Cybersecurity Fundamentals by Kutub Thakur, Al-Sakib Khan Pathan PDF free download

Kutub Thakur, Al-Sakib Khan Pathan Cybersecurity Fundamentals PDF, was published in 2020 and uploaded for 100-level Science and Technology students of Air Force Institute of Technology (AFIT), offering CYB102 course. This ebook can be downloaded for FREE online on this page.

Cybersecurity Fundamentals ebook can be used to learn Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard.

Technical Details
Updated at:
Size: 4.05 MB
Number of points needed for download: 67
Number of downloads: 6

Books related to Cybersecurity Fundamentals

Guide to Computer Network Security, 4th edition

Author: Joseph Migga Kizza

School: University of Ilorin

Department: Engineering

Course Code: ICS308, TCS407, TCS408

Topics: computer network, computer network security, security threats, Computer Network Vulnerabilities, cyber crimes, hackers, scripting, web workers, security assessment, security analysis, security assurance, disaster management, access control, authorization, authentication, cryptography, firewall, intrusion detection, intrusion prevention, computer forensics, network forensics, virus filtering, content filtering, computer network security protocol, wireless networks, wireless devices, sensor network, Virtualization Technology, Virtualization security, cloud computing, cloud computing security, mobile systems, Internet of Things

Database Systems, 6th edition

Author: Thomas Connolly, Carolyn Begg

School: Edo University

Department: Science and Technology

Course Code: CMP222, CMP214

Topics: Database Systems, database environment, database languages, data definition language, data models conceptual modeling, database architectures, Multi-user DBMS Architectures, teleprocessing, Distributed DBMSs, data warehousing, cloud computing, Oracle Architecture, relational models, relational calculus, SQL, writing SQL commands, data manipulation, advanced SQL, object-relational DBMs, Database System Development Lifecycle, database analysis, database design, database planning, Entity–Relationship Modeling, Enhanced Entity–Relationship Modeling, normalization, Data Redundancy, Advanced Normalization, database security, data administration, database administration, concurrency control, database recovery, query processing, query optimization, distributed DBMs, Distributed Transaction Management, Distributed Concurrency Control, Distributed Deadlock Management, Distributed Database Recovery, data replication, data Replication Architecture, data Replication Schemes, object oriented DBMs, Scripting Languages, web, Common Gateway Interface, HTTP cookies, Microsoft’s Web Platform, JAVA, Oracle Internet Platform, Semi structured Data, XML, XML schema, XML Query Languages, Data Warehouse Architecture, Data Warehousing Tools, Data Warehousing Technologies, Data Warehousing Using Oracle, data mart, Data Warehousing Design, Online Analytical Processing, data mining, oracle data mining

Information Security Principles and Practice, 2nd Edition

Author: Mark Stamp

School: Edo University

Department: Science and Technology

Course Code: CMP318

Topics: information security, cryptography, access control, crypto, Codebook Cipher, Symmetric Key Crypto, block ciphers, Public Key Crypto, Elliptic Curve Cryptography, public key notation, Public Key Infrastructure, has functions, Advanced Cryptanalysis, Engima, Enigma Cipher Machine, authentication, biometrics, authorization, Access Control Matrix, Multilevel Security Models, firewalls, Intrusion Detection Systems, Simple Authentication Protocols, Authentication Protocols, Real-World Security Protocols, software flaws, malware, botnet, Digital Rights Management, Operating Systems, Operating Systems functions, Trusted Operating System

Computer networks and security

Author: CPE FUOYE

School: Federal University, Oye-Ekiti

Department: Engineering

Course Code: CPE101

Topics: Computer networks, computer security, Personal Area Network, local area network, Campus Area Network, Metropolitan Area Network, internetwork, intranet, extranet, internet, Network Interface Cards, router, malware, computer virus, trojan horses, logic bombs, spyware, worms, firewall, anti-virus

