Invitation to Cybersecurity

INVITATION TO CYBERSECURITY TEXTBOOK

National cybersecurity education leader Dr. Seth Hamman invites the reader into the world of cybersecurity with this accessible and intuitively structured text. This book is for students and anyone who wants to learn how to be more secure in cyberspace.

Table of Contents

  • Chapter 1: Introduction: The Hacker Advantage
  • Chapter 2: The Context of Cybersecurity: Cyberspace
  • Chapter 3: The Adversary of Cybersecurity: Hackers
  • Chapter 4: The Need for Cybersecurity: Cyber Attacks
  • Chapter 5: The Approach to Cybersecurity: Cyber Risk Management
  • Chapter 6: The Skill of Cybersecurity: Adversarial Thinking
  • Chapter 7: The Bedrock of Cybersecurity: Cryptography
  • Chapter 8: The Means of Cybersecurity: Access Control
  • Chapter 9: The Application of Cybersecurity: Principles and Practices
  • Chapter 10: The Boundaries of Cybersecurity: Ethics, Rights, and Laws
  • Chapter 11: Conclusion: The Impact of Cybersecurity
Book titled 'Invitation to Cybersecurity' with a comic-style superhero cover.

Student Testimonials

"I loved this book! I think it acts as a wonderful guide through the beginning of cybersecurity. It does really well at achieving its goal of laying down a theoretical understanding of cybersecurity and it lays a strong foundation to many higher-up courses. It was well written and I gleaned a lot from it. Well done!"

"The textbook was extremely helpful in providing an in-depth introduction to the world of cybersecurity. The labs are a great way to see how the process of cybersecurity happening."

"The labs and the textbook were amazing."

"I also enjoyed having a story that went along with the labs. I thought it was fun!"

"The labs were very practical and engaging!"

"I enjoyed reading this book. All the information is well outlined and clearly presented. I loved the analogies and examples that are used. I also found it helpful when there are images that show the cases that are being discussed.  Overall, I think that this book is a great introduction to cybersecurity."

"The book was a very nice introduction to the field. It kept things very basic and simple to an extent that allowed me to follow along and learn at a pace that was beginner friendly. I thought the labs were very cool and interesting to work on. It was awesome seeing how different areas of cybersecurity worked and what it was like to do them myself. I learned a lot about general security and computer software from the book and labs."

"This book is a great introduction to the world of cyber, and I felt like the book covered what cybersecurity is and looks like, while also giving detailed labs that gave some experience to doing the work and not just gaining the knowledge about it. There are a lot of things that I didn't think about in the world of cyber that you have to consider so this book helps flesh out those ideas and gives a good picture to how it fits into this world."

"I loved the labs!!"

"The labs were very enjoyable, largely because of the story that went along with them. The story both made the actions on the VMs more interesting, as well as were a good way to introduce examples of when types of hacks, cryptography, etc. would be used."

"The labs were particularly good. I liked the story, which made what could have been dry step-by-steps fun and engaging. The way the VMs played into it, hopping into different characters' POVs by switching to their computers, made it extra immersive. I like stories, and this aspect made it extra fun."
Logo of Center for the Advancement of Cybersecurity - Cedarville UniversityOhio Cyber Range Logo

The project was supported through a grant from the Ohio Cyber Range Institute and published by Cedrus Press, a service of the Centennial Library. All proceeds from book sales go to support the Center for the Advancement of Cybersecurity.