Shipping Weight:
.414|Dimensions:
7 x .5 x 9.25 inches
Share
Description
How Cybersecurity Really Works is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.
How Cybersecurity Really Works is the perfect introduction to cybersecurity. Whether you’re a computer science student or a business professional, it will teach you the basics without all the jargon.
This beginners guide covers different types of attacks, common tactics used by online adversaries, and defensive strategies you can use to protect yourself. You’ll learn what security professionals do, what an attack looks like from a cybercriminal’s viewpoint, and how to implement sophisticated cybersecurity measures on your own devices.
In addition, you’ll find explanations of topics like malware, phishing, and social engineering attacks, coupled with real-world examples and hands-on exercises to help you apply what you’ve learned. You’ll explore ways to bypass access controls, prevent infections from worms and viruses, and protect your cloud accounts from attackers.
You’ll also learn how to:
• Analyze emails to detect phishing attempts • Use SQL injection to attack a website • Examine malware from the safety of a sandbox environment • Use the command line to evaluate and improve your computer and network security • Deploy encryption and hashing to protect your files • Create a comprehensive risk management plan You can’t afford to ignore cybersecurity anymore, but attackers won’t wait while you read a long technical manual. That’s why How Cybersecurity Really Works teaches you just the essentials you need to think beyond antivirus and make the right decisions to keep the online monsters at bay.
About the Author
Sam Grubb is a cybersecurity consultant for a managed service provider that works with a large variety of clients. He has six years of experience teaching cybersecurity to both adults and teenagers and holds several cybersecurity certifications, including the Certified Information Systems Security Professional (CISSP) certification.
Please use your Email instead of your Username to login.
Caution: Deleting Your Account will permanently remove all associated data, which cannot be recovered.
Your cart's total less than the Gift Card value. If you checkout now, the remaining amount will elapse as Gift Cards are for one time use only. Continue Shopping to fully consume your Gift Card.
The Transaction was unsuccessfull. Please try again.