Data Communications and Networking ,4th edition

Author: Behrouz Forouzan, Sophia Chung Fegan

School: National Open University of Nigeria

Department: Science and Technology

Course Code: CIT891

Topics: Data Communications, Networking, data, signals, digital transmission, analog transmission, bandwidth utilization, transmission media, switching, data link layer, error detection, error correction, data link control, multiple access, wireless LAN, ethernet, SONET, SDH, virtual-circuit networks, frame relay, network layer, logical addressing, internet protocol, address mapping, error reporting, multicasting, transport layer, domain name system, remote logging, electronic mail, file transfer, HTTP, network management, SNMP, multimedia, cryptography, network security

Signaling in Telecommunication Networks, 2nd edition

Author: John van Bosse, Fabrizio Devetak

School: Edo University

Department: Engineering

Course Code: CPE312

Topics: Signaling, telecommunication networks, numbering plans, digital analysis, digital routing, analog transmission, digital transmission, signaling systems, Subscriber Signaling, Channel-Associated Interexchange Signaling, signaling links, signaling units, Digital Subscriber Signaling System, datalink layer, Call-Control Signaling, ISUP Signaling, Cellular Mobile Telecommunications, Cellular Mobile Networks, Air Interface Signaling, Air Interface Signaling, Signaling Connection Control Part, Transaction Capabilities Application, intelligent Network Application, Packet Networks, VoIP, Packet-Based Communication, Session Initiation Protocol, Gateway Control Protocol, Signaling Transport Protocols, SIGTRAN protocols, Bearer Independent Call-Control Protocols, BICC protocols, ATM Networks, ATM Addressing, B-ISUP Signaling Protocol

Computers in Organizations

Author: Madu Galadina, Musa Abraham Abaka

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: BUS701

Topics: Information Communication Technology, Computer, Computing, e System Unit, Central Processing Unit, Input Devices, Output Devices, Storage Devices, Memory, Databases, Computer Networks, Database Management System, Database Queries, Enterprise Databases, Data Warehouses, Computer Networks, Networking Technologies, Distributed Networks, Internet, Communications Networks, Wireless Communications Networks, World Wide Web, Electronic Commerce, Electronic Business, Project Management, Enterprise Applications, Web Based Application

Cybercrimes

Author: Philip Ndubueze

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS812

Topics: Cybercrime, Cyber Criminology, Child Pornography, Child Grooming, Cyberbullying, Cyberstalking, Cyber Squating, Dark Web, Cryptomarket Operations, Digital Piracy, Hacking, Malware, Online Advance Fee Fraud, Online Identity Theft, Sexting, Revenge Pornography, Differential Association Theory, Routine Activity Theory, Neutralization Theory, Space Transition Theory of Cybercrime, Cybercrime Legislations, International Cybercrime Legislations, International Cybercrime regulations, Studying Cybercrime, Investigating Cybercrime, Digital Forensics, hird Party Policing Strategies, Cybercrime Investigation

Software Engineering, Tenth Edition

Author: Ian sommerville

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: MCE303, MCE506

Topics: software processes, agile software development, requirements engineering, system modelling, architectural design, design and implementation, software testing, software evolution, system dependability, system security, dependable systems, reliability engineering, safety engineering, security engineering, resilience engineering, advanced software engineering, software reuse, component-based software engineering, distributed software engineering, service-oriented software engineering, systems engineering, systems of systems, real-time software engineering, software management, project management, project planning, quality management, configuration management

Multimedia Communications Directions and Innovations

Author: Jerry Gibson

School: National Open University of Nigeria

Department: Science and Technology

Course Code: CIT891

Topics: Multimedia Communications, future telecommunication networks, Speech Coding Standards, Audio Coding Standards, still image compression standards, Multimedia Conferencing Standards, ATM Network technology, Video-on-Demand Broadcasting Protocols, Internet Telephony Technology, wideband wireless packet data access, internet protocols

Cyber criminology and vulnerabilities

Author: Philip Ndubueze, Dickson Ogbonnaya Igwe

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS852

Topics: Cyber criminology, Cyber vulnerabilities, Cyber Crime, Cyberspace Threats, Cyberspace Vulnerabilities, Cyber Victimization, Profiling Cybercrime Offenders, Profiling Cybercrime Victims, Cyber Crime Legislations, Cyber Security Strategies

