|
1 Cybersecurity for Beginners |
|
|
1 | (20) |
|
1.1 Introduction to Cybersecurity |
|
|
1 | (1) |
|
1.2 Necessity of Cybersecurity |
|
|
2 | (1) |
|
1.3 Cybersecurity Challenges |
|
|
2 | (3) |
|
1.4 Cybersecurity Threats |
|
|
5 | (1) |
|
1.5 Cyberattack Life Cycle |
|
|
5 | (1) |
|
1.6 Cybersecurity Principles |
|
|
6 | (1) |
|
1.7 Cybersecurity Standards |
|
|
7 | (1) |
|
1.8 Cybersecurity Framework |
|
|
8 | (1) |
|
1.9 Fundamentals of Cybersecurity |
|
|
9 | (1) |
|
1.10 Why is Cybersecurity Important? |
|
|
9 | (2) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
1.11 Why Do We Implement Cybersecurity? |
|
|
11 | (1) |
|
1.12 Cybersecurity Attacks and Their Types |
|
|
12 | (6) |
|
|
13 | (1) |
|
|
14 | (1) |
|
1.12.3 Denial-of-Service Attacks |
|
|
14 | (2) |
|
1.12.4 SQL Injection Attacks |
|
|
16 | (1) |
|
1.12.5 Cross-Site Scripting |
|
|
16 | (1) |
|
1.12.6 Man-In-The-Middle Attacks |
|
|
17 | (1) |
|
1.13 Cybersecurity Development |
|
|
18 | (1) |
|
1.14 Advantages of Cyber Security |
|
|
18 | (1) |
|
1.15 Applications of Cybersecurity |
|
|
19 | (2) |
|
2 The Basics of Hacking and Penetration Testing |
|
|
21 | (26) |
|
|
21 | (1) |
|
|
22 | (2) |
|
|
24 | (3) |
|
2.4 Denial-of-Service Attacks (DoS) |
|
|
27 | (4) |
|
|
31 | (16) |
|
2.5.1 Penetration Testing Versus Vulnerability Assessment |
|
|
34 | (1) |
|
2.5.2 Types of Penetration Testing |
|
|
34 | (2) |
|
2.5.3 Penetration Testing---Manual and Automated |
|
|
36 | (2) |
|
2.5.4 Penetration Testing Tools |
|
|
38 | (1) |
|
2.5.5 Infrastructure Penetration Testing |
|
|
38 | (3) |
|
2.5.6 Penetration Testing---Tester |
|
|
41 | (1) |
|
2.5.7 Penetration Testing---Report Writing |
|
|
42 | (2) |
|
2.5.8 Penetration Testing---Ethical Hacking |
|
|
44 | (1) |
|
2.5.9 Penetration Testing Limitations |
|
|
45 | (2) |
|
|
47 | (16) |
|
|
47 | (1) |
|
3.2 Classifications of Hacker |
|
|
47 | (2) |
|
|
49 | (1) |
|
3.4 Common Hacking Techniques |
|
|
49 | (5) |
|
|
51 | (3) |
|
3.5 Developing Ethical Hacking Plan |
|
|
54 | (1) |
|
3.6 Types of Security Testing |
|
|
54 | (3) |
|
3.7 Ethical Hacking Tools |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (4) |
|
4 Networking AH-In-One for Dummies |
|
|
63 | (24) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (5) |
|
4.3.1 Types of Topologies |
|
|
64 | (5) |
|
4.4 Operating System for the Network |
|
|
69 | (4) |
|
|
73 | (1) |
|
4.5.1 Range of the Network Hardware |
|
|
73 | (1) |
|
4.5.2 Computer Components of the Necessary Hardware |
|
|
73 | (1) |
|
|
74 | (2) |
|
4.7 The Function of Prediction |
|
|
76 | (1) |
|
|
77 | (1) |
|
4.9 Defense Against Computers |
|
|
78 | (1) |
|
4.10 Sharing of the Network |
|
|
78 | (3) |
|
4.10.1 Operation of Network Sharing |
|
|
79 | (2) |
|
4.11 Goals and Competences |
|
|
81 | (6) |
|
4.11.1 Appearances of Problem-Solving |
|
|
82 | (5) |
|
5 Effective Cybersecurity |
|
|
87 | (16) |
|
5.1 Attacks and Vulnerabilities |
|
|
87 | (1) |
|
5.2 Community of Security of Information |
|
|
87 | (1) |
|
5.3 Cybersecurity Managed |
|
|
88 | (2) |
|
5.4 Network Security Governance Framework |
|
|
90 | (1) |
|
5.5 Risk Assessment of Structures |
|
|
91 | (1) |
|
5.6 Security Evaluation Aim |
|
|
92 | (2) |
|
5.6.1 Methodological Approach |
|
|
92 | (1) |
|
5.6.2 Checking for Protection |
|
|
93 | (1) |
|
5.6.3 Protection and Privacy |
|
|
93 | (1) |
