Table of Contents
Book 1: Cybersecurity Basics 5 Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Book 2: Personal Cybersecurity 69
Chapter 1: Evaluating Your Current Cybersecurity Posture 71
Chapter 2: Enhancing Physical Security 93
Chapter 3: Cybersecurity Considerations When Working from Home 103
Chapter 4: Securing Your Accounts 113
Chapter 5: Passwords 131
Chapter 6: Preventing Social Engineering Attacks 147
Book 3: Securing a Business 169
Chapter 1: Securing Your Small Business 171
Chapter 2: Cybersecurity and Big Businesses 195
Chapter 3: Identifying a Security Breach 211
Chapter 4: Recovering from a Security Breach 229
Chapter 5: Backing Up 249
Chapter 6: Resetting Your Device 277
Chapter 7: Restoring from Backups 287
Book 4: Securing the Cloud 311
Chapter 1: Clouds Aren’t Bulletproof 313
Chapter 2: Getting Down to Business 333
Chapter 3: Developing Secure Software 349
Chapter 4: Restricting Access 377
Chapter 5: Implementing Zero Trust 407
Chapter 6: Using Cloud Security Services 429
Book 5: Testing Your Security 451
Chapter 1: Introduction to Vulnerability and Penetration Testing 453
Chapter 2: Cracking the Hacker Mindset 473
Chapter 3: Developing Your Security Testing Plan 485
Chapter 4: Hacking Methodology 497
Chapter 5: Information Gathering 507
Chapter 6: Social Engineering 513
Chapter 7: Physical Security 529
Book 6: Enhancing Cybersecurity Awareness 541
Chapter 1: Knowing How Security Awareness Programs Work 543
Chapter 2: Creating a Security Awareness Strategy 553
Chapter 3: Determining Culture and Business Drivers 559
Chapter 4: Choosing the Best Tools for the Job 573
Chapter 5: Measuring Performance 589
Chapter 6: Assembling Your Security Awareness Program 601
Chapter 7: Running Your Security Awareness Program 621
Chapter 8: Implementing Gamification 641
Index 655