Cybersecurity (Computer Science Fundamentals)
In the interconnected digital age, cybersecurity is paramount. "Cybersecurity" is your comprehensive guide to
155
57
1MB
English
Pages 297
Year 2023
Report DMCA / Copyright
DOWNLOAD EPUB FILE
Table of contents :
Preface
Cybersecurity
Module 1: Introduction to Cybersecurity
Module 1: Introduction to Cybersecurity
What is Cybersecurity?
Historical Overview of Cybersecurity
Cybersecurity Threat Landscape
Importance and Ethics of Cybersecurity
Module 2: Fundamentals of Information Security
Module 2: Fundamentals of Information Security
Information Security Principles
Confidentiality, Integrity, and Availability (CIA Triad)
Security Controls and Countermeasures
Security Policies and Procedures
Module 3: Cyber Threats and Attacks
Module 3: Cyber Threats and Attacks
Types of Cyber Threat Actors
Common Cyber Attacks (Phishing, Malware, DDoS)
Social Engineering Attacks
Insider Threats
Module 4: Vulnerability Assessment and Management
Module 4: Vulnerability Assessment and Management
Vulnerability Assessment Techniques
Common Vulnerabilities and Exploits
Patch Management
Risk Assessment and Mitigation
Module 5: Network Security
Module 5: Network Security
Network Security Fundamentals
Firewalls and Intrusion Detection Systems (IDS)
VPNs and Secure Communication
Network Access Control (NAC)
Module 6: Operating System Security
Module 6: Operating System Security
Securing Operating Systems (Windows, Linux, macOS)
User Account Management
Access Control Lists (ACLs)
Security Hardening
Module 7: Cryptography and Encryption
Module 7: Cryptography and Encryption
Principles of Cryptography
Encryption Algorithms (Symmetric vs. Asymmetric)
Digital Signatures and Certificates
Public Key Infrastructure (PKI)
Module 8: Web Application Security
Module 8: Web Application Security
Common Web Application Vulnerabilities (SQL Injection, XSS)
Security for Web Servers (HTTP vs. HTTPS)
Web Application Firewalls (WAF)
Secure Development Practices (OWASP Top Ten)
Module 9: Cloud Security
Module 9: Cloud Security
Cloud Computing Overview (IaaS, PaaS, SaaS)
Cloud Security Challenges
Identity and Access Management in the Cloud
Data Encryption in the Cloud
Module 10: Mobile and IoT Security
Module 10: Mobile and IoT Security
Mobile Device Security
Mobile App Security
Internet of Things (IoT) Security
Secure Development for Mobile and IoT
Module 11: Incident Response and Forensics
Module 11: Incident Response and Forensics
Incident Response Plan
Digital Forensics Fundamentals
Collecting and Preserving Digital Evidence
Cybersecurity Incident Case Studies
Module 12: Security Awareness and Training
Module 12: Security Awareness and Training
Employee Training and Awareness Programs
Social Engineering Prevention
Security Best Practices for End-Users
Phishing Simulation Exercises
Module 13: Identity and Access Management (IAM)
Module 13: Identity and Access Management (IAM)
IAM Principles
Single Sign-On (SSO)
Multi-Factor Authentication (MFA)
Identity and Access Governance
Module 14: Security in the Internet of Things (IoT)
Module 14: Security in the Internet of Things (IoT)
IoT Security Challenges
IoT Device Authentication
IoT Data Security
IoT Security Standards
Module 15: Legal and Ethical Aspects of Cybersecurity
Module 15: Legal and Ethical Aspects of Cybersecurity
Cybersecurity Laws and Regulations
Ethical Hacking and Responsible Disclosure
Privacy and Data Protection Laws
Intellectual Property and Cybersecurity
Module 16: Network Monitoring and Intrusion Detection
Module 16: Network Monitoring and Intrusion Detection
Network Traffic Analysis
Intrusion Detection Systems (IDS)
Security Information and Event Management (SIEM)
Threat Hunting
Module 17: Security in the Cloud
Module 17: Security in the Cloud
Cloud Security Models
Cloud Security Best Practices
Cloud Compliance and Auditing
Cloud Incident Response
Module 18: Secure Coding Practices
Module 18: Secure Coding Practices
Secure Software Development Lifecycle (SDLC)
Code Review and Testing
Buffer Overflow and Input Validation
Secure API Development
Module 19: Advanced Threats and APTs
Module 19: Advanced Threats and APTs
Advanced Persistent Threats (APTs)
Zero-Day Vulnerabilities
Rootkits and Advanced Malware
Nation-State Attacks
Module 20: Wireless Network Security
Module 20: Wireless Network Security
Wireless Network Fundamentals
Wi-Fi Security (WPA, WPA2, WPA3)
Wireless Network Attacks (Krack, Evil Twin)
Wireless Intrusion Detection
Module 21: Security for Emerging Technologies
Module 21: Security for Emerging Technologies
Blockchain Security
Artificial Intelligence (AI) Security
Quantum Computing and Cryptography
Augmented Reality (AR) and Virtual Reality (VR) Security
Module 22: Security Policy and Compliance
Module 22: Security Policy and Compliance
Developing Security Policies and Procedures
Compliance Frameworks (HIPAA, GDPR, PCI DSS)
Security Auditing and Compliance Reporting
Security Governance
Module 23: Cybersecurity in Critical Infrastructure
Module 23: Cybersecurity in Critical Infrastructure
Critical Infrastructure Protection
SCADA and Industrial Control Systems (ICS) Security
Power Grid and Energy Sector Security
Healthcare and Public Health Sector Security
Module 24: Capstone Project and Future Trends
Module 24: Capstone Project and Future Trends
Capstone Project Presentation
Current and Emerging Trends in Cybersecurity
Cybersecurity Career Paths and Certification
Course Review and Evaluation
Review Request
Embark on a Journey of ICT Mastery with CompreQuest Books