Operating System Concepts, 10th edition

Author: Abraham Silberschatz, Greg Gagne, Peter Galvin

School: Edo University

Department: Science and Technology

Course Code: CSC212

Topics: Operating System, Computer-System Organization, Computer-System Architecture, Operating-System Operations, Operating-System Structures, Operating-System Services, user interface, operating system interface, distributed systems, kernel data structures, Operating-System Debugging, process management, process scheduling, interprocess communication, Multicore Programming, Multithreading Models, Implicit Threading, CPU Scheduling, Multi-Processor Scheduling, Real-Time CPU Scheduling, Algorithm Evaluation, process synchronization, POSIX Synchronization, dead locks, memory management, Contiguous Memory Allocation, virtual memory, storage management, HDD Scheduling, NVM Scheduling, error detection, storage device management, RAID structure, file system, file-system interface, file-system implementation, file-system structure, file-system operations, directory implementation, Free-Space Management, File-System Internals, File-System Mounting, file sharing, virtual file systems, remote file systems, security, program threats, Cryptography, Role-Based Access Control, access matrix, virtual machines, networks, Distributed File Systems, remote file access, Linux system, Kernel Modules, programmer interface

E-Business

Author: Toyosi Daniel, Bilkisu Katagum

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: ENT401

Topics: E-Business, Mobile Telecommunication, internet, website design, internet advertisement, online shopping, E-payments, E-Marketing, E-Market Opportunity Analysis, E-Marketing Plan, Online Strategy Formulation Plan, Market Communication, Branding, Financial Appraisal, Implementation, Control of E-Marketing Plan, E-Business Security, Business Security Challenges, Network Security, network Management, Copyright Law, Electronic Access to Information, Internet Firewall, Fraud Prevention

Introduction to Web Programming

Author: Yetunde Folajimi

School: University of Ibadan

Department: Science and Technology

Course Code: CSC293

Topics: Web Programming, Programming, World Wide Web, Web Browsers, Web Usability, Web Editors, Uniform Resource Identifiers, Hypertext Transfer Protocol, Client Side Scripting, Client-side Environment, Server side Scripting, Server-side Environment, Web Application, web service, HTML, XHTML, Cascading Style Sheet, JavaScript, variables, operators, Concurrency Programming, PHP, Multithreading, Website Maintenance

Database System Concepts ,7th edition

Author: Abraham Silberschatz, Henry Korth, S Sudarshan

School: Modibbo Adama University of Technology

Department: Engineering

Course Code: TT301, TT304

Topics: Relational Model, Intermediate SQL, SQL, Advanced SQL, Database Design, E-R Model, Relational Database Design, database design, Complex Data Types, Data Analytics, big data, Physical Storage Systems, Data Storage Structures, Indexing, big data analytics, storage management, Query Processing, Query Optimization, Transactions, Transaction management, Concurrency Control, Recovery System, Database System Architectures, Parallel Storage, Distributed Storage, Parallel database, Distributed database, Parallel Query Processing, Distributed Query Processing, Parallel Transaction Processing, Distributed Transaction Processing, Advanced Indexing Techniques, Indexing Techniques, Blockchain Databases

