Week 1: Introduction to Cybersecurity
1. What is Cybersecurity?
Definition, goals, and importance.
Protecting devices, networks, and data from unauthorized access or harm
2. Key Concepts:
CIA Triad: Confidentiality, Integrity, Availability.
Threats, Vulnerabilities, and Attacks.
Types of cyber threats: malware, phishing, ransomware, social engineering.
3. Cybersecurity Roles:
Overview of roles (e.g., SOC Analyst, Ethical Hacker, Incident Responder).
4. Why Cybersecurity Matters:
Business impact and personal relevance (e.g., protecting personal data, financial
security).
Basic IT Concepts for Cybersecurity
1. Networking Basics:
IP addresses, DNS, DHCP, firewalls, VPNs.
OSI and TCP/IP models.
Basic networking commands (ping, ipconfig, tracert)
2. Operating Systems:
Windows, Linux, and macOS security features.
3. Cloud Computing:
Basics of cloud services and their security implications.
4. Data Storage and Encryption:
Basics of data storage, encryption, and hashing.
Threats, Vulnerabilities, and Attacks
1. Types of Malware:
Viruses, worms, trojans, ransomware, spyware.
2. Social Engineering:
Phishing, pretexting, baiting.
3. Common Vulnerabilities:
Weak passwords, unpatched software, misconfigurations.
4. Attack Methods:
DDoS, SQL injection, brute force, zero-day exploits.
Cybersecurity Defenses
1. Core Protections:
Firewalls, IDS/IPS, antivirus, and anti-malware tools.
2. Secure Practices:
Strong passwords, multi-factor authentication (MFA), software updates.
3. Encryption Basics:
Symmetric vs. asymmetric encryption, SSL/TLS.
4. Safe Browsing:
Recognizing secure websites (HTTPS), avoiding public Wi-Fi risks.
Security Policies and Best Practices
1. Security Policies:
Password policies, acceptable use policies, data classification.
2. Incident Response:
Steps: Detection, Containment, Eradication, Recovery.
3. Backup and Disaster Recovery:
Importance of regular backups and recovery plans.
4. Compliance:
Overview of GDPR, HIPAA, PCI-DSS.
Risk Management and Access Control
1. Risk Management:
Identification, assessment, and mitigation of risks.
2. Threat Modeling:
Understanding potential threats and attack vectors.
3. Access Control:
Principle of least privilege, role-based access control (RBAC).
4. Identity and Access Management (IAM):
Multi-factor authentication (MFA), single sign-on (SSO).
Tools
1. Security Tools:
ntroduction to tools like Nmap, Wireshark, Metasploit.
2. Basic Penetration Testing:
Ethical hacking concepts and phases.
3. Vulnerability Scanning:
Using tools to identify vulnerabilities in a test environment.
4. Cybersecurity Certifications:
Overview of certifications (e.g., CompTIA Security+, CEH, CISSP).
5. Advanced Topics:
Introduction to threat hunting, SIEM, zero trust, and cloud security.
Additional Resources:
Interactive Platforms: TryHackMe, Hack The Box, Cybrary.
Reading Materials: Blogs, podcasts, and news outlets (e.g., Krebs on Security, Dark
Reading).