Skip to content
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Catalog
About
Contact Us
Login
Sign Up
$
0.00
0
Cart
Login
Sign Up
$
0.00
0
Cart
Login
Sign Up
$
0.00
0
Cart
Home
All Programs
Computers
Internet
Online Safety & Privacy
Cybersecurity
Cybersecurity
Curriculum
30 Sections
169 Lessons
10 Weeks
Expand all sections
Collapse all sections
Introduction
5
1.1
About This Book
1.2
Foolish Assumptions
1.3
Icons Used in This Book
1.4
Beyond the Book
1.5
Where to Go from Here
Part 1: Getting Started with Cybersecurity
0
Chapter 1: What Exactly Is Cybersecurity?
3
3.1
Cybersecurity Means Different Things to Different Folks
3.2
Cybersecurity Is a Constantly Moving Target
3.3
Looking at the Risks Cybersecurity Mitigates
Chapter 2: Getting to Know Common Cyberattacks
12
4.1
Attacks That Inflict Damage
4.2
Is That Really You? Impersonation
4.3
Messing around with Other People’s Stuff: Tampering
4.4
Captured in Transit: Interception
4.5
Taking What Isn’t Theirs: Data Theft
4.6
Cyberbombs That Sneak into Your Devices: Malware
4.7
Poisoned Web Service Attacks
4.8
Network Infrastructure Poisoning
4.9
Malvertising
4.10
Exploiting Maintenance Difficulties
4.11
Advanced Attacks
4.12
Some Technical Attack Techniques
Chapter 3: The Bad Guys You Must Defend Against
6
5.1
Bad Guys and Good Guys Are Relative Terms
5.2
Bad Guys Up to No Good
5.3
Cyberattackers and Their Colored Hats
5.4
How Cybercriminals Monetize Their Actions
5.5
Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats
5.6
Defending against These Attackers
Part 2: Improving Your Own Personal Security
0
Chapter 4: Evaluating Your Current Cybersecurity Posture
8
7.1
Don’t be Achilles: Identifying Ways You May Be Less than Secure
7.2
Identifying Risks
7.3
Protecting against Risks
7.4
Evaluating Your Current Security Measures
7.5
Privacy 101
7.6
Banking Online Safely
7.7
Safely Using Smart Devices
7.8
Cryptocurrency Security 101
Chapter 5: Enhancing Physical Security
7
8.1
Understanding Why Physical Security Matters
8.2
Taking Inventory
8.3
Locating Your Vulnerable Data
8.4
Creating and Executing a Physical Security Plan
8.5
Implementing Physical Security
8.6
Security for Mobile Devices
8.7
Realizing That Insiders Pose the Greatest Risks
Chapter 6: Cybersecurity Considerations When Working from Home
6
9.1
Network Security Concerns
9.2
Device Security Concerns
9.3
Location Cybersecurity
9.4
Video Conferencing Cybersecurity
9.5
Social Engineering Issues
9.6
Regulatory Issues
Part 3: Protecting Yourself from Yourself
0
Chapter 7: Securing Your Accounts
6
11.1
Realizing You’re a Target
11.2
Securing Your External Accounts
11.3
Securing Data Associated with User Accounts
11.4
Securing Data with Parties You’ve Interacted With
11.5
Securing Data at Parties You Haven’t Interacted With
11.6
Securing Data by Not Connecting Hardware with Unknown Pedigrees
Chapter 8: Passwords
10
12.1
Passwords: The Primary Form of Authentication
12.2
Avoiding Simplistic Passwords
12.3
Password Considerations
12.4
Creating Memorable, Strong Passwords
12.5
Knowing When to Change Passwords
12.6
Changing Passwords after a Breach
12.7
Providing Passwords to Humans
12.8
Storing Passwords
12.9
Transmitting Passwords
12.10
Discovering Alternatives to Passwords
Chapter 9: Preventing Social Engineering Attacks
9
13.1
Don’t Trust Technology More than You Would People
13.2
Types of Social Engineering Attacks
13.3
Six Principles Social Engineers Exploit
13.4
Don’t Overshare on Social Media
13.5
Leaking Data by Sharing Information as Part of Viral Trends
13.6
Identifying Fake Social Media Connections
13.7
Using Bogus Information
13.8
Using Security Software
13.9
General Cyberhygiene Can Help Prevent Social Engineering
Part 4: Cybersecurity for Businesses, Organizations, and Government
0
Chapter 10: Securing Your Small Business
7
15.1
Making Sure Someone Is In Charge
15.2
Watching Out for Employees
15.3
Dealing with a Remote Workforce
15.4
Considering Cybersecurity Insurance
15.5
Complying with Regulations and Compliance
15.6
Handling Internet Access
15.7
Managing Power Issues
Chapter 11: Cybersecurity and Big Businesses
7
16.1
Utilizing Technological Complexity
16.2
Managing Custom Systems
