Cybersecurity for Small Networks Cover

Cybersecurity for Small Networks

A No-Nonsense Guide for the Reasonably Paranoid
by Seth Enoka
October 2022, 224 pp.

Sale Price: $39.99 $29.99

Look Inside!

Cybersecurity for Small Networks pages 20-21 Cybersecurity for Small Networks pages 44-45 Cybersecurity for Small Networks pages 106-107 Cybersecurity for Small Networks pages 150-151 Cybersecurity for Small Networks pages 182-183

This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security—from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity.

The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you’ll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you’ll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security. By the end of this book, you’ll be armed with the skills necessary to effectively secure your small network with whatever resources you have available.

Author Bio 

Seth Enoka has over a decade of experience in IT and cybersecurity, having worked on large and complex security incidents and investigations. He has helped large multinational organizations, government agencies, law enforcement, and local businesses to detect, investigate, and remediate cyber incidents and eradicate adversaries from their networks. Enoka is a leader in performing DFIR at scale with geographically diverse teams and systems, as well as building accredited labs and teams to hunt advanced adversaries and activity groups.

Table of contents 

Chapter 1: Getting Started with a Base Linux System and Network Map
Chapter 2: Architecting and Segmenting Your Network
Chapter 3: Filtering Network Traffic with Firewalls
Chapter 4: Securing Wireless Networks
Chapter 5: Creating a Virtual Private Network
Chapter 6: Improving Browsing and Privacy with the Squid Proxy
Chapter 7: Blocking Internet Advertisements
Chapter 8: Detecting, Preventing, and Removing Malware
Chapter 9: Backing Up Your Data
Chapter 10: Monitoring Your Network with Detection and Alerting
Chapter 11: Tips for Managing User Security on Your Network

View the Copyright page
View the detailed Table of Contents
View the Index

Extra Stuff 

View resources.