The Complete Cybersecurity Bootcamp, 2nd Edition

The Complete Cybersecurity Bootcamp, 2nd Edition

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

26 Hours of Video Instruction 26 Hours of Detailed, Curated Video Training to Take You from Basic to Guru in Cybersecurity Overview: The Complete Cybersecurity Bootcamp, 2nd Edition is your comprehensive guide to becoming a cybersecurity professional. The extensive course is compiled from Omar Santo's best-selling video courses, starting with the basics and leading you through the most important topics in the cybersecurity landscape. The videos in this intensive bootcamp are structured to help you start with the fundamental concepts of cybersecurity and then build your core cybersecurity knowledge and move on to real-life pen testing and ethical hacking projects. It also covers cloud security, cybersecurity management, monitoring and analysis, network security telemetry, digital forensics and incident response (DFIR), ethical hacking and pen testing, wireless hacking and pen testing, mobile device security, and IoT security. This course can also be a resource for anyone who is preparing for security certification like CompTIA Security+, Cisco CyberOps Associate, CISSP, CompTIA PenTest+, Certified Ethical Hacker (CEH), GIAC certifications, or others. Omar Santos, a best-selling Cisco Press and Pearson security author and trainer, has compiled the lessons to provide you with the best knowledge. The Bootcamp is organized in an easy-to-follow manner to give you the freedom to move at your own pace. The course provides supplement materials to strengthen your critical concepts and techniques that help you build your own hacking environment, examples of real-life penetration testing reports, and more. This material can be found at theartofhacking.org. The contents of The Complete Cybersecurity Bootcamp, 2nd Edition were created using the following titles: Wireless Networks, IoT, and Mobile Devices Hacking by Omar Santos Cisco CyberOps Associate CBROPS 200-201 Complete Video Course by Omar Santos and Ron Taylor CCNP and CCIE Security Core SCOR 350-701 Complete Video Course by Omar Santos and Ron Taylor CompTIA PenTest+ (PT1-001) Complete Video Course by Omar Santos Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition by Omar Santos and Nick Garner Security Penetration Testing by Omar Santos, Jon Sternstein, Ron Taylor, and Chris McCoy Topics include: Module 1: Security Concepts  Module 2: Security Operations, Incident Response, and Digital Forensics  Module 3: AAA, Identity Management, Network Visibility, and Segmentation Module 4: Fundamentals of Ethical Hacking and Penetration Testing  Module 5: Mobile Device Security  Module 6: Internet of Things (IoT) Security  Module 7: Cloud Security Fundamentals Skill Level: Beginner Learn How To: Survey cybersecurity vulnerabilities Decipher Encryption and Hashing Algorithms Analyze Computer Incident Response Teams (CSIRTs) and Product Security Incident Response Teams (PSIRTs) Apply VERIS Perform DNS Analysis and Web Log Analysis Identify MITRE ATT&CK Framework Examine Asset and Threat Actor Attribution Examine Host-based Intrusion Detection Analyze Security Device Data Survey the TACACS+ Protocol Survey Open Source SDN Solutions Scope a Penetration Testing Engagement Properly Perform Footprinting through Social Engineering Scan beyond IDS and Firewall Survey Web Server Attack Tools Explore SQL Injection Tools Hack Bluetooth Build your own lab Create a Fuzzing Strategy Crack Passwords Hack iOS and Android OS Hack Android devices Who Should Take This Course: Anyone contemplating starting a career in cybersecurity. People who would like to better understand cybersecurity concepts. Anyone studying for a security cert like CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), GIAC Information Course Requirements: Students should be familiar with basic computing and networking concepts, as well as Linux and Windows fundamentals. About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.

Table of Contents:
Module 1: Security Concepts Lesson 1: Cybersecurity Fundamentals Lesson 2: Additional Cybersecurity Principles Lesson 3: Types of Attacks and Vulnerabilities Lesson 4: Fundamentals of Cryptography and PKI Module 2: Security Operations, Incident Response, and Digital Forensics Lesson 5: Fundamentals of Incident Response Lesson 6: Fundamentals of Security Monitoring Lesson 7: Intrusion Event Categories Lesson 8: Digital Forensics Fundamentals Lesson 9: Endpoint Security Technologies and Host-based Forensics Fundamentals Lesson 10: Network Intrusion Analysis Module 3: AAA, Identity Management, Network Visibility, and Segmentation Lesson 11: Introducing AAA and Identity Management Lesson 12: Network Visibility and Segmentation Lesson 13: Network Infrastructure Security Lesson 14: Software-Defined Networking Security and Programmability Module 4: Fundamentals of Ethical Hacking and Penetration Testing Lesson 15: Overview of Ethical Hacking and Penetration Testing Lesson 16: Information Gathering and Passive Reconnaissance Lesson 17: Active Reconnaissance, Scanning, and Enumeration Lesson 18: Hacking Web Servers Lesson 19: Hacking Web Applications Lesson 20: SQL Injection Lesson 21: Fundamentals of Wireless Hacking Lesson 22: Wireless Client Attacks Lesson 23: Building Your Lab and Attack Hardware Lesson 24: Aircrack-ng Lesson 25: Buffer Overflows Lesson 26: Post-Exploitation Techniques Lesson 27: Hacking User Credentials Lesson 28: Reporting and Communication Module 5: Mobile Device Security Lesson 29: Hacking Mobile Platforms Lesson 30: Mobile Device Security Lesson 31: Fundamentals of Android Security Lesson 32: Hacking iOS Devices Module 6: Internet of Things (IoT) Security Lesson 33: Fundamentals of IoT Security Lesson 34: Hacking IoT Devices Lesson 35: Attacking Bluetooth Lesson 36: Attacking NFC Module 7: Cloud Security Fundamentals Lesson 37: Understanding Cloud Security Module 8: Social Engineering Fundamentals Lesson 38: Understanding Social Engineering Countermeasures Summary 


Best Sellers


Product Details
  • ISBN-13: 9780137949328
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson Education (US)
  • Language: English
  • ISBN-10: 0137949324
  • Publisher Date: 29 Aug 2022
  • Binding: Digital


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
The Complete Cybersecurity Bootcamp, 2nd Edition
Pearson Education (US) -
The Complete Cybersecurity Bootcamp, 2nd Edition
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

The Complete Cybersecurity Bootcamp, 2nd Edition

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA