Veze, linkovi
Kompjuter biblioteka
Korpa
Cybersecurity: The Beginner's Guide | Dr. Erdal Ozkaya
Cybersecurity: The Beginner's Guide

Zaštita i sigurnost Zaštita i sigurnost

Cybersecurity: The Beginner's Guide

Autor: Dr. Erdal Ozkaya
Broj strana: 390
ISBN broj: 9781789616194
Izdavač: PACKT PUBLISHING PACKT PUBLISHING
Godina izdanja: 2019.

Pregleda (30 dana / ukupno): 21 / 186

                 
Twitter   Facebook   Linkedin   Pinterest   Email
                 
Predlog za prevod

• Isporuka za 24 časa
• Plaćanje poštaru

 

  • Get an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you best
  • Plan your transition into cybersecurity in an efficient and effective way
  • Learn how to build upon your existing skills and experience in order to prepare for your career in cybersecurity

It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field.

  • Align your security knowledge with industry leading concepts and tools
  • Acquire required skills and certifications to survive the ever changing market needs
  • Learn from industry experts to analyse, implement, and maintain a robust environment

Table of contents

1 Importance of Cybersecurity
The history of data breaches
Scenarios for security
Understanding the attack surface
Summary

2 Security Evolution — From Legacy to Advanced, to ML and AI
Legacy cybersecurity systems
Transformations in cybersecurity
Advancements in security technology to security 2.0
How ML and AI will play a larger role in cybersecurity
Summary
Further reading

3 Learning Cybersecurity Technologies
Mobile security
Advanced data security
Cloud security
Modern day regulations
Incidence response and forensics
Enterprise security at scale
Penetration testing
DevSecOps
IoT security
User behavior analytics (UBA)
Endpoint detection and response (EDR)
Summary
Further reading

4 Skills We Need for a Cybersecurity Career
General cybersecurity roles
Skills to acquire in cybersecurity
Choosing skills to pick up based on current professional experience and skills
Summary
Further reading

5 Attacker Mindset
The category of hackers
The traits of hackers
Social characteristics of hackers
How hackers think (motivators)
What can be learned from the psychology of hackers?
Summary
Further reading

6 Understanding Reactive, Proactive, and Operational Security
Proactive cyber defense
Reactive cybersecurity
Overview of operational security
The significance of the three security pillars
Security operations and continuous monitoring
Digital forensics and real-time incident response with SIEM
Summary
Further reading

7 Networking, Mentoring, and Shadowing
Mentoring
Networking
Shadowing
Summary
Further reading

8 Cybersecurity Labs
ILT
VILT
Self-study
Self-study cybersecurity labs
Summary
Further reading

9 Knowledge Check and Certifications
The need to get a certification
Choosing certifications and vendors
Effective cybersecurity requires participation from all
CompTIA PenTest+
CompTIA Cybersecurity Analyst (CySA+)
EC-Council, Certified Ethical Hacker (CEH)
EC-Council, Computer Hacking Forensic Investigator (CHFI)
Certified Information Systems Security Professional (CISSP)
Certified Cloud Security Professional (CCSP)
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Global Information Assurance Certification (GIAC) Certifications
Cisco certifications
Offensive Security Certified Professional (OSCP)/Offensive Security's Penetration Testing with Kali Linux (PwK)
Offensive Security's Penetration Testing with Kali Linux (PwK)
CertNexsusCybersec first responder (CFR)
The NIST cybersecurity framework
Summary
Further reading

10 Security Intelligence Resources
Checklist resources
Cybersecurity advice and reliable information sources
Cybersecurity courses
Cybersecurity threat-intelligence resources
Cyberthreat-intelligence feeds
Summary
Further reading

11 Expert Opinions on Getting Started with Cybersecurity
Ann Johnson
Dr. Emre Eren Korkmaz
Robin Wright
Ozan Ucar and Dr. Orhan Sari
Chaim Sanders
Yuri Diogenes
Dr. Ivica Simonovski
Dr. Mike Jankowski-Lorek
Judd Wybourn
Onur Ceran
Neil Rerup
Girard Moussa
Kaushal K Chaudhary
Will Kepel
Martin Hale
Ahmed Nabil Mahmoud
Deepayan Chanda
Dr. Erdal Ozkaya

12 How to Get Hired in Cybersecurity, Regardless of Your Background
Getting into cybersecurity from a technical background
Cybersecurity jobs to target
Getting started in cybersecurity with a non-technical background
Transitioning from your current technical role
Your journey from first contact to day one at work
Job interview types
The view from a hiring manger or recruiter
Popular job search websites you should know
Summary

 

Budite prvi koji će ostaviti komentar.

Ostavite komentar Ostavite komentar

 

Preporučujemo

Becoming the Hacker

Becoming the Hacker

Computer Security Art and Science

Computer Security Art and Science

Veze, linkovi
Linkedin Twitter Facebook
 
     
 
© Sva prava pridržana, Kompjuter biblioteka, Beograd, Obalskih radnika 4a, Telefon: +381 11 252 0 272