
Cybersecurity: A comprehensive guide to getting started in cybersecurity
Paperback
NetworkingComputer SecuritySystem Administration
ISBN13: 9781789616194
Publisher: Packt Pub
Published: May 27 2019
Pages: 396
Weight: 1.49
Height: 0.81 Width: 7.50 Depth: 9.25
Language: English
Understand the nitty-gritty of Cybersecurity with ease
Key Features:
- Align your security knowledge with industry leading concepts and tools
- Acquire required skills and certifications to survive the ever changing market needs
- Learn from industry experts to analyse, implement, and maintain a robust environment
Book Description:
It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time.
This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications.
By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field.
What You Will Learn:
- Get an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you best
- Plan your transition into cybersecurity in an efficient and effective way
- Learn how to build upon your existing skills and experience in order to prepare for your career in cybersecurity
Who this book is for:
This book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful.
Also in
System Administration
Site Reliability Engineering: How Google Runs Production Systems
Jones, Chris
Beyer, Betsy
Murphy, Niall Richard
Paperback
Comptia A+ Complete Certification Kit: Exam 220-1101 and Exam 220-1102
Docter, Quentin
McMillan, Troy
Buhagiar, Jon
Paperback
Prometheus: Up & Running: Infrastructure and Application Performance Monitoring
Brazil, Brian
Pivotto, Julien
Paperback
RAG-Driven Generative AI: Build custom retrieval augmented generation pipelines with LlamaIndex, Deep Lake, and Pinecone
Rothman, Denis
Paperback
Averting the Digital Dark Age: How Archivists, Librarians, and Technologists Built the Web a Memory
Milligan, Ian
Hardcover
Windows 11 Manual For Seniors: A Beginners Guide to Navigate Your Computer with Step-by-Step Instructions
Wells, Larry
Paperback
Building Multi-Tenant Saas Architectures: Principles, Practices, and Patterns Using AWS
Golding, Tod
Paperback
Data and Reality: A Timeless Perspective on Perceiving and Managing Information in Our Imprecise World, 3rd Edition
Kent, William
Paperback
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
Rice, Liz
Paperback
Mastering Windows Security and Hardening - Second Edition: Secure and protect your Windows environment from cyber threats using zero-trust security pr
Tumbarello, Matt
Dunkerley, Mark
Paperback
Comptia A+ Complete Practice Tests: Core 1 Exam 220-1101 and Core 2 Exam 220-1102
Parker, Jeff T.
O'Shea, Audrey
Paperback
IT Helpdesk Training Best Practices: Desktop Support Troubleshooting and System Administration
Botwright, Rob
Paperback
Microsoft 365 and SharePoint Online Cookbook - Second Edition: A complete guide to Microsoft Office 365 apps including SharePoint, Power Platform, Cop
Chamberlain, Nate
Mahajan, Gaurav
Ghatak, Sudeep
Paperback
Learn Powershell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS
Plunk, Travis
Petty, James
Leonhardt, Tyler
Paperback
Mastering KVM Virtualization - Second Edition: Design expert data center virtualization solutions with the power of Linux KVM
Mukhedkar, Prasad
Dakic, Vedran
Chirammal, Humble Devassy
Paperback
Practical Cybersecurity Architecture - Second Edition: A guide to creating and implementing robust designs for cybersecurity architects
Kelley, Diana
Moyle, Ed
Paperback
Learn Powershell Scripting in a Month of Lunches, Second Edition: Write and Organize Scripts and Tools
Petty, James
Jones, Don
Hicks, Jeffery
Paperback
Observability Engineering: Achieving Production Excellence
Fong-Jones, Liz
Miranda, George
Majors, Charity
Paperback
Building Green Software: A Sustainable Approach to Software Development and Operations
Bergman, Sara
Currie, Anne
Hsu, Sarah
Paperback
Python for Devops: Learn Ruthlessly Effective Automation
Deza, Alfredo
Gift, Noah
Behrman, Kennedy
Paperback
Mastering Terraform: A practical guide to building and deploying infrastructure on AWS, Azure, and GCP
Tinderholt, Mark
Paperback
Version Control with Git: Powerful Tools and Techniques for Collaborative Software Development
Loeliger, Jon
Ponuthorai, Prem Kumar
Paperback
Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture
Nichols, Lester
Paperback
Multi-Cloud Mastery: Architecting Secure and Scalable Kubernetes Systems and Infrastructures.
Robertson, Adam
Paperback
Practical Linux System Administration: A Guide to Installation, Configuration, and Management
Hess, Kenneth
Paperback
Docker: Up & Running: Shipping Reliable Containers in Production
Matthias, Karl
Kane, Sean P.
