Security in computing
From, Cloud to Crypto and AI driven concepts, learn advanced security techniques.
(SEC-COMP.AP1) / ISBN : 978-1-64459-585-5About This Course
The Security in Computing course offers a detailed introduction to cybersecurity fundamentals covering modern security policies and processes. Discover the core concepts of authentication, access control, complexities of cloud security and ethical considerations. Learn how to identify potential threats and execute safety measures to protect your systems, data, and network. Additionally, this course is aligned with ‘Security in Computing, 6th Edition’ ebook and offers up-to-date examples from real world scenarios and hands-on Labs for you to practice and solidify your learnings.
Skills You’ll Get
- Deep understanding of security fundamentals like threats, vulnerabilities, and controls
- Implement security measures that include authentication, access control, cryptography, and firewalls
- Identify potential threats in systems, networks, and applications
- Expertise in risk assessment and mitigation
- Familiarity with legal and ethical implications in the IT landscape
- Skilled for handling security incidents effectively
Interactive Lessons
14+ Interactive Lessons | 381+ Exercises | 50+ Quizzes | 89+ Flashcards | 89+ Glossary of terms
Gamified TestPrep
30+ Pre Assessment Questions | 50+ Post Assessment Questions |
Hands-On Labs
43+ LiveLab | 43+ Video tutorials | 01:38+ Hours
Preface
- Why Read This Course?
- Uses and Users of this Course
- Organization of This Course
- How to Read This Course
- What Is New in This Edition
Introduction
- What Is Computer Security?
- Threats
- Harm
- Vulnerabilities
- Controls
- Conclusion
- What’s Next?
- Exercises
Toolbox: Authentication, Access Control, and Cryptography
- Authentication
- Access Control
- Cryptography
- Conclusion
- Exercises
Programs and Programming
- Unintentional (Nonmalicious) Programming Oversights
- Malicious Code—Malware
- Countermeasures
- Conclusion
- Exercises
The Internet—User Side
- Browser Attacks
- Attacks Targeting Users
- Obtaining User or Website Data
- Mobile Apps
- Email and Message Attacks
- Conclusion
- Exercises
Operating Systems
- Security in Operating Systems
- Security in the Design of Operating Systems
- Rootkits
- Conclusion
- Exercises
Networks
- Network Concepts
- Threats to Network Communications
- Wireless Network Security
- Denial of Service
- Distributed Denial of Service
- Cryptography in Network Security
- Firewalls
- Intrusion Detection and Prevention Systems
- Network Management
- Conclusion
- Exercises
Data and Databases
- Introduction to Databases
- Security Requirements of Databases
- Reliability and Integrity
- Database Disclosure
- Data Mining and Big Data
- Conclusion
- Exercises
New Territory
- Introduction
- Cloud Architectures and Their Security
- IoT and Embedded Devices
- Cloud, IoT, and Embedded Devices—The Smart Home
- Smart Cities, IoT, Embedded Devices, and Cloud
- Cloud, IoT, and Critical Services
- Conclusion
- Exercises
Privacy
- Privacy Concepts
- Privacy Principles and Policies
- Authentication and Privacy
- Data Mining
- Privacy on the Internet
- Email and Message Security
- Privacy Impacts of Newer Technologies
- Conclusion
- Exercises
Management and Incidents
- Security Planning
- Business Continuity Planning
- Handling Incidents
- Risk Analysis
- Physical Threats to Systems
- New Frontiers in Security Management
- Conclusion
- Exercises
Legal Issues and Ethics
- Protecting Programs and Data
- Information and the Law
- Rights of Employees and Employers
- Redress for Software Failures
- Computer Crime
- Ethical Issues in Computer Security
- An Ethical Dive into Artificial Intelligence
- Incident Analyses with Ethics
- Conclusion
- Exercises
Details of Cryptography
- Cryptology
- Symmetric Encryption Algorithms
- Asymmetric Encryption
- Message Digests
- Digital Signatures
- Quantum Key Distribution
- Conclusion
Emerging Topics
- AI and Cybersecurity
- Blockchains and Cryptocurrencies
- Offensive Cyber and Cyberwarfare
- Quantum Computing and Computer Security
- Conclusion
Toolbox: Authentication, Access Control, and Cryptography
- Performing Dictionary Attack using Cain & Abel
- Using Rainbow Tables for Cracking Passwords
- Enabling an Access Control List
- Examining PKI Certificates
- Examining Asymmetric Encryption
- Performing Symmetric Encryption
- Adding a Digital Certificate
Programs and Programming
- Defending Against a Buffer Overflow Attack
- Hiding Text using Steganography
- Creating a Remote Access Trojan (RAT)
- Scanning and Classifying Different Types of Viruses
- Using the Windows Defender Settings
The Internet—User Side
- Exploiting a Website Using SQL Injection
- Creating PGP Certification
- Observing a SHA256-Generated Hash Value
- Performing a Phishing Attack
Operating Systems
- Setting up a Honeypot
- Detecting Rootkits
Networks
- Performing Packet Sniffing
- Performing Nmap Port Scanning
- Securing a Wi-Fi Hotspot
- Configuring a Wireless AP
- Using a Wireless AP for MAC Address Filtering
- Confirming the Spoofing Attack in Wireshark
- Conducting a DoS Attack Using Smurf Attack
- Launching a DoS Attack
- Performing Session Hijacking Using Burp Suite
- Simulating the DDoS Attack
- Binding a Site Using IIS
- Configuring a VPN
- Configuring IPSec
- Using Packet Filtering to Restrict Sites
- Configuring a Network Firewall
Data and Databases
- Retrieving Data from a Table
- Inserting Data into a Table
- Creating a Table in SQL
- Updating the Table Data
Privacy
- Examining Spyware
Management and Incidents
- Scheduling a Server Backup
- Taking an Incremental Backup
- Taking a Full Backup
Details of Cryptography
- Creating Asymmetric Key Pairs
- Observing an MD5-Generated Hash Value
Any questions?Check out the FAQs
Still have unanswered questions and need to get in touch?
Contact Us NowThis course focuses on the principles, practices, and techniques involved in protecting computer systems, networks, and data from various threats. You’ll gain the skills and knowledge needed to safeguard your digital assets.
Yes, you’ll learn about the legal and ethical issues and implications of security in Information Technology in detail.
As cybersecurity threats are increasing and becoming more sophisticated, organizations worldwide are now seeking skilled professionals for handling these issues. Completing this computer security course can open doors to many such rewarding career opportunities for you.
Yes, this ‘Security in Computing’ course can help you with the baseline study while building on a strong foundation in the fundamental concepts, principles, and techniques that are needed for passing cybersecurity certifications.
Yes, this course covers security challenges and solutions related to new technologies like cloud computing and IoT.