Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
CYBERSECURITY
The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively
Introduction
Chapter 1: Types of Cybersecurity
Chapter 1: Types of Cybersecurity
Chapter 2: Cyber Threats
Chapter 2: Cyber Threats
Malware
Chapter 3: Careers in Cybersecurity
Chapter 3: Careers in Cybersecurity
Jobs in the field
Chapter 4: Personal Cybersecurity
Chapter 4: Personal Cybersecurity
Start off on the right foot
Tips for publishing content on the internet
Chapter 5: Cybersecurity Protection and Practices
Chapter 5: Cybersecurity Protection and Practices
Protecting your portable devices
Ensure your data is secure
Additional tips for smartphones
Other security tips to follow
Keeping children safe
Conclusion
CYBERSECURITY
The Utmost Intermediate Course Guide in the Fundamentals and Concept of Cybersecurity
Introduction
Chapter 1: Cyberspace in Context
Chapter 1: Cyberspace in Context
The four layers of cyberspace
Overlapping systems of communication
Primary characteristics
Chapter 2: Computer and Network Security
Chapter 2: Computer and Network Security
Network security
Computer security
Failed security
Identity theft
Top data breaches
The dark web
Chapter 3: Confidentiality, Integrity, and Availability
Chapter 3: Confidentiality, Integrity, and Availability
Confidentiality
Eavesdropping
Phishing
Integrity
Availability
Offensive methods used by hackers
Ransomware
Chapter 4: Securing a Wireless Network
Chapter 4: Securing a Wireless Network
Encryption
WPA
Wireless router credentials
Service Set Identifier
Media Access Control
Summary
Chapter 5: Securing Mobile Devices
Chapter 5: Securing Mobile Devices
Security risks
The basics
Summary
Chapter 6: Social Media Safety
Chapter 6: Social Media Safety
Giving out information
Customize your privacy options
Use two-factor authentication
Further uses for social media accounts
Keeping kids safe on social media
Chapter 7: The Future of Cybersecurity
Chapter 7: The Future of Cybersecurity
Chapter 8: Internet Vocabulary
Chapter 8: Internet Vocabulary
Application server
ASP (Application Service Provider)
Bandwidth
Broadband
Byte
Cookie
Ethernet
Extranet
Gateway
HTML (Hypertext markup language)
HTTP (Hypertext Transfer Protocol)
Intranet
Java
JavaScript
LAN (Local Area Network)
Proxy server
Spyware
URL (Uniform Resource Locator)
Conclusion
Resources
CYBERSECURITY
The Advance Guide in System Security and Defense Strategies in Cybersecurity
Introduction
Chapter 1: Cybersecurity and Advanced System Security
Chapter 1: Cybersecurity and Advanced System Security
Introduction to Cybersecurity
Physical Security
The World Without Cybersecurity
The Nature of Threats
Internet of Things
Botnet
Chapter 2: Establishing a Risk Management Framework
Chapter 2: Establishing a Risk Management Framework
Establishing a Risk Management Framework
Process
Different Maturity Objectives
Evaluating the current capabilities
Benefits of Achieving Cybersecurity Planning Maturity
Chapter 3: Addressing Process Risks
Chapter 3: Addressing Process Risks
Operational Risks
Enforcement of Access Control, Logging, and Monitoring
Disposal or Redeployment of the Assets
Control, Monitor and Log the Access to the Assets
Incident Handling
Conducting Vulnerability Assessments
Contingency Planning
Chapter 4: People and Policy Risks
Chapter 4: People and Policy Risks
Managing Risk from the Insider Threat
Implementation of Effective Protective Monitoring
Mitigating Risk with Security Policy
Considering Security Policy Development as a Process
Chapter 5: Data Manipulation Concerns
Chapter 5: Data Manipulation Concerns
Espionage
Cloud Concerns
Tackling Cloud Cybersecurity Problems
Chapter 6: Addressing Technology Risks
Chapter 6: Addressing Technology Risks
Network Issues
Limitation of Client Relegated Gadgets to Particular Network Sections
Stream of Electronic Correspondence
Firewall
Insurance of Information in Travel
Conclusion
HACKING
The Ultimate Beginner’s Guide to Learn and Understand Hacking Effectively
Introduction
Chapter 1: The Basics of Hacking
Chapter 1: The Basics of Hacking
Different types of hackers
What skills do I need to start hacking?
Different attack types
Chapter 2: Doing a Penetration Test
Chapter 2: Doing a Penetration Test
Why should I do a penetration test?
Writing these reports
Chapter 3: Gaining Physical Access to the System
Chapter 3: Gaining Physical Access to the System
What vulnerabilities am I dealing with?
Creating a plan
Adding some physical controls
Technical controls
Chapter 4: Getting the Passwords You Need
Chapter 4: Getting the Passwords You Need
Vulnerabilities that come with passwords
How to complete a password hack
Chapter 5: Social Engineering
Chapter 5: Social Engineering
Strategies for social engineering
Gaining trust
Phishing
Spamming
How to avoid these attacks
Chapter 6: Completing a Wireless Network Attack
Chapter 6: Completing a Wireless Network Attack
WLAN attacks
How to verify a wireless network
WEP
WAP
How to do a spoofing attack
How to secure your wireless network
Chapter 7: How a Keylogger Can Help You
Chapter 7: How a Keylogger Can Help You
Logging the keystrokes
Conclusion
HACKING
The Utmost Intermediate Course Guide in the Concepts and Fundamentals of Hacking
Introduction to Hacking
Chapter 1: The Fundamentals of Hacking
Chapter 1: The Fundamentals of Hacking
Chapter 2: Internet versus Intranet
Chapter 2: Internet versus Intranet
Chapter 3: Remote Access and the Extranet
Chapter 3: Remote Access and the Extranet
Chapter 4: The Concepts of Hacking – White Hat Hacking vs Black Hat Hacking
Chapter 4: The Concepts of Hacking – White Hat Hacking vs Black Hat Hacking
Chapter 5: Pentesting, Footprinting, and Scanning
Chapter 5: Pentesting, Footprinting, and Scanning
Chapter 6: Enumeration and System Hacking
Chapter 6: Enumeration and System Hacking
Chapter 7: Sniffing Traffic – Programs to Use and Benefits
Chapter 7: Sniffing Traffic – Programs to Use and Benefits
Conclusion
← Prev
Back
Next →
← Prev
Back
Next →