KEMBAR78
Cybersecurity Fundamentals Notes | PDF | Information Security | Security
0% found this document useful (0 votes)
82 views38 pages

Cybersecurity Fundamentals Notes

The document outlines comprehensive notes from two Google Cybersecurity Certificate courses, focusing on cybersecurity assets, threats, vulnerabilities, and incident detection and response. It covers core security concepts, asset management, security planning, the NIST Cybersecurity Framework, and the incident response lifecycle. Key topics include risk assessment, vulnerability management, attack surfaces, and the importance of documentation in incident investigation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views38 pages

Cybersecurity Fundamentals Notes

The document outlines comprehensive notes from two Google Cybersecurity Certificate courses, focusing on cybersecurity assets, threats, vulnerabilities, and incident detection and response. It covers core security concepts, asset management, security planning, the NIST Cybersecurity Framework, and the incident response lifecycle. Key topics include risk assessment, vulnerability management, attack surfaces, and the importance of documentation in incident investigation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 38

Here are comprehensive notes for the provided sources, drawing on the

information presented in the transcripts:

1. Cybersecurity Assets, Network Threats & Vulnerabilities |


Google Cybersecurity Certificate

This course focuses on the protection of valuable assets from harm


through a combination of people, processes, and tools. It introduces asset
security, security systems and controls, common vulnerabilities, network
threats, and the threat modeling process. The field of security is described
as interdisciplinary, where diverse backgrounds and perspectives are
considered assets.

I. Core Security Concepts

 Assets: Any item perceived as having value to an organization,


such as equipment, data, and intellectual property.

 Threats: Any circumstance or event that can negatively impact


assets.

 Vulnerabilities: A weakness that can be exploited by a threat. Both


a vulnerability and a threat must be present for a risk to exist.

 Risk: Anything that can impact the confidentiality, integrity, or


availability (CIA triad) of an asset. Security plans are developed
based on an analysis of assets, threats, and vulnerabilities.
Organizations measure security risk by analyzing how these
elements affect the CIA triad of their information and systems.

II. Asset Management

 Definition: The process of tracking assets and the risks that affect
them. A fundamental truth in security is that "you can only protect
the things you account for".

 Asset Inventory: A catalog of assets that need to be protected.


This is essential for protecting organizational assets and helps in
allocating resources effectively.

 Asset Classification: The practice of labeling assets based on their


sensitivity and importance to an organization. Common schemes
include:

o Public: Can be shared with anyone.

o Internal-only: Can be shared within the organization but not


outside.
o Confidential: Only accessible by those working on a specific
project.

o Restricted: Highly sensitive, considered "need-to-know" (e.g.,


intellectual property, health, or payment information).

o Classification determines whether an asset can be disclosed,


altered, or destroyed.

 Information Security (InfoSec): The practice of keeping data in


all states away from unauthorized users. Weak InfoSec can lead to
identity theft, financial loss, and reputational damage.

 States of Data: Security teams protect data in three different


states:

o In use: Data currently being accessed.

o In transit: Data actively moving (e.g., sending an email).

o At rest: Data not currently being accessed, typically stored on


a physical device. Cloud storage expands the understanding
of data "at rest". Understanding these states enables risk
analysis and asset management planning.

III. Security Planning & Culture

 Security as a Culture: Security is a shared set of values that


spans all levels of an organization, from employees to vendors to
customers. Focusing on people leads to the most effective security
plans.

 Elements of a Security Plan:

o Policies: The foundation of every security plan, a set of rules


that reduce risks and protect information. They define the
"what" and "why" of protection, focusing on strategic scope,
objectives, and limitations. An example is an acceptable use
policy (AUP).

o Standards: References that tactically inform how policies are


set (e.g., password management standards).

o Procedures: Step-by-step instructions to perform specific


security tasks, ensuring accountability, consistency, and
efficiency.

 Compliance: The process of adhering to internal standards and


external regulations. It is crucial for maintaining trust, reputation,
safety, and data integrity, and for avoiding fines, penalties, and
lawsuits, especially in highly regulated industries.

IV. NIST Cybersecurity Framework (CSF)

 The NIST CSF is a voluntary framework consisting of standards,


guidelines, and best practices to manage cybersecurity risks. It
helps businesses secure information.

 Components:

o Core: Identifies five broad functions of a security plan, acting


as a security checklist:

 Identify: Managing cybersecurity risk and its effect on


an organization's people and assets.

 Protect: Implementing policies, procedures, training,


and tools to mitigate threats.

