How Cybersecurity Really Works

A Hands-On Guide for Total Beginners

Author Sam Grubb
Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.

You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out the jargon, giving you a broad view of how specific attacks work and common methods used by online adversaries, as well as the controls and strategies you can use to defend against them.
 
Each chapter tackles a new topic from the ground up, such as malware or social engineering, with easy-to-grasp explanations of the technology at play and relatable, real-world examples. Hands-on exercises then turn the conceptual knowledge you’ve gained into cyber-savvy skills that will make you safer at work and at home. You’ll explore various types of authentication (and how they can be broken), ways to prevent infections from different types of malware, like worms and viruses, and methods for protecting your cloud accounts from adversaries who target web apps.
 
You’ll also learn how to:
    Use command-line tools to see information about your computer and network
    Analyze email headers to detect phishing attempts
    Open potentially malicious documents in a sandbox to safely see what they do
    Set up your operating system accounts, firewalls, and router to protect your network
    Perform a SQL injection attack by targeting an intentionally vulnerable website
    Encrypt and hash your files
 
In addition, you’ll get an inside look at the roles and responsibilities of security professionals, see how an attack works from a cybercriminal’s viewpoint, and get first-hand experience implementing sophisticated cybersecurity measures on your own devices.
Sam Grubb is a cybersecurity consultant for a managed service provider that works with a large variety of clients. He has six years of experience teaching cybersecurity to both adults and teenagers and holds several cybersecurity certifications, including the Certified Information Systems Security Professional (CISSP) certification.
Chapter 1: An Introduction to Cybersecurity
Chapter 2: Attack Targets on the Internet
Chapter 3: Phishing Tactics
Chapter 4: Malware Infections
Chapter 5: Password Thefts and Other Account Access Tricks
Chapter 6: Network Tapping
Chapter 7: Attacks in the Cloud
Chapter 8: Wireless Network Pirating
Chapter 9: Encryption Cracking
Chapter 10: How to Defeat Black Hats
"An excellent resource . . . The chapters scaffold in a beautiful fashion leaving the reader with a concrete foundation of cyber knowledge. Sam’s ability to explain abstract or complex concepts in a simplistic, digestible, and visual way is a major strength of this book. Novices or anyone interested in learning about cybersecurity, this is the book for you!"
—Dr. Pauline Mosley, Pace University, Professor of Information Technology

"This book is an excellent and practical introduction to cybersecurity for a beginner. . . . Sam’s examples are clear, and will be relevant to those looking for their first job in cybersecurity, pivoting to security from another field, or who just want to improve the security of their home network. . . . I enjoyed reading it."
—Jamie Winterton, Director, Strategy at Global Security Initiative at Arizona State University

“Our absolute favorite cybersecurity book . . . if you’re a total beginner looking to learn the ins and outs of cybersecurity, you’ve found your book right here.”
—Geena SQL, RealToughCandy.com

“An excellent book for beginners because it takes the mystery out of doing cybersecurity right.”
—Giovanni Hale, Goodreads Reviewer

“Easy to read . . . Useful for undergraduate CyberSec courses.”
—Dr. Larry Leibrock, Professor at Idaho State University

About

Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.

You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out the jargon, giving you a broad view of how specific attacks work and common methods used by online adversaries, as well as the controls and strategies you can use to defend against them.
 
Each chapter tackles a new topic from the ground up, such as malware or social engineering, with easy-to-grasp explanations of the technology at play and relatable, real-world examples. Hands-on exercises then turn the conceptual knowledge you’ve gained into cyber-savvy skills that will make you safer at work and at home. You’ll explore various types of authentication (and how they can be broken), ways to prevent infections from different types of malware, like worms and viruses, and methods for protecting your cloud accounts from adversaries who target web apps.
 
You’ll also learn how to:
    Use command-line tools to see information about your computer and network
    Analyze email headers to detect phishing attempts
    Open potentially malicious documents in a sandbox to safely see what they do
    Set up your operating system accounts, firewalls, and router to protect your network
    Perform a SQL injection attack by targeting an intentionally vulnerable website
    Encrypt and hash your files
 
In addition, you’ll get an inside look at the roles and responsibilities of security professionals, see how an attack works from a cybercriminal’s viewpoint, and get first-hand experience implementing sophisticated cybersecurity measures on your own devices.

Author

Sam Grubb is a cybersecurity consultant for a managed service provider that works with a large variety of clients. He has six years of experience teaching cybersecurity to both adults and teenagers and holds several cybersecurity certifications, including the Certified Information Systems Security Professional (CISSP) certification.

Table of Contents

Chapter 1: An Introduction to Cybersecurity
Chapter 2: Attack Targets on the Internet
Chapter 3: Phishing Tactics
Chapter 4: Malware Infections
Chapter 5: Password Thefts and Other Account Access Tricks
Chapter 6: Network Tapping
Chapter 7: Attacks in the Cloud
Chapter 8: Wireless Network Pirating
Chapter 9: Encryption Cracking
Chapter 10: How to Defeat Black Hats

Praise

"An excellent resource . . . The chapters scaffold in a beautiful fashion leaving the reader with a concrete foundation of cyber knowledge. Sam’s ability to explain abstract or complex concepts in a simplistic, digestible, and visual way is a major strength of this book. Novices or anyone interested in learning about cybersecurity, this is the book for you!"
—Dr. Pauline Mosley, Pace University, Professor of Information Technology

"This book is an excellent and practical introduction to cybersecurity for a beginner. . . . Sam’s examples are clear, and will be relevant to those looking for their first job in cybersecurity, pivoting to security from another field, or who just want to improve the security of their home network. . . . I enjoyed reading it."
—Jamie Winterton, Director, Strategy at Global Security Initiative at Arizona State University

“Our absolute favorite cybersecurity book . . . if you’re a total beginner looking to learn the ins and outs of cybersecurity, you’ve found your book right here.”
—Geena SQL, RealToughCandy.com

“An excellent book for beginners because it takes the mystery out of doing cybersecurity right.”
—Giovanni Hale, Goodreads Reviewer

“Easy to read . . . Useful for undergraduate CyberSec courses.”
—Dr. Larry Leibrock, Professor at Idaho State University

Books for Asian American and Native Hawaiian/Pacific Islander Heritage Month

Every May we celebrate the rich history and culture of Asian Americans, Native Hawaiians, and Pacific Islanders. Browse a curated selection of fiction and nonfiction books by AANHPI creators that we think your students will love. Find our collections of titles here: Middle School High School

Read more

PRH Education High School Collections

All reading communities should contain protected time for the sake of reading. Independent reading practices emphasize the process of making meaning through reading, not an end product. The school culture (teachers, administration, etc.) should affirm this daily practice time as inherently important instructional time for all readers. (NCTE, 2019)   The Penguin Random House High

Read more

PRH Education Translanguaging Collections

Translanguaging is a communicative practice of bilinguals and multilinguals, that is, it is a practice whereby bilinguals and multilinguals use their entire linguistic repertoire to communicate and make meaning (García, 2009; García, Ibarra Johnson, & Seltzer, 2017)   It is through that lens that we have partnered with teacher educators and bilingual education experts, Drs.

Read more

PRH Education Classroom Libraries

“Books are a students’ passport to entering and actively participating in a global society with the empathy, compassion, and knowledge it takes to become the problem solvers the world needs.” –Laura Robb   Research shows that reading and literacy directly impacts students’ academic success and personal growth. To help promote the importance of daily independent

Read more