Text
Cybersecurity essentials
Table of contents
PART I SECURING THE INFRASTRUCTURE
Chapter 1 Infrastructure Security in the Real World
Chapter 2 Understanding Access-Control and Monitoring Systems
Chapter 3 Understanding Video Surveillance Systems
Chapter 4 Understanding Intrusion-Detection and Reporting Systems
Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises
PART II SECURING LOCAL HOSTS
Chapter 6 Local Host Security in the Real World
Chapter 7 Securing Devices
Chapter 8 Protecting the Inner Perimeter
Chapter 9 Protecting Remote Access
Chapter 10 Local Host Security: Review Questions and Hands-On Exercises
PART III SECURING LOCAL NETWORKS
Chapter 11 Local Network Security in the Real World
Chapter 12 Networking Basics
Chapter 13 Understanding Networking Protocols
Chapter 14 Understanding Network Servers 327
Chapter 15 Understanding Network Connectivity Devices
Chapter 16 Understanding Network Transmission Media Security
Chapter 17 Local Network Security: Review Questions
PART IV SECURING THE PERIMETER
Chapter 18 Perimeter Security in the Real World
Chapter 19 Understanding the Environment
Chapter 20 Hiding the Private Network
Chapter 21 Protecting the Perimeter
Chapter 22 Protecting Data Moving Through the Internet
Chapter 23 Tools and Utilities
Chapter 24 Identifying and Defending Against Vulnerabilities
Chapter 25 Perimeter Security: Review Questions and Hands-On Exercises
No other version available