The ABC of Cybersecurity: How to Prevent Phishing & Social Engineering Attacks, Incident Management Best Practices and Cybersecurity Awareness for Employees (Unabridged‪)‬

    • 169,00 kr

    • 169,00 kr

Publisher Description

This bundle includes three manuscripts: 

Book one - How to Prevent Phishing & Social Engineering Attacks
Book two - Incident Management Best Practices
Book three - Cybersecurity Awareness for Employees

Buy this bundle now and get started today! 

In this bundle, you will learn more than 200 terms and concepts related to cybersecurity. This book is designed for beginners or employees to have a better understanding and awareness of threats and vulnerabilities. This bundle will teach you how to protect yourself and your business from the most common cyberattacks in no time! 

In book one, you will learn: 

The ultimate goal of cybersecurity 
Understanding the CIA triad and defense in depth 
Understanding threats, exploits, and risks 
Understanding malware 
Malware and general countermeasures 
How to report malware 
Attacks on portable devices 
Intercepted communication and countermeasures 
Introduction to social networking 
Social networking threats from cybercriminals 
Understanding cross-site request forgery 
Social engineering countermeasures 
Understanding metadata 
Comprehending outside and inside threats to businesses 
Introduction to phishing 
Phishing, social engineering, and vishing 
How to prevent phishing attacks 
How to report a phishing attack 
Phishing countermeasures 
How to report phishing attacks 
Tips to avoid phishing scams


In book two, you will learn:

How to define incidents 
Basic concepts of incident management 
How to define and classify incidents 
How to prepare policy and plans for incident management 
How to define incident responses 
Understanding BIA, BCP, DRP, and IR plans 
Disaster recovery plan basics 
How to integrate BCP, IR, and DRP plans 
How to create an incident response team 
IR team roles and responsibilities 
What skillset the response team must have 
How to train the IR team 
Must have IR team tools and equipment 
How to create an incident response team 
How to communicate with IR stakeholders 
How to share information with IR stakeholders 
How to use different IR communication channels 
How to communicate incident responses 
How to monitor incident response performance 
How to escalate an incident 
How to collect data 
How to contain incidents 
How to start investigating an incident 
Must have skills for investigators 
Cybersecurity incident response basics 
Legal and regulatory considerations 
How to collect evidence 
Incident analysis basics 
Reporting the investigation 
Forensics analysis basics and test metrics 
How to test an IR plan 
How to schedule an IR test 
How to execute an IR test 
How to conclude the root cause 
How to upgrade our controls 
How to evaluate the response 
And more

In book three, you will learn: 

Viruses, cryptomalware and ransomware, trojans, rootkits, keyloggers, adware, spyware
Botnets, logic bomb, backdoors, social engineering, social engineering attacks
And more

Scott Clem
hr min
9 December
Mike Miller