Chapters¶
This textbook is organized into 16 chapters covering 390 cybersecurity concepts drawn from the eight CSEC2017 knowledge areas referenced by the ABET CAC Cybersecurity Program Criteria.
Chapter Overview¶
- Security Foundations: Properties, Mindset, and Risk - Core security properties, mindset, threat modeling, and risk fundamentals.
- Threats, Vulnerabilities, and Security Controls - Vocabulary of threats, vulnerabilities, attack models, and the security control taxonomy.
- Cryptography Fundamentals: Symmetric Ciphers and Hashing - Symmetric encryption, block-cipher modes, hashing, and message authentication codes.
- Cryptography in Practice: PKI, TLS, and Data Protection - Public-key crypto applied: digital signatures, PKI, TLS, key management, and privacy-preserving computation.
- Software Vulnerabilities and Secure Coding - OWASP Top Ten, memory-safety bugs, injection attacks, and other common code vulnerabilities.
- Software Assurance and Supply Chain Security - Static and dynamic analysis, fuzzing, dependency scanning, SBOMs, and supply-chain defenses.
- Component and Hardware Security - TPM, HSM, secure enclaves, secure boot, side-channels, and IoT/embedded device security.
- Network Security Foundations: Protocols, Firewalls, and Detection - OSI and TCP/IP, network attacks, firewalls, IDS/IPS, segmentation, VPNs, and IPsec.
- Advanced Network Defense: Wireless, DNS, and Zero Trust - Wireless (WPA3/802.1X), DNSSEC, BGP/RPKI, DDoS mitigation, and Zero Trust architecture.
- System Security: OS, Memory, and Access Control - OS isolation, memory defenses, DAC/MAC/RBAC/ABAC, virtualization, and container security.
- Cloud Security and Operations Monitoring - Cloud shared responsibility, IAM, SIEM/SOAR, SOC, EDR/XDR, hardening, and CIS benchmarks.
- Human Security: Identity, Authentication, and Social Engineering - IAM, SSO, MFA, FIDO2/passkeys, OAuth/OIDC/SAML, social engineering, and privacy engineering.
- Organizational Security: Governance, Risk, and Compliance - GRC, NIST CSF, ISO 27001, SOC 2, PCI-DSS, BCP/DR, vendor risk, and risk-treatment decisions.
- Societal Security: Law, Forensics, and Ethics - Cyber law (CFAA, GDPR, HIPAA, etc.), digital forensics, ethics, and critical-infrastructure protection.
- Offensive and Defensive Security Operations - Pen testing, red/blue/purple teaming, MITRE ATT&CK, threat hunting, and the PICERL lifecycle.
- Emerging Topics and Capstone Pathways - AI/ML security, post-quantum crypto, confidential computing, OT/ICS, blockchain, and capstone tracks.
How to Use This Textbook¶
Chapters are ordered to respect concept dependencies — every prerequisite is introduced before the concepts that build on it. Read the chapters in sequence on a first pass, then return to specific chapters as a reference. Each chapter ends with a list of every concept it covers, drawn directly from the course learning graph.
Note: Each chapter includes the list of concepts it covers and links to the chapters whose material it builds on. Make sure to complete prerequisite chapters before tackling advanced ones.