Computer Programming and Cyber Security for Beginners
Total Page:16
File Type:pdf, Size:1020Kb
Computer Programming and Cyber Security for Beginners This Book Includes : Python Machine Learning , SQL , Linux , Hacking with Kali Linux , Ethical Hacking . Coding and Cybersecurity Fundamentals Zach Codings Download the Audio Book Version of This Book for FREE If you love listening to audio books on-the-go, I have great news for you. You can download the audio book version of this book for FREE just by signing up for a FREE 30-day audible trial! See below for more details! Audible Trial Benefits As an audible customer, you will receive the below benefits with your 30- day free trial: FREE audible book copy of this book After the trial, you will get 1 credit each month to use on any audiobook Your credits automatically roll over to the next month if you don’t use them Choose from Audible’s 200,000 + titles Listen anywhere with the Audible app across multiple devices Make easy, no-hassle exchanges of any audiobook you don’t love Keep your audiobooks forever, even if you cancel your membership And much more Click the links below to get started! For Audible US For Audible UK For Audible FR For Audible DE © Copyright 2019 by Zach Codings All rights reserved. The content contained within this book may not be reproduced, duplicated or transmitted without direct written permission from the author or the publisher. Under no circumstances will any blame or legal responsibility be held against the publisher, or author, for any damages, reparation, or monetary loss due to the information contained within this book, either directly or indirectly. Legal Notice: This book is copyright protected. It is only for personal use. You cannot amend, distribute, sell, use, quote or paraphrase any part, or the content within this book, without the consent of the author or publisher. Disclaimer Notice: Please note the information contained within this document is for educational and entertainment purposes only. All effort has been executed to present accurate, up to date, reliable, complete information. No warranties of any kind are declared or implied. Readers acknowledge that the author is not engaging in the rendering of legal, financial, medical or professional advice. The content within this book has been derived from various sources. Please consult a licensed professional before attempting any techniques outlined in this book. By reading this document, the reader agrees that under no circumstances is the author responsible for any losses, direct or indirect, that are incurred as a result of the use of information contained within this document, including, but not limited to, errors, omissions, or inaccuracies. Table of contents Python Machine Learning Introduction Chapter 1: Machine Learning: A Brief History Donald Hebb - The Organization of Behavior Samuel Arthur - Neural Networks, Checkers and Rote Learning Rosenblatt’s Perceptron Marcello Pelillo - The Nearest Neighbor Algorithm Perceptrons and Multilayers Going Separate Ways Robert Schapire - The Strength of Weak Learnability Advancing into Speech and Facial Recognition Present Day Machine Learning Chapter 2: Fundamentals of Python for Machine Learning What is Python? Why Python? Other Programming Languages Effective Implementation of Machine Learning Algorithms Mastering Machine Learning with Python Chapter 3: Data Analysis in Python Importance of Learning Data Analysis in Python Building Predictive Models in Python Python Data Structures Python Libraries for Data Analysis Chapter 4: Comparing Deep Learning and Machine Learning Deep Learning vs Machine Learning Problem Solving Approaches Different Use Cases Chapter 5: Machine Learning with Scikit-Learn Representing Data in Scikit-Learn Features Matrix Target Arrays Estimator API Supervised Learning in Scikit-Learn Unsupervised Learning in Scikit-Learn Chapter 6: Deep Learning with TensorFlow Brief History of TensorFlow The TensorFlow Platform TensorFlow Environments TensorFlow Components Algorithm Support Creating TensorFlow Pipelines Chapter 7: Deep Learning with PyTorch and Keras PyTorch Model Structures Initializing PyTorch Model Parameters Principles Supporting Keras Getting Started Keras Preferences Keras Functional API Chapter 8: Role of Machine Learning in the Internet of Things (IoT) Fusing Machine Learning and IoT Machine Learning Challenges in IoT Chapter 9: Looking to the Future with Machine Learning The Business Angle AI in the Future Conclusion SQL for Beginners Introduction Chapter 1: Understanding Databases Databases Database Types Chapter 2: SQL Basics What’s SQL? Data Types Chapter 3: Your First Database Creating the Database with a RAD Creating the Database with SQL Chapter 4: Exploring Data with SELECT SELECT Syntax Chapter 5: Math and Statistics with SQL