The ABC of Cybersecurity

Share this Ebook

The ABC of Cybersecurity

By Mike Miller
English | 2020 | ASIN : B08MQD1M3N | 363 Pages | EPUB | 1.1 MB


In this book you will learn over 200 terms and concepts related to Cybersecurity. This book is designed for beginners or employees to have a better understanding and awareness of Threats and Vulnerabilities.
This book will teach you how to protect yourself and your Business from the most common Cyber-attacks in no time!

In Book 1 You will learn:
The Ultimate Goal of Cybersecurity
Understanding the CIA Triad & Defense in Depth
Understanding Threats, Exploits and Risks
Understanding Malware
Malware & General Countermeasures
How to Report Malware
Attacks on Portable Devices
Intercepted Communication & Countermeasures
Introduction to Social Networking
Social Networking Threats from Cybercriminals
Understanding Cross-site Request Forgery
Social Engineering Countermeasures
Understanding Metadata
Comprehending Outside and Inside Threats to Businesses
Introduction to Phishing
Phishing, Social Engineering & Vishing
How to Prevent Phishing Attacks
How to Report a Phishing Attack
Phishing Countermeasures
How to Report Phishing Attacks
Tips to Avoid Phishing Scams

In Book 2 You will learn:
How to define Incidents
Basic concepts of Incident Management
How to Define and Classify Incidents
How to prepare Policy and Plans for Incident Management
How to define Incident Responses
Understanding BIA, BCP, DRP, and IR Plans
Disaster Recovery Plan Basics
How to integrate BCP, IR and DRP Plans
How to create an Incident Response Team
IR Team Roles and Responsibilities
What Skillset the Response Team must have
How to train the IR Team
Must have IR Team Tools and Equipment
How to create an Incident Response Team
How to communicate with IR Stakeholders
How to share information with IR Stakeholders
How to use different IR Communication Channels
How to Communicate Incident Responses
How to monitor Incident Response Performance
How to Escalate an incident
How to Collect Data
How to Contain Incidents
How to start Investigating an Incident
Must have Skills for Investigators
Cybersecurity Incident Response Basics
Legal and Regulatory Considerations
How to Collect Evidence
Incident Analysis Basics
Reporting the Investigation
Forensics analysis basics and Test Metrics
How to test an IR Plan
How to Schedule an IR Test
How to Execute an IR Test
How to Conclude the Root Cause
How to upgrade our Controls
How to Evaluate the Response
What is FISMA, NIST, HIPAA, PCI-DSS and more…

Related post:  New Dimensions of Information Warfare

In Book 3 You will learn:
Viruses, Cryptomalware and Ransomware, Trojans, Rootkits, Keyloggers, Adware, Spyware,
Botnets, Logic Bomb, Backdoors, Social Engineering, Social Engineering Attacks,
Vishing, Tailgaiting, Impersonation, Dumpster Diving, Shoulder Surfing, Hoaxes,
Watering Hole Attack, DDoS Attack, Replay Attacks, Man in the Middle Attack,
Buffer Overflow Attack, SQL Injection Attack, LDAP Injection Attack,
XML Injection Attack, Cross-Site Scripting, Cross-Site Request Forgery,
Privilege Escalation, ARP Poisoning, Smurf Attack, DNS Poisoning,
Zero Day Attacks, Pass the Hash, Clickjacking, Session Hijacking,
Typo Squatting and URL Hijacking, Shimming, Refactoring, IP/MAC Spoofing,
Wireless Replay Attacks, IV Attack, Rogue Access Points, Evil Twin, WPS Attacks
Bluejacking and Bluesnarfing, NFC Attacks, Dissociation Attack,Brute Force Attack,
Dictionary Attacks, Birthday Attack, Rainbow Tables, Collision and Downgrade Attack, ,
Open Source Intelligence (OSINT), Penetration Test Steps, Active and Passive Reconnaissance and more…