Oblasti, naše knjige

Web design

Java, JavaScript, JScript, Perl

C++ Visual C++ C#

Apple - MAC OS X

Visual Basic .NET, VBA, V. Studio

Android

PHP I MYSQL

FULL STACK DEVELOPMENT

Python programiranje

WordPress

AutoCad, ArchiCAD, SolidWorks, Catia, Pro/Engineer

Mašinsko učenje

Access

Animacija

Audio, Multimedia, Video

Baze podataka

Cloud

CSS

Delphi

Digitalna fotografija

Django

E-komerc

ECDL

GOOGLE

Grafika, Dizajn, Štampa

Hardver

Internet

Joomla

jQuery

Mreže

MS Office

Obrada teksta

OFFICE 2013

Programiranje

Raspberry PI

Rečnici

Robotika

Ruby i Ruby on Rails

Sertifikati

SQL Server

Statistika

Tabele

Telekomunikacije

Unix, Linux

Windows

Windows 7

Windows 8

Zaštita i sigurnost

 

Oblasti, drugi izdavači

Alternativna učenja

Antropologija

Arheologija

Arhitektura

Astrologija

Astronomija

Audio kursevi + knjige

Autobiografija

Automobili

Bajke

Biografija

Biološke nauke

Botanika

Dečije knjige

Dizajn

Domaće pripovetke

Domaći roman

Drama

E-knjiga

Ekologija

Ekonomija

Elektrotehnika

Enciklopedija

Esejistika

Etika

Fantastika

Film

Filologija

Filozofija

Fizika

Fotografija

Geografija

Geologija

Građevinarstvo

Hemija

Hidrotehnika

Hobi

Horor

Humor

Intervju

Istorija

Istorija i teorija književnosti

Istorija umetnosti

Istorijski roman

Knjiga posle posla - Beletristika i ostala izdanja

Knjižare i naše knjige

Književna kritika

Kuvari, hrana i piće

Leksikografija

Lingvistika

Ljubavni roman

logo

Magija

Marketing

Mašinstvo

Matematika

Medicina

Memoari

Menadžment

Modeliranje podataka

Monografija

Muzika

Nagrađivanje knjige

Naučna fantastika

OpenOffice.org

Operativni sistemi

Oracle

Organizacione nauke

Pedagogija

Pisci u medijima

Ples

Poezija

Politika

Poljoprivreda

Popularna medicina

Popularna nauka

Popularna psihologija

Posao

Pozorište

Pravo

Pravoslavlje

Primenjene nauke

Pripovetke

Prirodne nauke

Priručnik

Psihologija

Publicistika

Putopis

Religija

Roman

Satira

Saveti

Slikarstvo

Socijalna mreža - Facebook

Sociologija

Sport

Sport i hobi

Strip

Tableti

Tehnologija

Triler

Turizam

Twitter

Udžbenici

Umetnost

Urbanizam

UX DIZAJN

Zoologija

 

Zaštita i sigurnost

 

Cybersecurity: The Beginner's Guide

 

Cybersecurity: The Beginner's Guide

Autor: Dr. Erdal Ozkaya
Broj strana: 390
ISBN broj: 9781789616194
Izdavač: PACKT PUBLISHING
Godina izdanja: 2019.

Pregleda (30 dana / ukupno): 9 / 147

Predlog za prevod

  • Twitter
  • Facebook
  • Google plus
  • Linkedin
  • Pinterest
  • Email

 

 

  • Get an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you best
  • Plan your transition into cybersecurity in an efficient and effective way
  • Learn how to build upon your existing skills and experience in order to prepare for your career in cybersecurity

It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field.

