Today, we are publishing the complete Table of Contents for the upcoming book titled Cybersecurity Africa: Policy, Management & Technology. This book will be published on Tekedia just as we did for Africa’s Sankofa Innovation. If you are already subscribed to this site, it comes at no additional cost. If you also subscribe to the Cybersecurity Africa, all other productions will be available at no additional cost to you. Our plan is to provide manuals and documents with specific focus on Africa to help people and enterprises deepen their capabilities as they redesign and unlock opportunities in Africa. We hope you will join hundreds of subscribers in our community. The official launch is scheduled next week.
What you have is the most comprehensive book in the world that deals with cybersecurity policy, management, technology, and digital forensics. There is no other book that has ever discussed these issues in one production, at this depth. It has a total of 29 chapters all integrated to deliver deeper insights on how firms and individuals can plan and execute their cybersecurity strategies.
What you read in this book is coming years of extensive engagements via units of my business which include Milonics Analytics (an IBM PartnerWorld), First Atlantic Cybersecurity Institute and projects with banks, governments and military around the world. I have put the experiences in a book for you. You will like them. Subscribe today and begin to learn. Easily register in the site and pay with PayPal or transfer to our Nigerian bank. Where you do not have time for that, email my team and they will get you in manually.
Tekedia Mini-MBA edition 16 (Feb 10 – May 3, 2025) opens registrations; register today for early bird discounts.
Tekedia AI in Business Masterclass opens registrations here.
Join Tekedia Capital Syndicate and invest in Africa’s finest startups here.
Cybersecurity Africa: Policy, Management and Technology
TABLE OF CONTENTS
Beginning
Preamble
About the Author – Ndubuisi Ekekwe, PhD
Structure of Information Systems
1.0 Computer Fundamentals
1.1 Fundamentals of Internet
1.2 Number Systems
1.3 Information System and Business
Information Security
2.0 Access Control Techniques
2.1 Account Administration
2.2 Account Accessibility
2.3 Authentication Techniques
Network Vulnerabilities
3.0 Networking Types, ISO Model
3.1 Networking Devices, Topologies
3.2 IP Address, MAC Address & Ports
3.3 DNS & DHCP Server
3.4 Network Vulnerabilities & Types of Attacks
Foundation of Cybersecurity
4.0 Hacking
4.1 Phases of Ethical Hacking
4.2 Testing
4.3 Cyber-Warfare and Cyber-Terrorism
4.4 Security Implementation and Governance
BYOD & SMAC Security
5.0 SMAC
5.1 SMAC Security & Forensics
5.2 BYOD
5.3 BYOD Security & Forensics
Preventing Cyber Intrusion
6.0 What is Cyber-Attack?
6.1 Cyber-Attack Response Plan
6.2 Compliance Plan Against Cyber-Attack
6.3 Technology for Preventing Cyber-Intrusion
Emerging Cybersecurity Tech
7.0 Emerging Cybersecurity Tech
7.1 Changing Trends in Cybersecurity
7.2 Social Media Role
7.3 Cybersecurity Techniques
7.4 Cyber Ethics
Ethical Hacking
8.0 Basic
8.1 Purpose of Ethical Hacking
8.2 Hackers -Types, Purposes and Goals
8.3 Phases of Ethical Hacking
8.4 Cyber warfare and Terrorism
Malware Analysis
9.0 Malware – Variants, Infections and Effects
9.1 Malware Analysis – Goals, Types
9.2 Method of Malware Analysis
9.3 Setup
9.4 FUD and Avoidance
Penetration Testing & Tools
10.0 Basics of Penetration Testing
10.1 PenTest – Types, Models, Methodologies
10.2 Vulnerability Assessment vs. Penetration Testing
