-54%
-81%

Cyber Security Bundle

₹482 ₹2599

 Hurry up!  This offer ends in

 Hurry up! 

This offer ends in

Cyber Security Bundle

₹482

Why Buy This Book?

What exactly do I get in this?

3 Pack Bundle

What’s Covered?

Table of content

• INTRODUCTION
    ✔ HISTORY OF INTERNET
    ✔ Internet Addresses
    ✔ DNS
    ✔ Internet Infrastructure
    ✔ World Wide Web
• INTRODUCTION TO CYBER CRIME
    ✔ CLASSIFICATION OF CYBER CRIMES
    ✔ REASONS FOR COMMISSION OF CYBER CRIMES
• MALWARE AND ITS TYPE
    ✔ ADWARE
    ✔ SPYWARE
    ✔ BROWSER HIJACKING SOFTWARE
    ✔ VIRUS
    ✔ WORMS
    ✔ TROJAN HORSE
    ✔ SCAREWARE
• KINDS OF CYBER CRIME
    ✔ CYBER STALKING
    ✔ CHILD PORNOGRAPHY
    ✔ FORGERY AND COUNTERFEITING
    ✔ SOFTWARE PIRACY AND CRIME RELATED TO IPRS
    ✔ CYBER TERRORISM
    ✔ PHISHING
    ✔ COMPUTER VANDALISM
    ✔ COMPUTER HACKING
    ✔ CREATING AND .DISTRIBUTING VIRUSES OVER INTERNET
    ✔ SPAMMING
    ✔ CROSS SITE SCRIPTING
    ✔ ONLINE AUCTION FRAUD
    ✔ CYBER SQUATTING
    ✔ LOGIC BOMBS
    ✔ WEB JACKING
    ✔ INTERNET TIME THEFTS
    ✔ DENIAL OF SERVICE ATTACK
    ✔ SALAMI ATTACK
    ✔ DATA DIDDLING
    ✔ EMAIL SPOOFING
• AUTHENTICATION
    ✔ ENCRYPTION
    ✔ DIGITAL SIGNATURES
    ✔ ANTIVIRUS
    ✔ FIREWALL
    ✔ STEGANOGRAPHY
• COMPUTER FORENSICS
    ✔ WHY SHOULD WE REPORT CYBER CRIME
• INTRODUCTION
• SOME RECENT CYBER CRIME INCIDENTS
• INTRODUCTION
• COUNTER CYBER SECURITY INTIATIVES IN INDIA
• GENERATING SECURE PASSWORD
    ✔ GUIDELINE FOR SETTING SECURE PASSWORD
• USING PASSWORD MANAGER
    ✔ WHAT IS A PASSWORD MANAGER
    ✔ WHY YOU SHOULD USE IT?
    ✔ HOW DOES IT WORK
    ✔ SOME POPULAR PASSWORD MANAGERS
• ENABLING TWO-STEP VERIFICATION
• SECURING COMPUTER USING FREE ANTIVIRUS
7.1 CONFIGURING FIREWALL ON MAC COMPUTER
    ✔ TURNING ON AND CONFIGURING THE MAC OS X FIREWALL
• WORKING WITH WINDOWS FIREWALL IN WINDOWS
    ✔ FIREWALL IN WINDOWS 7
    ✔ CONFIGURING WINDOWS FIREWALL
    ✔ HOW TO START & USE THE WINDOWS FIREWALL WITH ADVANCED SECURITY
    ✔ How to Access the Windows Firewall with Advanced Security
    ✔ What Are The Inbound & Outbound Rules
    ✔ What Are The Connection Security Rules
    ✔ What Does the Windows Firewall with Advanced Security Monitor?
• FINDING THE BEST BROWSER ACCORDING TO THE USERS REQUIREMENT
• SAFE BROWSING
    ✔ HOW DO I KNOW IF A WEBSITE IS SECURE?
• TIPS FOR BUYING ONLINE
• CLEARING CACHE FOR BROWSERS
    ✔ CLEARING CACHE FOR CHROME BROWSERS ABOVE VERSION 10
    ✔ CLEARING CACHE FOR CHROME BROWSERS FROM VERSION 1 TO 9
    ✔ CLEARING CACHE FOR SAFARI FOR IOS, IPHONE AND IPAD
    ✔ CLEARING CACHE FOR SAFARI FOR MAC OS X
    ✔ CLEARING CACHE FOR SAFARI FOR WINDOWS
    ✔ CLEARING CACHE FOR INTERNET EXPLORER 9, 10 AND 11
    ✔ CLEARING CACHE FOR INTERNET EXPLORER 8
    ✔ CLEARING CACHE FOR FIREFOX
    ✔ CLEARING CACHE FOR FIREFOX 33
    ✔ CLEARING CACHE FOR OPERA
    ✔ CLEARING CACHE FOR CCLEANER
• WHAT IS WIRELESS LAN?
• MAJOR ISSUES WITH WLAN
    ✔ SECURE WLAN
    ✔ WI-FI AT HOME
• SAFE BROWSING GUIDELINES FOR SOCIAL NETWORKING SITES
    ✔ GENERAL TIPS ON USING SOCIAL NETWORKING PLATFORMS SAFELY
    ✔ POSTING PERSONAL DETAILS
    ✔ FRIENDS, FOLLOWERS AND CONTACTS
    ✔ STATUS UPDATES
    ✔ SHARINGONLINE CONTENT
    ✔ REVEALING YOUR LOCATION
    ✔ SHARING VIDEOS AND PHOTOS
    ✔ INSTANT CHATS
    ✔ JOINING AND CREATING GROUPS, EVENTS AND COMMUNITIES
• EMAIL SECURITY TIPS
• INTRODUCTION
• SMARTPHONE SECURITY GUIDELINES
    ✔ PURSES, WALLETS, SMARTPHONES
    ✔ PLATFORMS, SETUP AND INSTALLATION
    ✔ Platforms and Operating Systems
    ✔ Feature Phones
    ✔ Branded and locked smartphones
    ✔ General Setup
    ✔ Installing and updating applications
    ✔ COMMUNICATING SECURELY(THROUGH VOICE AND MESSAGES) WITH A SMARTPHONE
    ✔ Secure Voice Communication
    ✔ Sending Messages Securely
    ✔ Storing Information on your Smartphone
    ✔ Sending Email from your Smartphone
    ✔ Capturing Media with your Smartphone
    ✔ Accessing the Internet Securely from your Smartphone
    ✔ Advanced Smart Phone Security