Basic medical microbiology

Author: Patrick Murray

School: Edo University

Department: Science and Technology

Course Code: MCB315

Topics: Bacteria, Aerobic Gram-Positive Cocci, Aerobic Gram-Positive Rods, Acid-Fast Bacteria, Aerobic Gram-Negative Cocci, Coccobacilli, Aerobic Fermentative Gram-Negative Rods, Aerobic Nonfermentative Gram-Negative Rods, Anaerobic Bacteria, Spiral-Shaped Bacteria, Intracellular Bacteria, virus, Human Immunodeficiency Virus, Human Herpesvirus, Respiratory Virus, Hepatitis Virus, Gastrointestinal Virus, Systemic Dimorphic Fungi, Opportunistic Fungi, parasites, protozoa, nematodes, trematodes, cestodes, arthropods, Antibacterial Agents, Staphylococcus aureus, β-Hemolytic Streptococci, Streptococcus pneumoniae, Viridans Streptococci, Bacillus anthracis and Bacillus cereus, Listeria monocytogenes, Corynebacterium diphtheriae, Acid-Fast Organisms, Mycobacterium tuberculosis, Mycobacterium leprae, Mycobacterium avium Complex, Nocardia Species, Neisseria gonorrhoeae, Neisseria meningitidis, Eikenella corrodens, Kingella kingae, Moraxella catarrhalis, Haemophilus influenzae, Acinetobacter baumannii, Bordetella pertussis, Francisella tularensis, Brucella Species, cutaneous Fungi, Subcutaneous Fungi, Escherichia coli, Klebsiella pneumoniae, Proteus mirabilis, Salmonella Species, Shigella Species, Yersinia pestis, Vibrio cholerae, Pseudomonas aeruginosa, Burkholderia cepacia, Stenotrophomonas maltophilia, Clostridium tetani, Clostridium botulinum, Clostridium perfringens, Clostridium difficile, Bacteroides fragilis, Campylobacter jejuni, Helicobacter pylori, Treponema pallidum, Borrelia burgdorferi, Leptospira Species, Rickettsia rickettsii, Ehrlichia chaffeensis, Coxiella burnetii, Chlamydia trachomatis, Herpes Simplex Virus, Varicella-Zoster Virus, Cytomegalovirus, Epstein-Barr Virus, Human Herpesviruses, Rhinoviruses, Coronaviruses, Influenza Viruses, Paramyxoviridae, Parainfluenza Viruses, Respiratory Syncytial Virus, Human Metapneumovirus, Adenovirus, Rotavirus, Norovirus, Sapovirus, Astrovirus

Upgrading and Repairing PCs, 22nd Edition

Author: Scott Mueller

School: Edo University

Department: Science and Technology

Course Code: CMP317

Topics: electronic computers, computer components, Microprocessor, address bus, Processor Manufacturing, Intel processors, AMD processors, Processor Cooling, over clocking, motherboards, chipsets, BIOS, Motherboard ROM BIOS, ROM hardware, memory, ROM, DRAM, memory standards, memory modules, RAM upgrades, magnetic storage, Flash Memory Devices, removable storage, Solid-State Drives, USB Flash Drives, optical storage, optical technology, DVD, video hardware, Video Display Interfaces, monitors, audio hardware, speaker, microphone, input devices, keyboard, Touchscreen Technology, Internet Connectivity, Local Area Networking, Network Protocols, power supply, Power-Protection Systems, computer System Components, computer diagnostics, boot process

Principles of Fraud Examination ,4th edition

Author: Joseph Wells

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CRD405, ACC407

Topics: SKIMMING, CASH LARCENY, BILLING SCHEMES, CHECK TAMPERING, PAYROLL SCHEMES, EXPENSE REIMBURSEMENT SCHEMES, REGISTER DISBURSEMENT SCHEMES, NONCASH ASSETS, CORRUPTION, ACCOUNTING PRINCIPLES, FRAUD, Fraud Examination, FINANCIAL STATEMENT FRAUD SCHEMES, EXTERNAL FRAUD SCHEMES, FRAUD RISK ASSESSMENT, CONDUCTING INVESTIGATIONS, WRITING REPORTS, INTERVIEWING WITNESSES, OCCUPATIONAL FRAUD, OCCUPATIONAL ABUSE

Ematerial for CSC112 computer application and management

Author: Godspower Akawuku

School: Nnamdi Azikiwe University

Department: Science and Technology

Course Code: CSC112

Topics: hardware components, computer virus, antivirus, system unit, memory chips, secondary storage, input devices, output devices, communication devices, computer application, operating system, memory management, processor management, device management, file management

Principles of accounting 2

Author: Akinkuolie lateef, David Annand

School: Modibbo Adama University of Technology

Department: Administration, Social and Management science

Course Code: AC102

Topics: accounting cycle, financial statemets, final accounting, accounting information, financial reporting, financial statements, assets, liabilities, non-profit organization, receipts account, payments account, income account, expenditure account, balance sheet, asset valuation, business income, accounting errors, accounting correction, Manufacturing Account, Consignment Account, Joint Venture Account, Joint Venture Transactions, bill of exchange, departmental account, inter-departmental transfers

