001. Chapter 1. Cybersecurity and hackers
002. Chapter 1. Why should you care about cybersecurity
003. Chapter 1. Who is the ideal reader for this book
004. Chapter 1. How does hacking and defending work
005. Chapter 1. What will you learn in this book
006. Chapter 1. What we won t cover
007. Chapter 1. What tools do you need to get started
008. Chapter 1. Summary
009. Chapter 2. Cybersecurity Everyone s problem
010. Chapter 2. Impacts of a security breach
011. Chapter 2. Objectives of a cybersecurity strategy
012. Chapter 2. Supporting our strategy Building a patching policy
013. Chapter 2. A culture of security
014. Chapter 2. How ready are you
015. Chapter 2. Summary
016. Part 1
017. Chapter 3. Understanding hackers
018. Chapter 3. Where do they come from
019. Chapter 3. What are hackers capable of
020. Chapter 3. Working through a real-life problem How do hackers think
021. Chapter 3. Summary
022. Chapter 4. External attacks
023. Chapter 4. Data injection attacks
024. Chapter 4. Malware Viruses, Trojans, and ransomware
025. Chapter 4. Dodgy Wi-Fi
026. Chapter 4. Mobile phones, SMS, and 5G
027. Chapter 4. Summary
028. Chapter 5. Tricking our way in Social engineering
029. Chapter 5. Malicious USB
030. Chapter 5. Targeted attacks Phishing
031. Chapter 5. Credential theft and passwords
032. Chapter 5. Building access cards
033. Chapter 5. Summary
034. Chapter 6. Internal attacks
035. Chapter 6. Gaining more control Privilege escalation
036. Chapter 6. Data theft
037. Chapter 6. Insider threats
038. Chapter 6. Blast radius Limiting the damage
039. Chapter 6. Building your castle Defense in depth
040. Chapter 6. Summary
041. Chapter 7. The Dark Web Where is stolen data traded
042. Chapter 7. How to access the Dark Web
043. Chapter 7. How is the Dark Web used
044. Chapter 7. Summary
045. Part 2
046. Chapter 8. Understanding risk
047. Chapter 8. How likely is a hack
048. Chapter 8. How bad will it be
049. Chapter 8. A simple model to measure risk
050. Chapter 8. How do I measure and communicate this
051. Chapter 8. Summary
052. Chapter 9. Testing your systems
053. Chapter 9. Vulnerability management
054. Chapter 9. Break your own stuff Penetration testing
055. Chapter 9. Getting expert help Bug bounties
056. Chapter 9. Breaking in Physical penetration testing
057. Chapter 9. Red teams and blue teams
058. Chapter 9. Summary
059. Chapter 10. Inside the security operations center
060. Chapter 10. Dealing with attacks Incident response
061. Chapter 10. Keeping track of everything Security and Information Event Management
062. Chapter 10. Gaining intelligence Data feeds
063. Chapter 10. Summary
064. Chapter 11. Protecting the people
065. Chapter 11. MFA
066. Chapter 11. Protecting from ransomware
067. Chapter 11. Education and support
068. Chapter 11. Summary
069. Chapter 12. After the hack
070. Chapter 12. Where to get help
071. Chapter 12. What to do next
072. Chapter 12. Lessons learned
073. Chapter 12. Summary