Table of content

• Introduction to Cloud Asset Management
    ✔ Evolution and Context
    ✔ Differences from Traditional IT
    ✔ Importance of Cloud Asset Management
    ✔ Overview of Cloud Assets
• Compute Assets
• Storage Assets
• Network Assets
    ✔ Summary
• Cloud Asset Classification and Lifecycle
    ✔ Understanding Cloud Asset Types
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Software as a Service (SaaS)
    ✔ Asset Management Pipeline
• Procurement Leaks
• Processing Leaks
• Tooling Leaks
• Findings Leaks
• Tagging Cloud Assets
    ✔ Case Studies and Examples
    ✔ Summary
• Cloud Identity and Access Management
    ✔ Overview and Necessity of Identity Management
    ✔ Differences from Traditional IT
    ✔ Lifecycle of Identity and Access Management
• Request
• Approval
• Creation, Deletion, Grant, or Revocation
    ✔ Authentication in Cloud Environments
• Cloud IAM Identities
• Business-to-Consumer and Business-to-Employee
• Multi-Factor Authentication
• Passwords and API Keys
• Shared IDs
• Federated Identity
• Single Sign-On
• Instance Metadata and Identity Documents
• Secrets Management
    ✔ Authorization
• Centralized Authorization
• Roles
• Revalidation
• Putting It All Together in the Sample Application
    ✔ Case Studies and Best Practices
    ✔ Summary
• Cloud Vulnerability Landscape
    ✔ Landscape of Cloud Vulnerabilities
• Differences from Traditional IT
• Vulnerable Areas Overview
• Data Access
• Application
• Middleware
• Operating System
• Network
• Virtualized Infrastructure
• Physical Infrastructure
    ✔ Case Studies: Real-world Vulnerability Incidents
    ✔ Summary
• Strategies for Finding and Fixing Vulnerabilities
    ✔ Network Vulnerability Scanning
    ✔ Agentless Scanning and Configuration Management
    ✔ Agent-Based Scanning and Configuration Management
    ✔ Cloud Provider Security Management Tools
    ✔ Container Security: Scanning and Best Practices
    ✔ Dynamic Application Scanning (DAST)
    ✔ Static Application Scanning (SAST)
    ✔ Software Composition Analysis (SCA)
    ✔ Interactive Application Scanning (IAST)
    ✔ Runtime Application Self-Protection (RASP)
    ✔ Manual Code Reviews
    ✔ Penetration Testing
    ✔ User-Generated Reports
    ✔ Summary
• Tools and Technologies for Vulnerability Management
    ✔ Overview of Vulnerability Management Tools
    ✔ Comparative Analysis of Key Tools
• Strengths and Weaknesses
• Integration Capabilities
• User-Friendliness
• Cost Considerations
    ✔ Selecting the Right Tools for Your Cloud Environment
    ✔ Case Studies: Effective Implementation of Tools
    ✔ Summary
• Risk Management in Cloud Security
    ✔ Understanding and Assessing Risks
    ✔ Risk Mitigation Strategies
• Risk Transfer
• Risk Acceptance
• Risk Avoidance
• Risk Reduction
    ✔ Integrating Risk Management into Vulnerability Management
    ✔ Case Studies: Successful Risk Management in the Cloud
    ✔ Summary
• Metrics and Measurement in Vulnerability Management
    ✔ Importance of Metrics
    ✔ Key Metrics for Vulnerability Management
• Tool Coverage
• Mean Time to Remediate (MTTR)
• Systems/Applications with Open Vulnerabilities
• Percentage of False Positives
• Percentage of False Negatives
• Vulnerability Recurrence Rate
• Change Management Metrics
    ✔ Establishing and Improving Metrics
    ✔ Case Studies: Metric-Driven Security Improvements
    ✔ Summary
• Continuous Improvement in Cloud Security
    ✔ The Concept of Continuous Improvement
    ✔ Building a Culture of Security
    ✔ Continuous Monitoring and Adaptation
    ✔ Learning from Incidents and Near Misses
    ✔ Case Studies: Successful Continuous Improvement Initiatives
    ✔ Summary
• Future Trends in Cloud Security
    ✔ Emerging Technologies and Trends
    ✔ Anticipated Threats and Challenges
    ✔ Evolving Regulations and Compliance
    ✔ Preparing for the Future
    ✔ Summary and Concluding Remarks