Past Questions related to Cybersecurity Fundamentals

Special topics in electronic and computer engineering option

Year: 2019

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: ECE512

Topics: Computer engineering, smart card chips, smart cards applications, smart card payment solutions, cybersecurity, cybercrimes, cyberattacks, RFID technology, bar cods, DDos attack, ransome ware, big data analytics, data warehousing, cloud-based services

Information security policy

Year: 2021

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB208

Topics: Cyber security consultant, chief information Security officer, Nigeria Data Protection Regulation, General Data Protection Regulation, information Security projects, information Security Policy

Enterprise and Perimeter Security

Year: 2021

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB206

Topics: Active network attacks, cloud computing, passive network attacks, network security, Enterprise Security, Perimeter Security

Data communications

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: COE513

Topics: Data communication, fibre optic cable, communication protocol, ping signal, TCP sliding window, packet tracer, NVRAM, data communication network, packer-switching, TRACERT, switches, routers, LAN topologies, circuit switching, packet switching, IP address, MAC address, backbone network, dedicated virtual private network, asymmetrical internet access, symmetrical internet access, broadband access

Communication engineering studio 2

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: COE503

Topics: Communication engineering studio, intercom system, side tone connection, communication process, transmission media, communication setup, communication system software, honey spot, service denial, eavesdropping, spoof, information leakage, data lose, hardware failure, telephone system, full duplex communications, wireless communication, telephone system side tone connection, communication systems software, information protection strategies, Antenna, Antenna radiation patterns, optical fiber, Friis transmission formula, communication systems security, communication systems protection

Introduction to Computer Science 1 study questions

Year: 2017

School: University of Ilorin

Department: Science and Technology

Course Code: CSC111

Topics: data, information, storage device, memory, flowchart, pseudo code, number system, boolean algebra, Karnaugh map, logic gate, operating system, system software, application software

Forensic Accounting and Fraud management II

Year: 2021

School: Air Force Institute of Technology

Department: Administration, Social and Management science

Course Code: ACC316

Topics: Fraud examination, Fraud theory, Forensic accounting

GEOGRAPHIC INFORMATION SYSTEMS TECHNOLOGY

Year: 2019

School: Federal University of Technology, Owerri

Department: Science and Technology

Course Code: EVT501

Topics: data acquisition, natural resource management, geographic information systems, environmental management

Introduction to Computer Science E-Test solution by dy'howner

Year: 2019

School: Federal University of Technology, Minna

Department: Science and Technology

Course Code: CPT111

Topics: Data, information, UNIVAC, VLSI, Generation of computers, Machine language, logic circuit

Basic Question and Answer on Computer, Internet and Information Technology For MTN by mypastquestion

Year: 2019

School: Scholarships

Department:

Course Code: MTN

Topics: Computer, Internet, Information Technology

Non-woven fabric technology

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: PTE407

Topics: Non-woven fabric technology, needle punching method, needle bonded fabrics, spun-laced webs, fibre packing density, non-woven fabric reinforcement technique, parallel-laid web formation, cross-laid web formation, random web formation, non-woven technology, Bale opener operation, thermal bonding, chemical bonding, hydro entanglement, stitch bonding, mat production

FSB Scholarship Question and Answer on Computer, Internet, IT and Telecom

Year: 2019

School: Scholarships

Department:

Course Code: FSB

Topics: Computer, Internet, Information Technology

Multimedia systems and technologies

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: ECE409

Topics: Multimedia systems, multimedia technology technologies, multimedia, HCI design, hypertext, hypermedia, output device, communication devices, storage device, multimedia conferencing, data compressor, distributed computing, distributed multimedia system

Electrical engineering analysis

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: EEE409

Topics: Electrical engineering analysis, filters, superposition theorem, linear elements, linear circuits, nodal analysis, half-wave dipole antenna, engineering analysis tools, communication network, radio broadcasting, television broadcasting, telephone service, cellular telephone, electronic mail, video on demand, streamed audiovisual service, uniform resource locator, routing, information representation, addressing, multiplexing, hierarchical telephone network structure

Tests related to Cybersecurity Fundamentals

Mathematics (JAMB)

School: WAEC, JAMB & POST UTME

Department:

Course Code: JAMB

Topics: Mathematics, JAMB, Logarithm, standard form, permutation, combination, number system, set, ratio, indices, factorization, inequality