16.3
Continuity Planning and Disaster Recovery
16.4
Looking at Regulations
16.5
Deeper Pockets — and Insured
16.6
Considering Employees, Consultants, and Partners
16.7
Looking at the Chief Information Security Officer’s Role
Part 5: Handling a Security Incident (This Is a When, Not an If)
0
Chapter 12: Identifying a Security Breach
2
18.1
Identifying Overt Breaches
18.2
Detecting Covert Breaches
Chapter 13: Recovering from a Security Breach
7
19.1
An Ounce of Prevention Is Worth Many Tons of Response
19.2
Stay Calm and Act Now with Wisdom
19.3
Bring in a Pro
19.4
Recovering from a Breach without a Pro’s Help
19.5
Reinstall Damaged Software
19.6
Dealing with Stolen Information
19.7
Recovering When Your Data Is Compromised at a Third Party
Part 6: Backing Up and Recovery
0
Chapter 14: Backing Up
14
21.1
Backing Up Is a Must
21.2
Backing Up Data from Apps and Online Accounts
21.3
Backing Up Data on Smartphones
21.4
Conducting Cryptocurrency Backups
21.5
Backing Up Passwords
21.6
Looking at the Different Types of Backups
21.7
Figuring Out How Often You Should Backup
21.8
Exploring Backup Tools
21.9
Creating a Boot Disk
21.10
Knowing Where to Back Up
21.11
Knowing Where Not to Store Backups
21.12
Encrypting Backups
21.13
Testing Backups
21.14
Disposing of Backups
Chapter 15: Resetting Your Device
2
22.1
Exploring Two Types of Resets
22.2
Rebuilding Your Device after a Hard Reset
Chapter 16: Restoring from Backups
16
23.1
You Will Need to Restore
23.2
Wait! Do Not Restore Yet!
23.3
Restoring Data to Apps
23.4
Restoring from Full Backups of Systems
23.5
Restoring from Incremental Backups
23.6
Dealing with Deletions
23.7
Excluding Files and Folders
23.8
Understanding Archives
23.9
Restoring Using Backup Tools
23.10
Returning Backups to Their Proper Locations
23.11
Restoring to Non-Original Locations
23.12
Never Leave Your Backups Connected
23.13
Restoring from Encrypted Backups
23.14
Testing Backups
23.15
Restoring Cryptocurrency
23.16
Booting from a Boot Disk
Part 7: Looking toward the Future
0
Chapter 17: Pursuing a Cybersecurity Career
7
25.1
Professional Roles in Cybersecurity
25.2
Exploring Career Paths
25.3
Starting Out in Information Security
25.4
Exploring Popular Certifications
25.5
Overcoming a Criminal Record
25.6
Overcoming Bad Credit
25.7
Looking at Other Professions with a Cybersecurity Focus
Chapter 18: Emerging Technologies Bring New Threats
9
26.1
Relying on the Internet of Things
26.2
Using Cryptocurrencies and Blockchain
26.3
Cloud-Based Applications and Data
26.4
Optimizing Artificial Intelligence
26.5
Where Was This Laptop Really Made? Supply Chain Risks
26.6
Nothing Is Trustworthy: Zero Trust
26.7
Genius Computers Are Coming: Quantum Supremacy
26.8
Experiencing Virtual Reality
26.9
Transforming Experiences with Augmented Reality
Part 8: The Part of Tens
0
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune
10
28.1
Understand That You Are a Target
28.2
Use Security Software
28.3
Encrypt Sensitive Information
28.4
Back Up Often
28.5
Do Not Share Login Credentials
28.6
Use Proper Authentication
28.7
Use Social Media Wisely
28.8
Segregate Internet Access
28.9
Use Public Wi-Fi Safely (Or Better Yet, Don’t Use It!)
28.10
Hire a Pro
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches
6
29.1
Marriott
29.2
Target
29.3
Sony Pictures
29.4
U.S. Office of Personnel Management
29.5
Anthem
29.6
Colonial Pipeline and JBS SA
Chapter 21: Ten Ways to Safely Use Public Wi-Fi
10
30.1
Use Your Cellphone as a Mobile Hotspot
30.2
Turn Off Wi-Fi Connectivity When You’re Not Using Wi-Fi
30.3
Don’t Perform Sensitive Tasks over Public Wi-Fi
30.4
Don’t Reset Passwords When Using Public Wi-Fi
30.5
Use a VPN Service
30.6
Use Tor
30.7
Use Encryption
30.8
Turn Off Sharing
30.9
Have Information Security Software on Any Devices Connected to Public Wi-Fi Networks
30.10
Understand the Difference between True Public Wi-Fi and Shared Wi-Fi
This content is protected, please
login
and
enroll
in the course to view this content!
Login
or
Sign Up
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Cybersecurity
Courses
Community
News
Knowledgebase
Catalog
About
Contact Us
Linkedin
Instagram
Modal title
Main Content