Cybersecurity Essentials
Minimum price
Suggested price

Cybersecurity Essentials

The Beginner's Guide

About the Book

If you need to read only one book to acquire a strong foundation in cybersecurity fundamentals, make it this one. This is not just another book on cybersecurity. It is a well-illustrated practical guide designed for beginners to familiarize them with the latest cyber security landscape and provide the knowledge of relevant tools to assess and manage security protocols in information processing systems. It is a self-paced book that is excellent for beginners, practitioners and scholars alike.

  • After completing this book, you will be able to:Explain basic security risks, security of data and information, types of security breaches, and how to manage security threats
  • Demonstrate how to configure browsers and safe browsing practices
  • Identify security threats and explain how to address them in applications and shared networks

Whether you’re skilling up to become a Help Desk Support Specialist, Security Specialist, Virtual Customer Service Agent, or just want to learn the basics of working in and managing security and security systems, you need a strong foundation in security fundamentals.

  • This course is divided into three modules:Common Security Threats and Risks
  • Security Best Practices
  • Safe Browsing Practices

You’ll learn about common security risks and the importance of information privacy. You’ll also learn various ways to identify and protect your organization against different types of security breaches and malware threats, and you’ll discover more about confidentiality, integrity, and availability.

You’ll learn about security best practices, creating effective passwords, and securing devices. You will learn about authentication, authorization, and accounting, and how these concepts help secure devices, validate devices and servers, encrypt devices, and manage email and spam.

You’ll learn about safety concerns with applications and public browsing, including managing plug-ins, extensions, and toolbars. You will learn about web browser security configurations, cookies, and computer caches.

About the Author

Bolakale Aremu
Bolakale Aremu

My name is Bolakale Aremu. I am multi-talented. As a computer engineer and a computer scientist, I have over 15 years of teaching experience in software development and computer hardware architecture. I am the CEO of AB Publisher LLC, a media publishing company. In the last few years I have helped the IT industry develop various useful programs on Windows, MacOS and PLCs (programmable logic controllers).

I always build solutions from scratch and go as far as modifying open source software to meet my client’s needs. As an embedded systems expert, I design embedded Systems that optimize performance and cost against complex requirements. I leverage Stratify OS (a POSIX like RTOS for micro-controllers) to quickly and cost-effectively develop complex firmware applications in Python and C/C++ languages. I work with a dedicated team of Python programmers who look into specific automation problems and proffer solutions to them.

For any inquiry, you can contact us with any of the email addresses below any time. If you want to contribute your knowledge to this website, or if you have a request, just send us your message. We promise to do our best to help.