  • Align your security knowledge with industry leading concepts and tools
  • Acquire required skills and certifications to survive the ever changing market needs
  • Learn from industry experts to analyse, implement, and maintain a robust environment

Table of contents

1 Importance of Cybersecurity
The history of data breaches
Scenarios for security
Understanding the attack surface
Summary

2 Security Evolution — From Legacy to Advanced, to ML and AI
Legacy cybersecurity systems
Transformations in cybersecurity
Advancements in security technology to security 2.0
How ML and AI will play a larger role in cybersecurity
Summary
Further reading

3 Learning Cybersecurity Technologies
Mobile security
Advanced data security
Cloud security
Modern day regulations
Incidence response and forensics
Enterprise security at scale
Penetration testing
DevSecOps
IoT security
User behavior analytics (UBA)
Endpoint detection and response (EDR)
Summary
Further reading

4 Skills We Need for a Cybersecurity Career
General cybersecurity roles
Skills to acquire in cybersecurity
Choosing skills to pick up based on current professional experience and skills
Summary
Further reading

5 Attacker Mindset
The category of hackers
The traits of hackers
Social characteristics of hackers
How hackers think (motivators)
What can be learned from the psychology of hackers?
Summary
Further reading

6 Understanding Reactive, Proactive, and Operational Security
Proactive cyber defense
Reactive cybersecurity
Overview of operational security
The significance of the three security pillars
Security operations and continuous monitoring
Digital forensics and real-time incident response with SIEM
Summary
Further reading

7 Networking, Mentoring, and Shadowing
Mentoring
Networking
Shadowing
Summary
Further reading

8 Cybersecurity Labs
ILT
VILT
Self-study
Self-study cybersecurity labs
Summary
Further reading

9 Knowledge Check and Certifications
The need to get a certification
Choosing certifications and vendors
Effective cybersecurity requires participation from all
CompTIA PenTest+
CompTIA Cybersecurity Analyst (CySA+)
EC-Council, Certified Ethical Hacker (CEH)
EC-Council, Computer Hacking Forensic Investigator (CHFI)
Certified Information Systems Security Professional (CISSP)
Certified Cloud Security Professional (CCSP)
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Global Information Assurance Certification (GIAC) Certifications
Cisco certifications
Offensive Security Certified Professional (OSCP)/Offensive Security's Penetration Testing with Kali Linux (PwK)
Offensive Security's Penetration Testing with Kali Linux (PwK)
CertNexsusCybersec first responder (CFR)
The NIST cybersecurity framework
Summary
Further reading

10 Security Intelligence Resources
Checklist resources
Cybersecurity advice and reliable information sources
Cybersecurity courses
Cybersecurity threat-intelligence resources
Cyberthreat-intelligence feeds
Summary
Further reading

11 Expert Opinions on Getting Started with Cybersecurity
Ann Johnson
Dr. Emre Eren Korkmaz
Robin Wright
Ozan Ucar and Dr. Orhan Sari
Chaim Sanders
Yuri Diogenes
Dr. Ivica Simonovski
Dr. Mike Jankowski-Lorek
Judd Wybourn
Onur Ceran
Neil Rerup
Girard Moussa
Kaushal K Chaudhary
Will Kepel
Martin Hale
Ahmed Nabil Mahmoud
Deepayan Chanda
Dr. Erdal Ozkaya

12 How to Get Hired in Cybersecurity, Regardless of Your Background
Getting into cybersecurity from a technical background
Cybersecurity jobs to target
Getting started in cybersecurity with a non-technical background
Transitioning from your current technical role
Your journey from first contact to day one at work
Job interview types
The view from a hiring manger or recruiter
Popular job search websites you should know
Summary

 

Budite prvi koji će ostaviti komentar.

Ostavite komentar Ostavite komentar

 

Preporučujemo

 

 

CISSP in 21 Days - Second Edition

2. CISSP in 21 Days - Second Edition

Boost your confidence and get the competitive edge you need to crack the exam in just 21 days!

Predlog za prevod

Više o knjizi Više o knjizi

 

OpenCV 4 for Secret Agents - Second Edition

3. OpenCV 4 for Secret Agents - Second Edition

Turn futuristic ideas about computer vision and machine learning into demonstrations that are both functional and entertaining

Predlog za prevod

Više o knjizi Više o knjizi