Certified Cybersecurity Technician (CCT) Scholarship Program

Terms and Conditions of this Scholarship:

  • There are a limited in number of scholarships and offer is subject to availability.
  • CCT vouchers are available through the scholarship program only and cannot be redeemed for their monetary value.
  • Scholarships are not available with any other discount or special pricing offer.
  • Scholarships and associated fees are nontransferable and nonrefundable.
Learn More about CCT

Defense and Deception: Confuse and Frustrate the Hackers by Kevin Cardwell

About This Book

The reason I decided to write this book is to show that we have to rethink how we look at security. We continue to use the same methods and the threat continues to evolve and bypass it, so we need to understand we need a paradigm shift and this book is to help you with this shift. The book takes you from the essential and fundamentals of defense required to protect our modern networks to the advanced concepts of segmentation and isolation to mitigate the risk, then we introduce you to the methods of deploying deception decoys on the network. With this book, you will learn how to flip the model. For years, we have listened to the statement “the attackers are at the advantage, because they only have to find one way in and we cannot secure every way in.” This is true, but with the concepts covered in this book you can flip the model and turn the advantage to the defender, and as a result, you take control of your network! One packet is all we need to identify when they are within our network! We can control the path and route that the attackers pursue and simulate and present a replication of the required data within the sement while moving the real data to a safe location.

CISO Defenders of the Cyber Realm: Dirty Deeds, Hackers & Heroes [Signed]

CISO

CISO Defenders of the Cyber Realm: Dirty Deeds, Hackers & Heroes (CISO WORLD)

Technology now is no longer a tool to ease our existence because, it is central to our very survival. Should technology fail, then society as we have come to know it, will also fail. If we expect industry to be safe, communications to continue, electricity and water to feed into homes and businesses, food to be available, money to be in the bank and to have some semblance of privacy, then technology must be strategically and rigorously protected – because today there are many bad actors in the game.

Often though there is only one isolated individual installed in a company who is expected to defend our freedoms and existence: the CISO. This role, and the people behind it, frequently go unrecognized and unsupported despite the fact they are protecting the way not only that we have come to live, but expect to.

This book opens up the world of the Chief Information Security Officer (CISO) and who they are. It also reveals to the reader the unseen daily dangers that we all face and how, in our current society, we now walk a tightrope between safety and catastrophe. Hackers, Slaughterbots, Blockchain, Artificial Intelligence (A.I.), Machine Learning (M.L.) and cybersecurity, all matters that should trouble every citizen of the internet age.