Cybersecurity for Small Networks Cover

Cybersecurity for Small Networks

A No-Nonsense Guide for the Reasonably Paranoid
by Seth Enoka
October 2022, 224 pp.

Look Inside!

Cybersecurity for Small Networks pages 20-21 Cybersecurity for Small Networks pages 44-45 Cybersecurity for Small Networks pages 106-107 Cybersecurity for Small Networks pages 150-151 Cybersecurity for Small Networks pages 182-183Cybersecurity for Small Networks back cover

Cybersecurity for Small Networks is a straightforward guide to improving network security whether you’re running Linux, Windows, or macOS.

As you work through the book’s projects, you’ll learn core hardening techniques like how to map a network, track the status of devices, and recognize unusual activity that might signal an attack. You’ll explore ways to eliminate vulnerabilities and prevent unwanted access to mobile, desktop, or even IoT endpoints. You’ll also learn how to implement custom back-up strategies and how to detect, prevent, and mitigate malware or ransomware attacks.

On the still more technical side, you will: 

  • Use and configure firewalls like pfSense and iptables to filter network traffic  
  • Create a network segmentation plan to separate devices by risk, manage user access, and configure wireless authentication
  • Deploy OpenVPN or Wireguard network-wide to encrypt and protect network communication 
  • Use a Squid proxy to obfuscate personal or business data and control web traffic 
  • Implement a traffic access point (TAP) to capture and analyze network traffic, and build a Security Onion monitoring appliance to alert you to suspicious activity

No matter your level of experience, Cybersecurity for Small Networks will arm you with the tools and knowledge you need to lock down your network, and defend and recover from attacks.

Author Bio 

Seth Enoka has over a decade of experience in IT and cybersecurity, having worked on large and complex security incidents and investigations. He has helped large multinational organizations, government agencies, law enforcement, and local businesses to detect, investigate, and remediate cyber incidents and eradicate adversaries from their networks. Enoka is a leader in performing DFIR at scale with geographically diverse teams and systems, as well as building accredited labs and teams to hunt advanced adversaries and activity groups.

Table of contents 

Chapter 1: Getting Started with a Base Linux System and Network Map
Chapter 2: Architecting and Segmenting Your Network
Chapter 3: Filtering Network Traffic with Firewalls
Chapter 4: Securing Wireless Networks
Chapter 5: Creating a Virtual Private Network
Chapter 6: Improving Browsing and Privacy with the Squid Proxy
Chapter 7: Blocking Internet Advertisements
Chapter 8: Detecting, Preventing, and Removing Malware
Chapter 9: Backing Up Your Data
Chapter 10: Monitoring Your Network with Detection and Alerting
Chapter 11: Tips for Managing User Security on Your Network

View the Copyright page
View the detailed Table of Contents
View the Index


“An excellent crash course for someone like me with a technical background but little security experience. I've always wanted to beef up my home server and network security but didn't know where to start . . . This book has given me actionable steps I can take today, this week, this month, and beyond. And it gives me the confidence that I'm following reasonable best practices for an actual small network.”
—Chris Miller, GoodReads Reviewer


View the latest errata.