Get Free Shipping on orders over $79
How Cybersecurity Really Works : A Hands-On Guide for Total Beginners - Sam Grubb

How Cybersecurity Really Works

A Hands-On Guide for Total Beginners

By: Sam Grubb

eText | 15 June 2021

At a Glance

eText


$47.18

or 4 interest-free payments of $11.79 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.

You don't need a technical background to understand core cybersecurity concepts and their practical applications - all you need is this book. It covers all the important stuff and leaves out the jargon, giving you a broad view of how specific attacks work and common methods used by online adversaries, as well as the controls and strategies you can use to defend against them.

Each chapter tackles a new topic from the ground up, such as malware or social engineering, with easy-to-grasp explanations of the technology at play and relatable, real-world examples. Hands-on exercises then turn the conceptual knowledge you've gained into cyber-savvy skills that will make you safer at work and at home. You'll explore various types of authentication (and how they can be broken), ways to prevent infections from different types of malware, like worms and viruses, and methods for protecting your cloud accounts from adversaries who target web apps.

You'll also learn how to:
Use command-line tools to see information about your computer and network
Analyze email headers to detect phishing attempts
Open potentially malicious documents in a sandbox to safely see what they do
Set up your operating system accounts, firewalls, and router to protect your network
Perform a SQL injection attack by targeting an intentionally vulnerable website
Encrypt and hash your files

In addition, you'll get an inside look at the roles and responsibilities of security professionals, see how an attack works from a cybercriminal's viewpoint, and get first-hand experience implementing sophisticated cybersecurity measures on your own devices.

on
Desktop
Tablet
Mobile

More in Network Security

Network Security : A Systems Approach - Larry L Peterson

eBOOK