Introduction to Cybersecurity Series:

Academic Textbooks for 2023

All Phase2 Advantage textbooks in the Introduction to Cybersecurity Series will be available through VitalSource, Amazon, and all major booksellers.  College and university bookstores may place orders directly through Phase2 Advantage by contacting our office.

Introduction to Cyber Risk Management and Recovery Planning

Facing daily risks to long-term success from a wide range of threats — cyber-attacks, human error, technical failures, and natural disasters — organizations must create practical plans to sustain their vital operations, security posture, industry reputation, and brand image.

The Introduction to Cyber Risk Management and Recovery Planning textbook addresses the critical topics and skills needed to ensure continuity of operations under adverse conditions. Readers will be presented with knowledge of core foundational principles such as Risk Management Frameworks, Qualitative and Quantitative Analysis, Asset Inventories and Resource Profiles, BCP design, Cloud Computing Agreements, Cloud Security, and Legal Requirements related to Cloud Storage Solutions. 

The target audience for this textbook includes Cybersecurity Operations Planners, Risk Management personnel, Information Assurance Specialists, and professionals employed by Emergency Management Agencies.

Paperback: 288 Pages
ISBN-13: 979-8987468203

Introduction to Network Cyber Defense and Investigations

As digital crime increases exponentially, the need for investigative expertise in corporate, government, and academic sectors has increased as well. Defending networks and maintaining a strong security posture is the primary mission for those individuals tasked with this responsibility.

The Introduction to Network Cyber Defense and Investigations textbook addresses the critical topics and skills needed to ensure organizational networks remain secure and functional for its users. Readers will be presented with knowledge of core foundational principles such as Enterprise Network Devices, Network Services, Host and Network Forensic Analysis, Evidence Collection, Chain of Custody Requirements, and Reporting and Documentation requirements.

The target audience for this textbook includes Cybersecurity Analysts, Computer Science and Information Technology students, and entry-level professionals employed by Security Operations Centers.

Paperback: 324 Pages
ISBN-13: 979-8987468210

Introduction to Cyber Incident Response and Remediation Strategies

As organizations rely on expanding infrastructure in an increasingly hostile threat landscape, the escalation of incidents poses critical risks to information systems and networks. The ability to identify threats and respond to incidents is vital to the survival of the operation.

The Introduction to Cyber Incident Response and Remediation Strategies textbook addresses the critical topics and skills needed to identify and response to a variety of network incidents. Readers will be presented with knowledge of core foundational principles such as The Incident Response Life Cycle, Indicators of Compromise, Investigative Techniques, Threat Intelligence Collection, Containment of Malicious Actors, Considerations for Effective Remediation, and steps to ensure complete eradication of the incident.

The target audience for this textbook includes Threat Assessment Analysts, Network Security professionals, Information Security students, and Blue Team professionals employed by Security Operations Centers.

Paperback: 268 Pages
ISBN-13: 979-8987468227

Introduction to Cybersecurity Defense and Operations

Organizations face ongoing threats to their information technology infrastructure daily. These security struggles need to be approached with modern techniques and a diverse body of knowledge. With the proper tools and training, specialists in the Cybersecurity fields will be more capable of finding success in their roles.

The Introduction to Cybersecurity Defense and Operations textbook addresses the critical topics and skills needed to ensure a robust security posture is maintained. Readers will be presented with knowledge of core foundational principles such as Threat Intelligence Analysis, Vulnerability Management, Biometric Systems, Incident Response, Securing Systems with Cryptography, and implementation strategies of the NICE Cybersecurity Workforce Framework.

The target audience for this textbook includes Cybersecurity Analysts, college students pursuing Information Assurance and Technology disciplines, and entry-level professionals employed in any cybersecurity role.

Paperback: 342 Pages
ISBN-13: 979-8987468234

Instructor Resources

Training institutions that adopt Phase2 Advantage textbooks for use in their course curricula may request corresponding instructor resources at no additional cost. These resources include lecture presentation slides, question text banks for each of the 14 chapters, and lab resource guides. For more information please contact Phase2 Advantage.

ADA Accessible Materials

All Phase2 Advantage digital course materials – including textbooks, lab guides, and lecture slides in PDF and PPT formats – are ADA accessible and score 100% on major Learning Management Systems such as Moodle, Blackboard, Canvas, and LearnUpon. For more information please contact Phase2 Advantage or visit our Higher Education page in this website.

Contact Us for Direct Orders

To find out more about bookstore orders or our full range of instructor resources, contact us today via the phone number or email address listed below.

OFFICE:
(912) 335-2217

EMAIL:
contact@phase2advantage.com