Cyber Fundamentals Course 1.0
Cyber Fundamentals Course 1.0
Cybersecurity Foundations
What is Cybersecurity?
Think of cybersecurity like fortifying a castle. Just as a castle prepares for an impending
siege, organizations must equip themselves to withstand cyber threats. They fortify
their defenses, train their defenders, and remain vigilant against potential breaches.
2. Role of Security Analysts: As a security analyst, you're like the castle's vigilant guard,
keeping watch over the kingdom's borders. You protect your organization's assets from
intruders and respond swiftly to any signs of attack.
4. Types of Threats: Security teams defend against both external invaders (hackers,
cybercriminals) and internal threats (accidental breaches, insider attacks), ensuring the
castle remains secure from all angles.
1. Security Analyst
Day-to-Day Activities:
Ideal Candidate:
Day-to-Day Activities:
3. Penetration Tester
Day-to-Day Activities:
Ideal Candidate:
Day-to-Day Activities:
Ideal Candidate:
As you continue your learning journey, remember that your role as a security analyst
contributes to creating a safer and more secure environment for organizations and
individuals alike. Embrace ongoing learning to stay abreast of evolving security
challenges and contribute meaningfully to the field.
Common Cybersecurity Attacks
Phishing: Phishing is a deceptive tactic that exploits digital communications to trick
individuals into revealing sensitive data or installing malicious software. Common types
include:
While these are just a few examples, various other attack methods exist, each posing
unique risks to cybersecurity. Throughout the program, you'll gain insights into
additional attack types and learn strategies to defend against them effectively. Stay
tuned for more insights and opportunities for growth as you progress in your
cybersecurity education.
Understanding these domains aids in career clarity and prepares professionals for
various roles in cybersecurity. While mastery in all domains isn't necessary, grasping the
basics lays a strong foundation for growth in the field.
Understanding the motivations and intentions of these threat actors enables better
preparation to safeguard organizations and individuals from their malicious activities.
Cybersecurity Ethics
Ethical Guidelines for Security Professionals
● Remain unbiased
● Maintain confidentiality and security of private data
● Confidentiality: Ensure that only authorized users access specific data or assets.
Respect privacy.
● Privacy Protection: Safeguard personal information (PII and SPII) from
unauthorized use. Security professionals have an ethical obligation to protect
private information.
● Legal Compliance: Follow laws and regulations. Work honestly and responsibly,
with respect for the law.
Key Concepts
● CIA Triad: Confidentiality, Integrity, and Availability. Frameworks and controls
created to address confidentiality, privacy protections, and laws.
● Laws and Ethics: As a cybersecurity professional, you have an ethical obligation
to protect the organization and individuals. Stay informed and advance your skills
to address security issues ethically.
Example: HIPAA
● The Health Insurance Portability and Accountability Act protects patients' health
information. Security professionals help ensure organizations comply with both
legal and ethical obligations to protect patient data.
Summary
Important Concepts
Authentication and Authorization: Critical for ensuring that only authorized individuals
access information. This process includes:
Privacy: With the vast amount of personal data collected, protecting privacy is more
important than ever. Personal information can include personally identifiable
information (PII) and protected health information (PHI). Organizations must manage
this data responsibly, respecting legal frameworks like the Health Insurance Portability
and Accountability Act (HIPAA) and the principle of reasonable expectation of privacy.
Key Takeaways:
Project Steps:
Deliverables:
● A detailed report of your personal cybersecurity audit, including your initial
findings, the improvements you made, and your plan for ongoing personal
cybersecurity practices.
●
● Resources
● Project 1 Template