Mathematical Operators Chapter 6: Relational Operators Union Intersect Except Join Operators Chapter 7: Handling Time Understanding Time Chapter 8: Query Techniques Subqueries Table Expressions Cross Tabulations Chapter 9: Database Security Access Levels Revoking Privileges Conclusion Linux for Beginners Introduction What Makes Linux Different? How Was Linux Created? Chapter 1: Where is Linux Used? The Current Development of Linux Who Owns Linux? Chapter 2: What is a Linux Distribution? The Best Linux Distributions How to Install Linux and Additional Software Chapter 3: What is Linux Made Out Of? The Boot Loader The Kernel The Linux Console and the Different Kinds of Kernels Chapter 4: Monolithic Kernels vs Microkernels Monolithic Kernels vs Microkernels Hybrid Kernels Exotic Kernels Chapter 5: Other Components Display Servers Desktop Environments Chapter 6: Daemons Implementation in Unix-like Systems Applications Chapter 7: Files and the File System Partitioning Orientation in the File System Chapter 8: Processes Multi-user and Multi-tasking Process Types Process Attributes Displaying Process Information The Life and Death of a Process Managing Processes Network I/O Problems Disk I/O Problems Users Graphical Tools Exercises Conclusion Hacking with Kali Linux Introduction Chapter 1: What Is Hacking A History of Hacking Ethical Hacker Unethical Hacker - The Cracker The Grey Hat Types of Hacking Phases of Ethical Hacking Chapter 2: Pick Your Hat Hacker Ethics Black Hat Hacker Hacker Hierarchy White Hat Hacker Grey Hat Hackers Chapter 3: How It Works & How to Get Away with It Stealing passwords Phishing attacks Back Door Attacks Zombie Computers for Distributed Denial of Service (DDoS) attacks Man in The Middle Root Access Chapter 4: Cybersecurity What Is Cybersecurity? Cybersecurity Benefits Cybersecurity Fundamentals The Importance of Cybersecurity Chapter 5: Getting To Grips With Kali Linux Desktop Environments Installing Kali Linux on A Virtual Box Chapter 6: Penetration Tests Using BackTract Methodologies for Penetration Testing The Stages of Penetration Testing Chapter 7: How Malware & Cyber Attacks Operate Types of Malware Stages of Malware Analysis Combining Malware Analysis Stages Preventing Malware Attacks Types of Attacks Robust Cybersecurity and Information Security What Are the Consequences of a Cyber Attack? Chapter 8: How to Scan Networks Modifying Packet Parameters Kali Linux and Nmap Network Scanning Chapter 9: VPNs & Firewalls What Is a Firewall? Packet Filtering Firewall Interface Firewall Bastion Host Host-Based Firewalls Personal Firewalls Distributed Firewalls What Are Virtual Private Networks? Understanding VPNs Types of VPNs Chapter 10: An Introduction To Cryptography & Digital Signatures Techniques Cryptography Types Cryptography History Chapter 11: Hacking As A Career Chief Information Security Officers Senior Security Consultant Security Engineers/Security Team Leads Data Security Analyst Penetration Testers Emerging Cyber Security Positions What Is the Best Entry-Level Cyber Security Position? How to Become a Security Specialist Career Path Requirements Conclusion Ethical Hacking Introduction Who is This Book For? The Difference Between Ethical Hacking and Cracking Chapter 1: What is Ethical Hacking? What is Ethical Hacking? The Need for Ethical Hackers How is Ethical Hacking Different from Cracking? Chapter 2: Hacking as a Career The Different Kinds of Ethical Hacking The History of White Hat Hacking Chapter 3: Making Money Freelance What Is Freelancing? The Pros and Cons of Going Freelance How to Start Freelancing Chapter 4: The Three Hats Black Hats White Hats Gray Hats Chapter 5: Ethical Hacking Explained The Evolution of Hacking Examples: Mischief or Criminal? What Does it Mean to be an Ethical Hacker? Responsibilities of an Ethical Hacker Ethics and Code of Conduct for Hackers Chapter 6: How to Scan Your System Port Scan Network Scan Vulnerability Scan Live Systems Check Ports and Checking Their Status Chapter 7: Penetration Testing The Purpose of Penetration Testing Cloud Pen Testing Responsibilities How Often Should You Perform Penetration Tests? Penetration Testing Tools Penetration Test Strategies Penetration Testing Cloud-based Applications General Advice on Cloud Pen Testing How Do On-premises Security and Cloud Security Compare? Chapter 8: Most Common Security Tools SolarWinds Log and Event Manager SolarWinds Log and Event Manager Screenshot SolarWinds Network Configuration Manager SolarWinds User Device Tracker Wireshark Nessus Professional Snort TCPdump Kismet Nikto OpenVAS OSSEC Nexpose GFI LanGuard Security Tools for The Cloud Cloud Penetration Testing From the Point of View of the Customer Penetration Testing Depending on the Cloud Service Model Things You Should Remember as a Cloud Penetration Testing Customer Chapter