Jump to ratings and reviews
Rate this book

CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide (Pearson IT Cybersecurity Curriculum

Rate this book
Clearly explains core concepts, terminology, challenges, technologies, and skills



Covers today’s latest attacks and countermeasures



The perfect beginner’s guide for anyone interested in a computer security career



Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.



Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.



This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.



Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.



LEARN HOW TO



Identify and prioritize potential threats to your network Use basic networking knowledge to improve security Get inside the minds of hackers, so you can deter their attacks Implement a proven layered approach to network security Resist modern social engineering attacks Defend against today’s most common Denial of Service (DoS) attacks Halt viruses, spyware, worms, Trojans, and other malware Prevent problems arising from malfeasance or ignorance Choose the best encryption methods for your organization Compare security technologies, including the latest security appliances Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Master basic computer forensics and know what to do if you’re attacked Learn how cyberterrorism and information warfare are evolving

512 pages, Kindle Edition

Published November 11, 2019

14 people are currently reading
5 people want to read

About the author

Chuck Easttom

59 books7 followers
Chuck Easttom is an internationally renowned computer security expert and trainer. He has been in the IT industry for over 18 years and training for over 10. He has conducted numerous computer security courses over the past decade, most notably for the Secret Service Electronic Crimes Task Force. Students in his classes often include network administrators, corporate chief security officers (CSO’s), federal agents, local law enforcement, military personal, and department of defense contractors. He also has a master’s degree in education as well as a master’s of business administration (specialized in applied computer science) and has been named to both Who’s Who in Education and Whose Who in Science and Technology. He holds over 28 industry certifications including prominent computer security certifications such as CHFI, CISSP, ISSAP, and CEH. In addition to his many certifications he is a Microsoft Certified Trainer and an EC Council certified instructor.

He was part of the teams that created the CompTIA Security+ certification test, as well as their Server+ and Linux+ certification test. He was also part of the CEH version 8 job task analysis team. Chuck also created the EC Councils CAST 615 cryptography course as well as their new Certified Encryption Specialist certification course.


He is the author of 15 computer science books including two computer security textbooks from Pearson publishing that are used at universities around the world. He is also the author of a book specifically on computer crime from Cengage publishing, and most recently a computer forensics textbook from Jones and Barlett publishing.

Chuck has been a speaker on various computer security related topics including the following: the Harvard Computer Society (topic the history of computer crime), Columba University ACM Chapter (topic the history of computer viruses), Takedown con (multiple topics all related to cryptography), and Hacker Halted (topic cryptography), and the Southern Methodist University Computer Science and Engineering research colloquium (topic organized computer crime and terrorism).

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
2 (40%)
4 stars
1 (20%)
3 stars
1 (20%)
2 stars
1 (20%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.