ethical hacking skills

Application security skills

Cloud security skills

DevSecOps skills

Threat and vulnerability assessment skills

Information security management skills

Cybersecurity litigation support skills

Regulatory compliance and auditing skills

Summary

Further reading

Attacker Mindset

The category of hackers

The traits of hackers

They are patient

They are determined

They are insensitive

They are risk-takers

They are careful

They are deviant

Social characteristics of hackers

Lack of social skills

They have an inferiority complex

They are radical

They are rebellious

They lack social support

How hackers think (motivators)

Getting money (monetary gain)

Greed

Political power

Religious extremism

Curiosity

What can be learned from the psychology of hackers?

Summary

Further reading

Understanding Reactive, Proactive, and Operational Security

Proactive cyber defense

Small and medium-sized enterprises

Large organizations

Worrying attack trends

Implementing proactive security

Vulnerability assessment

Penetration testing

Social-engineering assessment

Web-application security assessment

Reactive cybersecurity

Implementing a reactive security strategy

Monitoring

Response

Disaster-recovery

Forensic investigations

Overview of operational security

Implementing operation security

The significance of the three security pillars

Security operations and continuous monitoring

Captive SOC (self-managed SOC)

Co-managed SOC

Fully managed SOC

Proactive versus reactive security

The threat intelligence system and its importance

Digital forensics and real-time incident response with SIEM

Getting started with security automation and orchestration

Step 1 – start small

Step 2 – learn to analyze (incidents)

Step 3 – learn to monitor wisely

Three common security orchestration, automation, and response use cases

Phishing emails

Malicious network traffic

Vulnerability management

Summary

Further reading

Networking, Mentoring, and Shadowing

Mentoring

They provide knowledge and wisdom

They give insights on where you should improve

They give encouragement

Mentors create boundaries and ensure discipline

Mentors give unfiltered opinions

They are trustworthy advisers

They can be good connectors

They have lengthy experience that you can learn from

Mentors are satisfied by your success

How to choose a mentor

Compatibility

The mentor's strengths and weaknesses

Contrast

Expertise

Trust

Networking

Job opportunities

Career advice and support

Building confidence

Developing personal relationships

Access to resources

Discovery

Tips for establishing a professional network

Build genuine relationships

Offer to help

Diversify your events

Keep in touch

Shadowing

Regular briefings

Observation

Hands-on

Preparing for job shadowing

Preparing questions beforehand

Taking notes

Picking an appropriate time

Gratitude

Summary

Further reading

Cybersecurity Labs

ILT

VILT

Self-study

Self-study cybersecurity labs

The cross-site scripting (XSS) lab

The Secure Socket Layer (SSL) configuration lab

Acunetix Vulnerability Scanner

Sucuri

Valhalla

F-Secure Router Checker

Hacking-Lab

The Root Me password generator

CTF365

Mozilla Observatory

Free online training providers

IT master's degrees and Charles Sturt University

Microsoft Learn

edX

Khan Academy

Cybersecurity: Attack and Defense Strategies

Building your own test lab

Summary

Further reading

Knowledge Check and Certifications

The need to get a certification

They show employers that you take initiative

They reflect your abilities in a specific niche

They equip you with knowledge for a specific job

They can kickstart a career in cybersecurity

They give your clients confidence

They market you

Choosing certifications and vendors

The reputation of the vendor

The length of the course

Feedback from former learners

Support for learners

The credibility of the certification

Job market demands

Effective cybersecurity requires participation from all

What's in it for me?

A culture of continuous monitoring

CompTIA Security+

CompTIA PenTest+

CompTIA Cybersecurity Analyst (CySA+)

CompTIA Advanced Security Practitioner (CASP+)

EC-Council, Certified Ethical Hacker (CEH)

EC-Council, Computer Hacking Forensic Investigator (CHFI)

EC-Council cybersecurity career pathway

Certified Information Systems Security Professional (CISSP)

Certified Cloud Security Professional (CCSP)

Certified Information Systems Auditor (CISA)

Certified Information Security Manager (CISM)

Which (ISC)² Certification is right for you?

Global Information Assurance Certification (GIAC) Certifications

GIAC Information Security Fundamentals (GISF)

GIAC Security Essentials Certification (GSEC)

GIAC Certified Perimeter Protection Analyst (GPPA)

GIAC Certified Intrusion Analyst (GCIA)

SANS certifications

Cisco certifications

Cisco Certified Entry Networking Technician (CCENT)

CCNA Routing and Switching

Offensive Security Certified Professional (OSCP)/Offensive Security's Penetration Testing with Kali Linux (PwK)

Offensive Security's Penetration Testing with Kali Linux (PwK)

CertNexsusCybersec first responder (CFR)

The NIST cybersecurity framework

Identify

Protect

Detect

Respond

Recover

Summary

Further reading

Security Intelligence Resources

Checklist resources

Security Checklist

Cybersecurity advice and reliable information sources

Cybersecurity courses

SlashNext

Springboard

Cybrary

US Department of Homeland Security

Cybersecurity threat-intelligence resources

Structured Threat Information Expression (STIX)

Trusted Automated Exchange of Intelligence Information (TAXII)

OASIS Open Command and Control (OpenC2)

Traffic Light protocol (TLP)

Cyber Analytics Repository by MITRE (CAR)

IntelMQ by ENISA

Recorded Future

Anomali STAXX

Cyberthreat-intelligence feeds

Summary

Further reading

Expert Opinions on Getting Started with Cybersecurity

Ann Johnson

Dr. Emre Eren Korkmaz

Robin Wright

Ozan Ucar and Dr. Orhan Sari

Chaim Sanders

Yuri Diogenes

Dr. Ivica Simonovski

Dr. Mike Jankowski-Lorek

Judd Wybourn

Onur Ceran

Neil Rerup

Girard Moussa

Kaushal K Chaudhary

Will Kepel

Martin Hale

Ahmed Nabil Mahmoud

Deepayan Chanda

Gary Duffield

Dr. Erdal Ozkaya

How to Get Hired in Cybersecurity, Regardless of Your Background

Getting into cybersecurity from a technical background

Cybersecurity jobs to target

Hard versus soft skills

Getting started in cybersecurity with a non-technical background

Transitioning from your current technical role

Demonstrate your worth – before you apply

Read, listen, watch, and talk

What should be in your CV?

Checklist for what to include in a CV

Your journey from first contact to day one at work

Job interview types

Structured interviews

Unstructured interviews

Semi-structured interviews

Common cybersecurity interview questions

The general interview process

Commonly asked cybersecurity interview questions

Personal questions

Communication skills

Problem solving and judgement skills

Motivation and passion

Common tips

Consider these points before accepting a job

The view from a hiring manger or recruiter

What is the hiring process for recruiters?

How to get hired at Microsoft

How to get hired at Cisco

How to get hired at Google

How Google's CEO did his interview when he was first hired in 2004!

How to get hired at Exxon

Popular job search websites you should know

Summary

Other Books You May Enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部