Paperback
Scaling Cloud Finops: Proven Strategies to Accelerate Financial Success
Zeier, Matthew
Kanumuri, Sasi
Paperback
pfSense Essentials: The Complete Reference to the pfSense Internet Gateway and Firewall
Reed, Jeremy C.
Paperback
Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
Zhai, Chengxiang
Massung, Sean
Paperback
Container Security: Fundamental Technology Concepts That Protect Containerized Applications
Rice, Liz
Paperback
Linux Kernel Programming - Second Edition: A comprehensive and practical guide to kernel internals, writing modules, and kernel synchronization
Billimoria, Kaiwan N.
Paperback
Active Directory: Designing, Deploying, and Running Active Directory
Allen, Robbie
Desmond, Brian
Richards, Joe
Paperback
Cybersecurity Tabletop Exercises: From Planning to Execution
Hollenberger, John
Lelewski, Robert
Paperback
Ansible: Up and Running: Automating Configuration Management and Deployment the Easy Way
Meijer, Bas
Hochstein, Lorin
Moser, René
Paperback
SAP S/4hana Financial Accounting Certification Guide: Application Associate Exam
Pougkas, Stefanos
Paperback
Mastering Embedded Linux Programming - Third Edition: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell)
Vasquez, Frank
Simmonds, Chris
Paperback
Business Continuity and Disaster Recovery Planning for IT Professionals
Snedaker, Susan
Rima, Chris
Paperback
Linux for Hackers: 3 books in 1 - The #1 Hacking Course From Beginner to Advanced. Learn it Well & Fast (2025)
Reed, Mark
Press, Cyberedge
Paperback
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
Adkins, Heather
Blankinship, Paul
Beyer, Betsy
Paperback
Cybersecurity Ops with Bash: Attack, Defend, and Analyze from the Command Line
Troncone, Paul
Albing, Carl
Paperback
Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark
Botwright, Rob
Paperback
Linux for Beginners: An Introduction to the Linux Operating System and Command Line
Cannon, Jason
Paperback
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms
Blyth, Andrew
Paperback
Cisco Certified Devnet Associate Devasc 200-901 Official Cert Guide
Jackson, Chris
Iliesiu, Adrian
Gooley, Jason
Hardcover
Kubernetes Security and Observability: A Holistic Approach to Securing Containers and Cloud Native Applications
Gupta, Amit
Creane, Brendan
Paperback
DevOps Automation Cookbook: Harness the power of DevOps with 125+ automation recipes (English Edition)
Kumar Singirikonda, Ekambar
Paperback
Mastering Linux Administration - Second Edition: Take your sysadmin skills to the next level by configuring and maintaining Linux systems
Calcatinge, Alexandru
Balog, Julian
Paperback
Cisa Certified Information Systems Auditor All-In-One Exam Guide, Fourth Edition
Gregory, Peter H.
Paperback
Machine Learning Models and Algorithms for Big Data Classification: Thinking with Examples for Effective Learning
Suthaharan, Shan
Hardcover
Cloud Native Data Security with Oauth: A Scalable Zero Trust Architecture
Kahrer, Judith
Trojanowski, Michal
Archer, Gary
Paperback
NMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library
Botwright, Rob
Paperback
Powershell Cookbook: Your Complete Guide to Scripting the Ubiquitous Object-Based Shell
Holmes, Lee
Paperback
Kubernetes - An Enterprise Guide - Third Edition: Master containerized application deployments, integrate enterprise systems, and achieve scalability
Boorshtein, Marc
Surovich, Scott
Paperback
Data Quality Fundamentals: A Practitioner's Guide to Building Trustworthy Data Pipelines
Vorwerck, Molly
Moses, Barr
Gavish, Lior
Paperback
The Ultimate Docker Container Book - Third Edition: Build, test, ship, and run containers with Docker and Kubernetes
Schenker, Gabriel N.
Paperback
Effective Devops: Building a Culture of Collaboration, Affinity, and Tooling at Scale
Daniels, Ryn
Davis, Jennifer
Paperback
Architecting for Scale: How to Maintain High Availability and Manage Risk in the Cloud
Atchison, Lee
Paperback
Cryptography Algorithms - Second Edition: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography
Bertaccini, Massimo
Paperback
The Ridiculously Simple Guide to Gmail: The Absolute Beginners Guide to Getting Started with Email
La Counte, Scott
Paperback
Industrial Cybersecurity - Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment
Ackerman, Pascal
Paperback
Windows Internals: System Architecture, Processes, Threads, Memory Management, and More, Part 1
Russinovich, Mark
Ionescu, Alex
Yosifovich, Pavel
Paperback
Kubernetes Best Practices: Blueprints for Building Successful Applications on Kubernetes
Strebel, Dave
Burns, Brendan
Villalba, Eddie
Paperback
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh
Gupta, Rajneesh
Paperback
Kill It with Fire: Manage Aging Computer Systems (and Future Proof Modern Ones)
Bellotti, Marianne
Paperback
The Self-Service Data Roadmap: Democratize Data and Reduce Time to Insight
Uttamchandani, Sandeep
Paperback
Learn Linux Quickly: A Comprehensive Guide for Getting Up to Speed on the Linux Command Line (Ubuntu)
Bartley, Paul H.