10.3 Penetration Testing Tools
10.4 Penetration Testing Distributions
Intrusion Detection and Prevention
11.0 Intrusion Detection System (IDS)
11.1 Intrusion Prevention System (IPS)
11.2 IDS vs. IPS vs. Firewall
11.3 Common Detection Methodology
Network & OS Security
12.0 Network Security – Basics, Forms, Prevention
12.1 OS Security Threats
12.2 Cryptography-Network and OS Security
Ethics in Information Technology
13.0 Morals, Ethics, and Laws
13.1 Ethics in Business
13.2 Ethics in Information Technology
13.3 IT Policy
Security Policy Analysis
14.0 Security Policy and Law
14.1 Policy Development – Process & Lifecycle
14.2 Policy Types & Standards
14.3 Policy Troubleshooting
Security Policy Implementation
15.0 Identify Needs Issues/Threats
15.1 Identify the Policy Users
15.2 Review & Write Policy
15.3 Train and Enforce Policy
15.4 Review and Modify
Global Cybersecurity Policy & Law
16.0 Cyberspace & Cybercrimes
16.1 Information Warfare & Legal Issues
16.2 National Cybersecurity Policy & Law
16.3 International Law & Policy
16.4 Legal Process & Punishment
Enterprise Cybersecurity Policy
17.0 Enterprise Cybersecurity Policy
17.1 Vulnerability Assessment & Risk Analysis
17.2 Security Testing Frameworks
17.3 Vulnerability Prevention
17.4 Tools & Techniques
Physical & Human Security Management
18.0 Physical Security
18.1 Physical Security Threats
18.2 Planning and Executing
18.3 Physical Security Checklist
18.4 Theft and Locks Picking
Human Security Management
19.0 Human Security
19.1 Social Engineering Techniques
19.2 Dumpster Diving & Shoulder Surfing
19.3 Phishing & Countermeasure
19.4 Staff Training
Cybersecurity Essentials for Leaders
20.0 Planning & Managing Enterprise Information System
20.1 Planning & Managing Enterprise Network Structure
20.2 Privacy & Human Security Management
20.3 Planning & Managing Security Assessment & Testing
20.4 Disaster Recovery/Contingency Planning
Cyber Incident Analysis and Response
21.0 Cybersecurity Incident & Risk
21.1 Planning & preparing for Cyber Incident
21.2 Planning Cybersecurity Incident Response
21.3 Planning Risk Management
21.4 Disaster Recovery & Business Continuity
Building Secure Enterprises & Organizations
22.0 Secure Enterprises & Organizations
22.1 Scope and Approach
22.2 Business Goals & Security
22.3 Baseline Analysis & Desired State
22.4 Policy and Procedures
Cybersecurity Project Management
23.0 Cybersecurity Project Management
23.1 Key factors for Success
23.2 Frameworks for Cybersecurity Management
23.3 Implementation of Framework
23.4 Basic Tenets
Digital Forensics & Evidence
24.0 Digital Forensics
24.1 Digital Forensics Model
24.2 Approach and Process
24.3 Evidence Gathering & Assessment
24.4 Evidence Examination
SMAC & BYOD Forensics
25.0 Social Media Forensics
25.1 Mobile Forensics
25.2 Cloud Forensics
25.3 BYOD Forensics
25.4 Digital Forensics Lifecycle
Guarding Against Cyber Intrusions
26.0 Attacks, Tools for Defending Against
26.1 Privileges and Access Rights
26.2 Policy for Users and Organizations
26.3 Contingency Plan
26.4 Training
Information Systems Security & Assurance
27.0 Information Systems Security & Assurance
27.1 Information Security
27.2 Information Assurance
27.3 Information Security and Assurance
Cyber Intelligence & Counter Intelligence
28.0 Cyber Intelligence
28.1 Information for Strategic Decision
28.2 Counter Intelligence
28.3 Governments & Businesses
28.4 Incident handling & Damage control
29. Conclusion
---
Register for Tekedia Mini-MBA (Feb 10 - May 3, 2025), and join Prof Ndubuisi Ekekwe and our global faculty; click here.