Book 1: Cybersecurity Basics 5 Chapter 1: What Exactly Is Cybersecurity? 7 Chapter 2: Getting to Know Common Cyberattacks 23 Chapter 3: The Bad Guys You Must Defend Against 49 Book 2: Personal Cybersecurity 69 Chapter 1: Evaluating Your Current Cybersecurity Posture 71 Chapter 2: Enhancing Physical Security 93 Chapter 3: Cybersecurity Considerations When Working from Home 103 Chapter 4: Securing Your Accounts 113 Chapter 5: Passwords 131 Chapter 6: Preventing Social Engineering Attacks 147 Book 3: Securing a Business 169 Chapter 1: Securing Your Small Business 171 Chapter 2: Cybersecurity and Big Businesses 195 Chapter 3: Identifying a Security Breach 211 Chapter 4: Recovering from a Security Breach 229 Chapter 5: Backing Up 249 Chapter 6: Resetting Your Device 277 Chapter 7: Restoring from Backups 287 Book 4: Securing the Cloud 311 Chapter 1: Clouds Aren't Bulletproof 313 Chapter 2: Getting Down to Business 333 Chapter 3: Developing Secure Software 349 Chapter 4: Restricting Access 377 Chapter 5: Implementing Zero Trust 407 Chapter 6: Using Cloud Security Services 429 Book 5: Testing Your Security 451 Chapter 1: Introduction to Vulnerability and Penetration Testing 453 Chapter 2: Cracking the Hacker Mindset 473 Chapter 3: Developing Your Security Testing Plan 485 Chapter 4: Hacking Methodology 497 Chapter 5: Information Gathering 507 Chapter 6: Social Engineering 513 Chapter 7: Physical Security 529 Book 6: Enhancing Cybersecurity Awareness 541 Chapter 1: Knowing How Security Awareness Programs Work 543 Chapter 2: Creating a Security Awareness Strategy 553 Chapter 3: Determining Culture and Business Drivers 559 Chapter 4: Choosing the Best Tools for the Job 573 Chapter 5: Measuring Performance 589 Chapter 6: Assembling Your Security Awareness Program 601 Chapter 7: Running Your Security Awareness Program 621 Chapter 8: Implementing Gamification 641 Index 655.
Cybersecurity All-In-One for Dummies