Table of content

• Integrated Threat Management
    ✔ Exploration of comprehensive approaches to identify, assess, and mitigate security threats across the enterprise.
• Understanding Information Security Management Systems
    ✔ An in-depth look at the frameworks and principles that underpin effective information security management systems.
• Planning for a Privacy Breach
    ✔ Strategies for anticipating and responding to privacy breaches, including proactive planning and incident response.
• Using Quasi-Intelligence Resources to Protect the Enterprise
    ✔ Examination of non-traditional intelligence sources and methods to enhance enterprise security.
• Information Risk Management: A Process Approach to Risk Diagnosis and Treatment
    ✔ A detailed process-oriented approach to diagnosing and treating information security risks.
• Department-Level Transformation
    ✔ Strategies for transforming individual departments to enhance overall organizational security.
• Setting Priorities in Your Security Program
    ✔ Guidance on prioritizing security efforts to address the most critical risks and vulnerabilities.
• Why and How Assessment of Organization Culture Shapes Security Strategies
    ✔ Exploration of how organizational culture influences security strategies and the importance of cultural assessments.
• A Look Ahead
    ✔ Insight into emerging trends and technologies that will impact the field of information security.
• Access Control
    ✔ Authentication Tokens
    ✔ In-depth exploration of authentication tokens and their role in access control systems.
    ✔ Authentication and the Role of Tokens
    ✔ Examination of different authentication methods and the specific role of tokens in enhancing security.
    ✔ Accountability Methods of Attack
    ✔ Analysis of methods attackers use to compromise accountability mechanisms in access control systems.
    ✔ Rootkits: The Ultimate Malware Threat
    ✔ Detailed discussion on rootkits, their characteristics, and their impact on access control.
• Cryptography
    ✔ Encryption Key Management in Large-Scale Network Deployments
    ✔ Strategies and best practices for managing encryption keys in complex network environments.
• Physical Security
    ✔ Mantraps and Turnstiles
    ✔ Examination of physical security measures, including the use of mantraps and turnstiles to control access.
• Security Architecture and Design
    ✔ Service-Oriented Architecture and Web Services Security
    ✔ Integration of security measures into service-oriented architecture and web services.
    ✔ Analysis of Covert Channels
    ✔ Exploration of covert communication channels and strategies for detecting and preventing them.
    ✔ Security Architecture of Biological Cells: An Example of Defense in Depth
    ✔ Application of defense-in-depth principles through the analogy of biological cell security architecture.
    ✔ ISO Standards Draft Content
    ✔ Overview of relevant ISO standards and their draft content in the context of security architecture.
    ✔ Security Frameworks
    ✔ Examination of various security frameworks and their application in designing robust security architectures.
• Telecommunications and Network Security
    ✔ Facsimile Security
    ✔ Security considerations and measures specific to facsimile communication systems.
    ✔ Network Content Filtering and Leak Prevention
    ✔ Strategies for content filtering and preventing data leaks in network communication.
• Application Security
    ✔ The Ocean Is Full of Phish
    ✔ Exploration of phishing threats and strategies for mitigating risks in application security.
    ✔ Neural Networks and Information Assurance Uses
    ✔ Application of neural networks in bolstering information assurance within software applications.
    ✔ Information Technology Infrastructure Library and Security Management Overview
    ✔ Overview of ITIL and its relevance to security management within applications.
    ✔ Adaptation: A Concept for Next-Generation Security Application Development
    ✔ Exploration of adaptive security concepts in the development of next-generation applications.
    ✔ Quantum Computing: Implications for Security
    ✔ Analysis of the security implications posed by quantum computing and strategies for adaptation.
• Legal, Regulations, Compliance, and Investigation
    ✔ Compliance Assurance: Taming the Beast
    ✔ Strategies and methodologies for ensuring compliance with legal and regulatory requirements.
    ✔ Enterprise Incident Response and Digital Evidence Management and Handling
    ✔ Best practices for incident response and the management and handling of digital evidence within enterprises.
    ✔ Security Information Management Myths and Facts
    ✔ Dispelling common myths and presenting facts about security information management in the legal and regulatory context.
Still Have Questions?

No Problem! Mail us at [email protected] to Connect

Unlock the power of simplified business knowledge with engineeringexplained.in. Explore our collection of easy-to-understand ebooks today!

Contact Information