Quickly, Code
Paperback
Istio: Up and Running: Using a Service Mesh to Connect, Secure, Control, and Observe
Butcher, Zack
Calcote, Lee
Paperback
Getting Started With Ubuntu OS: A Ridiculously Simple Guide to the Linux Open Source Operating System
La Counte, Scott
Paperback
Learning Microsoft Intune: Unified Endpoint Management with Intune & the Microsoft 365 product suite
Duffey, Scott
Paperback
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
Katz, Gary J.
Roddie, Megan
Deyalsingh, Jason
Paperback
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Bambara, Joseph J.
Allen, Paul R.
Iyer, Kedar
Paperback
Industrial Cybersecurity: Efficiently secure critical infrastructure systems
Ackerman, Pascal
Paperback
Comptia Linux+ Certification Kit: Exam Xk0-005
Bresnahan, Christine
Suehring, Steve
Blum, Richard
Paperback
Linux: A complete guide to Linux command line for beginners, and how to get started with the Linux operating system!
Arthur, James
Paperback
Learning ServiceNow - Second Edition: Administration and development on the Now platform, for powerful IT automation
Woodruff, Tim
Paperback
AI Hacks for It Pros: Boost Your Productivity with AI Tools
Lemaire, Chrissy
Abshire, Brandon
Paperback
A Friendly Guide to Data Science: Everything You Should Know about the Hottest Field in Tech
Vincent, Kelly P.
Paperback
The Kubernetes Bible - Second Edition: The definitive guide to deploying and managing Kubernetes across cloud and on-prem environments
Madapparambath, Gineesh
McKendrick, Russ
Paperback
The Ultimate Linux Shell Scripting Guide: Automate, Optimize, and Empower tasks with Linux Shell Scripting
Tevault, Donald a.
Paperback
Hands-On Network Programming with C: Learn socket programming in C and write secure and optimized network code
Van Winkle, Lewis
Paperback
Small, Sharp Software Tools: Harness the Combinatoric Power of Command-Line Tools and Utilities
Hogan, Brian
Paperback
Active Directory and Powershell for Jobseekers: Learn How to Create, Manage, and Secure User Accounts
Wróbel, Mariusz
Paperback
Essential Linux Commands: 100 Linux commands every system administrator should know
Olushile, Paul
Paperback
The Enterprise Big Data Lake: Delivering the Promise of Big Data and Data Science
Gorelik, Alex
Paperback
Windows 11 for Enterprise Administrators - Second Edition: Unleash the power of Windows 11 with effective techniques and strategies
Stokes, Jeff
Miles, Steve
Singer, Manuel
Paperback
Mastering Malware Analysis - Second Edition: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks
Kleymenov, Alexey
Thabet, Amr
Paperback
Implementing Zero-Knowledge Proofs With Practical Applications and Code Examples
Johnson, Hunter C.
Paperback
Jira Strategy Admin Workbook: Templates for the Application Administrator to Set Up, Clean Up, and Maintain Jira
Wright, Rachel
Paperback
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
Kozierok, Charles M.
Hardcover
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
Viega, John
Paperback
Result Page Generation for Web Searching: Emerging Research and Opportunities
Alli, Mostafa
Paperback
Practical Salesforce Architecture: Understanding and Deploying the Salesforce Ecosystem for the Enterprise
McCollum, Paul
Paperback
Podman in Action: Secure, Rootless Containers for Kubernetes, Microservices, and More
Walsh, Daniel
Paperback
The Well-Grounded Java Developer, Second Edition
Clark, Jason
Verburg, Martijn
Evans, Benjamin
Paperback
E-mail: A Write It Well Guide: How to Write and Manage E-mail in the Workplace
Chan, Janis Fisher
Paperback
Mastering Azure Virtual Desktop - Second Edition: A practical guide to designing, implementing, and managing Azure Virtual Desktop environments
Meurer, Marcel
McLoughlin, Neil
Mangan, Ryan
Paperback
AWS Penetration Testing: Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
Helmus, Jonathan
Paperback
Mastering Linux Shell Scripting - Second Edition: A practical guide to Linux command-line, Bash scripting, and Shell programming
Ebrahim, Mokhtar
Mallett, Andrew
Paperback
Linux Device Drivers Development: Develop customized drivers for embedded Linux
Madieu, John
Paperback