Introduction to Cybersecurity

Chapter 1 The Need for Cybersecurity
1.0 Introduction
1.1 Personal Data
1.2 Organization Data
1.3 Attackers and Cybersecurity Professionals
1.4 Cyberwarfare
Chapter 2 Attacks, Concepts and Techniques
2.0 Introduction
2.1 Analyzing a Cyberattack
2.2 The Cybersecurity Landscape
Chapter 3 Protecting Your Data and Privacy
3.1 Protecting Your Data
3.2 Safeguarding Your Online Privacy
Chapter 4 Protecting the Organization
4.0 Introduction
4.1 Firewalls
4.2 Behavior Approach to Cybersecurity
4.3 Cisco’s Approach to Cybersecurity
Chapter 5 Will Your Future Be in Cybersecurity?
5.0 Introduction
5.1 Cybersecurity Education and Careers

 

 

Cybersecurity Essentials

Chapter 1 Cybersecurity – A World of Wizards, Heroes, and Criminals
1.0 Introduction
1.2 Cyber Criminals versus Cyber Heroes
1.3 Threats to the Kingdom
1.4 The Dark Forces of Cybersecurity
1.5 Creating More Heroes
Chapter 2 The Cybersecurity Sorcery Cube
2.0 Introduction
2.1 The Cybersecurity Sorcery Cube

2.2 CIA Triad
2.3 States of Data
2.4 Cybersecurity Countermeasures
2.5 IT Security Management Framework
Chapter 3 Cybersecurity Threats, Vulnerabilities, and Attacks
3.0 Introduction
3.1 Malware and Malicious Code
3.2 Trickery
3.3 Attacks
Chapter 4 The Art of Protecting Secrets
4.0 Introduction
4.1 Cryptography
4.2 Access Controls
4.3 Obscuring Data
Chapter 5 The Art of Ensuring Integrity
5.0 Introduction
5.1 Types of Data Integrity Controls
5.2 Digital Signatures
5.3 Certificates
5.4 Database Integrity Enforcement
Chapter 6 The Realm of Five Nines
6.0 Introduction
6.1 High Availability
6.2 Measures to Improve Availability
6.3 Incident Response
6.4 Disaster Recovery
Chapter 7 Fortifying the Kingdom
7.0 Introduction
7.1 Defending Systems and Devices
7.2 Server Hardening
7.3 Network Hardening
7.4 Physical Security
Chapter 8 Joining the Order of Cybersecurity Specialists
8.0 Introduction
8.1 Cybersecurity Domains
8.2 Understanding the Oath of Membership
8.3 Next Step