 Detect: Identifying potential security incidents and


improving monitoring.

 Respond: Using proper procedures to contain,


neutralize, and analyze incidents, and implement
improvements.

 Recover: Returning affected systems back to normal


operations.

o Tiers: Provide a way to measure performance across the five


core functions, ranging from Level 1 (Passive/bare minimum)
to Level 4 (Adaptive/exemplary standard).

o Profiles: Offer insight into the current state of a security plan,


like "photos capturing a moment in time". Good security
practice demonstrates care for people and their information.

V. Security Controls

 Definition: Safeguards designed to reduce specific security risks,


protecting assets before, during, and after an event.

 Types:

o Technical Controls: Technologies used to protect assets


(e.g., encryption, authentication systems).

o Operational Controls: Relate to maintaining the day-to-day


security environment, often performed by people (e.g.,
awareness training, incident response).
o Managerial Controls: Centered around how other controls
reduce risks (e.g., policies, standards, procedures).

 Information Privacy: The protection of unauthorized access and


distribution of data, granting individuals and organizations the right
to decide when, how, and to what extent private information about
them is shared.

 Principle of Least Privilege: Security controls should limit access


based on the user and situation, granting access only for as long as
needed to perform a task.

o Data Owners: Persons who decide who can access, edit, use,
or destroy their information.

o Data Custodians: Anyone or anything responsible for the


safe handling, transport, and storage of information.

 Personally Identifiable Information (PII): Any information that


can be used to infer an individual's identity (e.g., name,
medical/financial information, photos, emails, fingerprints).

 Cryptography: The process of transforming information into a form


that unintended readers can't understand.

o Encryption: Scrambles plaintext into unreadable ciphertext.

o Decryption: Unscrambles ciphertext back into readable


plaintext.

o Caesar's Cipher: An early cryptographic method, vulnerable


to brute force attacks and single key loss.

o Public Key Infrastructure (PKI): An encryption framework


that secures the exchange of information online. It uses a two-
step process involving asymmetric and symmetric encryption.

 Asymmetric Encryption: Uses a public key (to encrypt


data for others to see) and a private key (to decrypt
data only you can see). Secure but slower.

 Symmetric Encryption: Uses a single secret key for


exchange. Faster but less secure.

 Digital Certificate: A file that verifies the identity of a


public key holder, used to establish trust between
computers and networks.
 Hashing: Creates a unique hash value for files or applications, used
to prove data integrity and detect even slight changes in input. It
assists with non-repudiation.

 Access Controls (AAA Framework): Security controls that


manage access, authorization, and accountability of information.

o Authentication: Systems that verify who is attempting to


access information (e.g., passwords, multi-factor
authentication).

o Authorization: Determines what an authenticated user is


allowed to do, linked to the principle of least privilege and
separation of duties. Examples include HTTP Basic Auth and
OAuth (using API tokens for verification).

o Accounting: The practice of monitoring system access logs


(who, when, what resources). Essential for identifying trends
(e.g., failed login attempts), uncovering hackers, and
detecting incidents.

VI. Vulnerability Management

 Vulnerability Management Process: The continuous process of


finding vulnerabilities and fixing their exploits.

 Exploit: A way of taking advantage of a vulnerability.

 Zero-Day Exploits: Previously unknown exploits that are


happening in real-time, leaving assets vulnerable.

 Defense in Depth: A layered defense model used to protect any


asset, primarily information in cybersecurity, using a five-layer
design. Each layer features security controls:

o Perimeter Layer: User authentication, filters external access.

o Network Layer: Network firewalls, aligned with authorization.

o Endpoint Layer: Devices with network access (laptops,


desktops, servers).

o Application Layer: Software applications.

o Data Layer: Critical data like PII.

 Common Vulnerabilities and Exposures (CVE) List: An openly


accessible dictionary of known vulnerabilities and exposures, used
by organizations to improve defenses.

o Exposure: A mistake that can be exploited by a threat.


o CVEs are reported by researchers, vendors, and ethical
hackers, and undergo a strict review process by CVE
numbering authorities (CNAs). Criteria for ID assignment
include independence, recognized security risk, supporting
evidence, and affecting only one codebase.

 NIST National Vulnerability Database (NVD): Reviews CVEs and


uses the Common Vulnerability Scoring System (CVSS) to score
severity (0-10), helping security teams calculate impact and
prioritize patching.