Bolakale Aremu (CEO), Founder,

Table of Contents

  • How this Book can Help You
  • 1. What is Cybersecurity?
  • 1.1. Learning Objectives
  • 1.2. Security Threats: Confidentiality, Integrity, and Availability
  • 1.2.1. The CIA Triad
  • 1.2.2. Regulatory Standards
  • 1.3. Security Threats: Security and Information Privacy
  • 1.3.1. Data and Information Assets
  • 1.3.2. Intellectual Property
  • 1.3.3. Data-driven Business Decisions
  • 1.4. Security Threats 2: Threats and Breaches
  • 1.4.1. Hardware Threats
  • 1.4.2. Data Threats
  • 1.4.3. Software Threats
  • 1.5. Security Threats 3: Threat Types
  • 1.5.1. Impersonation
  • 1.5.2. Snooping Attack
  • 1.5.3. Eavesdropping Attack
  • 1.5.4. Man in the Middle (MITM) Attack
  • 1.5.5. Replay/Repeat Attack
  • 1.5.6. Password Cracking: Brute Force, Dictionary & Rainbow Attacks
  • 1.5.7. Unauthorized Information Alteration
  • 1.5.8. Denial of Service: DoS & DDoS
  • 2. Security Threats
  • 2.1. Password Management Techniques
  • 2.1.1. Managing Passwords
  • 2.1.2. Password Policies
  • 2.1.3. How to Create Strong Passwords
  • 2.1.4 Password Confidentiality
  • 2.1.5. Password Reuse
  • 2.1.6. Password Expiration
  • 2.1.7. Single-factor Authentication
  • 2.1.8. Two-factor Authentication
  • 2.1.9. Multifactor Authentication
  • 2.1.10. Identification Factors
  • 2.1.11. Single Sign-on (SSO)
  • 2.1.12. Password Managers
  • 2.2. Access Control, Authorization, and Authentication
  • 2.2.1. The Three A’s
  • 2.2.2. How the Three A’s Work Together
  • 2.2.3. Digital Accounting
  • 2.3. Hardening Devices
  • 2.3.1. Apps & Operating Systems
  • 2.3.2. Encryption
  • 2.3.3. Device Lock
  • 2.3.4. Disabling Features and Ports
  • 2.3.5. Firewalls and VPNs
  • 2.3.6. Open WI-FI vs Secure Wi-Fi
  • 2.3.7. Default Passwords
  • 2.4. Validation and Device Usage
  • 2.4.1. Software Sources Validation
  • 2.5. Encryption Concepts
  • 2.5.1. What is Encryption?
  • 2.5.2. Data at Rest
  • 2.5.3. Data in Motion
  • 2.5.4. Symmetric Encryption
  • 2.5.5. Asymmetric Encryption
  • 2.5.6. Public Key Infrastructure
  • 2.5.7. Cryptographic Hashes
  • 2.6. Managing Email and Spam
  • 2.6.1. How to Identify & Manage Spam
  • 2.6.2. How to Identify Suspicious Emails
  • 3. Safe Browsing Practices
  • 3.1. Application Ecosystem Security
  • 3.1.1. Mobile Applications
  • 3.1.2. Rooting & Jailbreaking
  • 3.1.3. Desktop Software
  • 3.1.4. Business Software
  • 3.1.5. Corporate Network
  • 3.2. Public Browsing Risks
  • 3.2.1. Free & Open Networks
  • 3.2.2. Public Browsing Risks
  • 3.2.3. Social Networking Sites & How to Protect Yourself
  • 3.2.4. Instant Messaging
  • 3.2.5. Internet Browser & Versions
  • 3.3. Browser Security Settings: Plug-ins, Extensions & Toolbars
  • 3.3.1. Browsers
  • 3.3.2. Security Zones & Settings
  • 3.3.3. Browser Add-ons: Plug-ins, Extensions & Toolbars
  • 3.3.4. Cookies
  • 3.3.5. Security Certificates
  • 3.3.6. Browser Updates
  • 3.4. Safe Browsing Techniques
  • 3.4.1. Autofill Management
  • 3.4.2. Browser Cache & History
  • 3.4.3. Private Browsing (Incognito Mode)
  • 3.4.4. Malicious Websites
  • 3.4.5. Safe Websites
  • 3.4.6. Adware & Popups
  • 3.4.7. Redirection
  • 3.4.8. Warning Signs
  • 3.5. Virtual Private Networks
  • 3.5.1. Encrypted Tunnel
  • 3.5.2. Site-to-site VPN
  • 3.5.3. Host-to-Site VPN
  • 3.5.4. Host-to-host VPN
  • 3.5.5. VPN Hardware
  • 3.5.6. Internet Protocol Security (IPSec)
  • 4. Wrap up
  • 5. Self-assessment Test
  • The Leanpub 60 Day 100% Happiness Guarantee

    Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

    Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

    You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

    So, there's no reason not to click the Add to Cart button, is there?

    See full terms...

    80% Royalties. Earn $16 on a $20 book.

    We pay 80% royalties. That's not a typo: you earn $16 on a $20 sale. If we sell 5000 non-refunded copies of your book or course for $20, you'll earn $80,000.

    (Yes, some authors have already earned much more than that on Leanpub.)

    In fact, authors have earnedover $13 millionwriting, publishing and selling on Leanpub.

    Learn more about writing on Leanpub

    Free Updates. DRM Free.

    If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

    Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

    Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

    Learn more about Leanpub's ebook formats and where to read them

    Write and Publish on Leanpub

    You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

    Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

    Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

    Learn more about writing on Leanpub