|
|
94 | (1) |
|
5.8 Study of the Cyber Danger |
|
|
95 | (2) |
|
5.9 Risk Evaluation Forms |
|
|
97 | (1) |
|
5.10 Safety for Software Development |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (4) |
|
|
103 | (14) |
|
6.1 What Does Malware Do? |
|
|
103 | (1) |
|
6.2 How to Protect Against Malware? |
|
|
104 | (1) |
|
6.3 Malware Analyzing Tools |
|
|
105 | (7) |
|
6.3.1 Basic Malware Exploring Tools |
|
|
105 | (2) |
|
6.3.2 Dynamic Malware Analyzing Tools |
|
|
107 | (3) |
|
6.3.3 Difference Between Static and Dynamic Malware Analysis Tools |
|
|
110 | (1) |
|
6.3.4 Warning Signs to Identify Malware Infection |
|
|
111 | (1) |
|
6.4 Most Dangerous Malware of 2018 |
|
|
112 | (5) |
|
6.4.1 Malware Detection Techniques Used by Antivirus |
|
|
112 | (2) |
|
6.4.2 Tips to Prevents the System from Malware Actions |
|
|
114 | (3) |
|
|
117 | (12) |
|
7.1 Importance of Firewalls |
|
|
117 | (1) |
|
|
118 | (1) |
|
7.3 How Does Firewall Works |
|
|
118 | (1) |
|
|
119 | (5) |
|
7.5 Benefits of Firewalls |
|
|
124 | (1) |
|
7.6 Advantages and Disadvantages of Firewalls |
|
|
125 | (1) |
|
7.7 Firewall Threats and Vulnerability |
|
|
125 | (4) |
|
|
129 | (12) |
|
8.1 Evaluation of Cryptography |
|
|
129 | (1) |
|
8.2 Features of Cryptography |
|
|
130 | (1) |
|
8.3 Types of Cryptography |
|
|
131 | (1) |
|
8.4 Cryptography and Network Security Principles |
|
|
132 | (1) |
|
8.5 Cryptographic Algorithms |
|
|
133 | (2) |
|
8.6 Tools for Cryptography |
|
|
135 | (2) |
|
8.7 Advantages and Disadvantages of Cryptography |
|
|
137 | (1) |
|
8.8 Applications of Cryptography |
|
|
138 | (3) |
|
9 Control Physical and Logical Access to Assets |
|
|
141 | (8) |
|
9.1 Managing Access to Assets |
|
|
141 | (1) |
|
9.2 Why Access Control is Required: The CIA Triad |
|
|
142 | (1) |
|
9.3 Classification of Access Control |
|
|
143 | (6) |
|
9.3.1 Preventive Access Control |
|
|
144 | (1) |
|
9.3.2 Detective Access Control |
|
|
144 | (1) |
|
9.3.3 Corrective Access Control |
|
|
144 | (1) |
|
9.3.4 Deterrent Access Control |
|
|
144 | (1) |
|
9.3.5 Recovery Access Control |
|
|
145 | (1) |
|
9.3.6 Directive Access Control |
|
|
145 | (1) |
|
9.3.7 Compensation Access Control |
|
|
145 | (1) |
|
9.3.8 Administrative Access Controls |
|
|
146 | (1) |
|
9.3.9 Logical/Technical Controls |
|
|
146 | (1) |
|
9.3.10 Physical Access Controls |
|
|
146 | (3) |
|
10 Manage the Identification and Authentication of People, Devices, and Services |
|
|
149 | (10) |
|
10.1 Registration and Identity Proofing |
|
|
150 | (1) |
|
10.2 Authorization and Accountability |
|
|
150 | (2) |
|
10.3 Effective Password Mechanisms |
|
|
152 | (7) |
|
11 Integrate Identity as a Third-Party Service |
|
|
159 | (8) |
|
11.1 Identity Management Techniques |
|
|
159 | (5) |
|
11.2 Credential Management Systems |
|
|
164 | (3) |
|
12 Implement and Manage Authorization Mechanisms |
|
|
167 | (6) |
|
13 Managing the Identity and Access Provisioning Life Cycle |
|
|
173 | (8) |
|
14 Conduct Security Control Testing |
|
|
181 | (12) |
|
15 Collect Security Process Data |
|
|
193 | (8) |
|
16 Recovery Strategies for Database |
|
|
201 | (8) |
|
17 Analyze Test Output and Generate a Report |
|
|
209 | (6) |
|
18 Ensure Appropriate Asset Retention |
|
|
215 | (8) |
|
19 Determine Information and Security Controls |
|
|
223 | (8) |
References |
|
231 | |