Get the support you need. Enroll in our Instructor-Led Course.
Lessons
15+ Lessons | 100+ Quizzes | 579+ Flashcards | 579+ Glossary of terms
TestPrep
1
Preface
- Why Read This Course?
- Uses and Users of this Course
- Organization of This Course
- How to Read This Course
- What Is New in This Edition
2
Introduction
- What Is Computer Security?
- Threats
- Harm
- Vulnerabilities
- Controls
- Conclusion
- What’s Next?
- Exercises
3
Toolbox: Authentication, Access Control, and Cryptography
- Authentication
- Access Control
- Cryptography
- Conclusion
- Exercises
4
Programs and Programming
- Unintentional (Nonmalicious) Programming Oversights
- Malicious Code—Malware
- Countermeasures
- Conclusion
- Exercises
5
The Internet—User Side
- Browser Attacks
- Attacks Targeting Users
- Obtaining User or Website Data
- Mobile Apps
- Email and Message Attacks
- Conclusion
- Exercises
6
Operating Systems
- Security in Operating Systems
- Security in the Design of Operating Systems
- Rootkits
- Conclusion
- Exercises
7
Networks
- Network Concepts
- Threats to Network Communications
- Wireless Network Security
- Denial of Service
- Distributed Denial of Service
- Cryptography in Network Security
- Firewalls
- Intrusion Detection and Prevention Systems
- Network Management
- Conclusion
- Exercises
8
Data and Databases
- Introduction to Databases
- Security Requirements of Databases
- Reliability and Integrity
- Database Disclosure
- Data Mining and Big Data
- Conclusion
- Exercises
9
New Territory
- Introduction
- Cloud Architectures and Their Security
- IoT and Embedded Devices
- Cloud, IoT, and Embedded Devices—The Smart Home
- Smart Cities, IoT, Embedded Devices, and Cloud
- Cloud, IoT, and Critical Services
- Conclusion
- Exercises
10
Privacy
- Privacy Concepts
- Privacy Principles and Policies
- Authentication and Privacy
- Data Mining
- Privacy on the Internet
- Email and Message Security
- Privacy Impacts of Newer Technologies
- Conclusion
- Exercises
11
Management and Incidents
- Security Planning
- Business Continuity Planning
- Handling Incidents
- Risk Analysis
- Physical Threats to Systems
- New Frontiers in Security Management
- Conclusion
- Exercises
12
Legal Issues and Ethics
- Protecting Programs and Data
- Information and the Law
- Rights of Employees and Employers
- Redress for Software Failures
- Computer Crime
- Ethical Issues in Computer Security
- An Ethical Dive into Artificial Intelligence
- Incident Analyses with Ethics
- Conclusion
- Exercises
13
Details of Cryptography
- Cryptology
- Symmetric Encryption Algorithms
- Asymmetric Encryption
- Message Digests
- Digital Signatures
- Quantum Key Distribution
- Conclusion
14
Emerging Topics
- AI and Cybersecurity
- Blockchains and Cryptocurrencies
- Offensive Cyber and Cyberwarfare
- Quantum Computing and Computer Security
- Conclusion
15