Table of contents : Cover Title Page Copyright and Credits Acknowledment About Packt Contributors Table of Contents Preface Chapter 1: Importance of Cybersecurity The history of data breaches Scenarios for security Understanding the attack surface The threat landscape The importance of securing the network and applications The history of breaches 1984 -- The TRW data breach 1990s -- Beginning of computer viruses and worms The years 2000-2010 How security helps to build trust Summary Chapter 2: Security Evolution -- From Legacy to Advanced, to ML and AI Legacy cybersecurity systems Signature-based security systemsNetwork cyber attacks Network security tools Transformations in cybersecurity Layered security New security threats Responses to the new threats Advancements in security technology to security 2.0 Anomaly-based security systems How ML and AI will play a larger role in cybersecurity Summary Further reading Chapter 3: Learning Cybersecurity Technologies Mobile security Loss or theft Software-related security issues Advanced data security Cloud security Modern day regulations Incidence response and forensics Enterprise security at scale Penetration testingTruSec training CQURE Academy Training with Troy Hunt Have I Been Pwned? DevSecOps IoT security User behavior analytics (UBA) Endpoint detection and response (EDR) Summary Further reading Chapter 4: Skills We Need for a Cybersecurity Career General cybersecurity roles Penetration testers and vulnerability testers Cybersecurity consultants Cybersecurity managers Cybersecurity analysts Cybersecurity engineers Chief Information Security Officers (CISOs) Chief Security Officers (CSOs) Computer system administrators Cryptographers Computer forensic experts Network security engineersInformation assurance technicians Data security analysts IT security compliance analysts System security specialists Skills to acquire in cybersecurity Foundation skills Risk management Networking Situational awareness Toolkits Security analyst skills Threat assessment Vulnerability assessment Log collection and analysis Active analysis Incidence response Disaster recovery Forensics Penetration testing skills Intelligence gathering Incidence reporting Restraint Security architecture skills Identity and access management Network configuration System hardeningChoosing skills to pick up based on current professional experience and skills Ethical hacking skills Application security skills Cloud security skills DevSecOps skills Threat and vulnerability assessment skills Information security management skills Cybersecurity litigation support skills Regulatory compliance and auditing skills Summary Further reading Chapter 5: Attacker Mindset The category of hackers The traits of hackers They are patient They are determined They are insensitive They are risk-takers They are careful They are deviant