 Vulnerability Assessments: Organizations perform these to


identify weak points and prevent attacks, as well as determine if
security controls meet regulatory standards. They typically follow a
four-step process:

o Identification: Using scanning tools and manual testing to


find vulnerabilities.

o Vulnerability Analysis: Investigating identified


vulnerabilities to find the source of the problem.

o Risk Assessment: Assigning a score to each vulnerability


based on potential impact and likelihood of exploitation, used
for prioritizing resources.

o Remediation: Addressing vulnerabilities by enforcing new


procedures, updating operating systems, or implementing
system patches, often a joint effort between security and IT
teams.

VII. Attack Surfaces & Attack Vectors

 Attack Surface: All the potential vulnerabilities that a threat actor


could exploit. Analyzing it is usually the first step for security teams.

o Physical Attack Surface: Made up of people and their


devices, can be attacked from both inside (e.g., angry
employees) and outside (e.g., business competitors).

o Security Hardening: The process of strengthening a system


to reduce its vulnerabilities and attack surface by minimizing
its points of entry. Examples include policies and access
controls.

o Digital Attack Surface: Includes everything beyond an


organization's firewall, connecting to an organization online.
Cloud computing has expanded this surface significantly.
 Attack Vectors: The pathways attackers use to penetrate security
defenses (e.g., social media, USB drives). They can be exploited
unintentionally (e.g., employees posting sensitive news) or
intentionally (e.g., disgruntled employees sharing confidential
information).

 Attacker Mindset: Security professionals adopt this mindset to


defend attack vectors. Steps include: identifying a target,
determining how the target can be accessed, evaluating
exploitability, and finding tools/methods of attack. This provides
insight into security controls and vulnerabilities.

o Defending Attack Vectors: Educating users, applying the


principle of least privilege, using the right security controls
and tools (e.g., antivirus software), and building a diverse
security team.

VIII. Types of Threats

 Social Engineering Tactics: Psychological tricks attackers use to


gain unauthorized access. The process typically involves information
gathering, establishing a line of communication (often disguised),
using persuasion tactics to manipulate the target into revealing
information, and then disconnecting to cover tracks.

o Defense: Implementing managerial controls (policies,


standards, procedures), staying informed of trends, and
sharing knowledge with others.

o Phishing Kits: Collections of software tools used to launch


phishing campaigns, even by those with little technical
background. Common tools include malicious attachments,
fake data collection forms, and fraudulent web links.

o Phishing Forms: Most common is malicious emails, but also


include smishing (text messages) and vishing (voice
communication exploitation).

 Malware: Software designed to harm devices or networks. Spyware


is one type used by cybercriminals to steal sensitive information like
login credentials.

 Web-Based Exploits (Injection Attacks):

o Cross-Site Scripting (XSS): Inserts malicious code into


vulnerable websites or web applications, often exploiting
HTML and JavaScript to gain access to session cookies,
geolocation, webcams, etc.. Types include reflected, stored,
and DOM-based.

o SQL Injection: Exploits how websites access information from


databases using SQL. Attackers can obtain sensitive
information, modify tables, and gain administrative rights.
Defense involves writing code that sanitizes input, such as
prepared statements.

 Threat Modeling: A process of identifying assets, their


vulnerabilities, and how each is exposed to threats. It applies to
entire systems, applications, or business processes. It's considered
an advanced skill but involves multiple steps.

o General Steps:

1. Define scope: Inventory and classify assets.

2. Identify threats: Define potential threat actors


(internal/external) and map them using an attack tree.

3. Characterize the environment: Apply an attacker


mindset to how users interact with the environment.

4. Analyze threats: Examine existing protections and


identify gaps, then rank threats by risk score.

5. Mitigate risk: Create a plan for defending against


threats (avoid, transfer, reduce, or accept risk).

6. Evaluate findings: Document everything, apply fixes,


and note lessons learned.

o PASTA Framework: A popular seven-stage threat modeling


framework (Process for Attack Simulation and Threat
Analysis).

1. Define Business and Security Objectives: Decide on


goals, e.g., protecting customer data.

2. Define the Technical Scope: Identify application


components to evaluate (attack surface).

3. Decompose the Application: Identify existing


controls, often by creating a data flow diagram.

4. Perform a Threat Analysis: Research up-to-date


attack information (attacker mindset).
5. Perform a Vulnerability Analysis: Deeply investigate
potential vulnerabilities, considering root causes.

6. Conduct Attack Modeling: Test vulnerabilities by


simulating attacks (e.g., creating an attack tree).

7. Analyze Risk and Impact: Assemble all information to


make informed risk management recommendations to
stakeholders.

2. Cybersecurity IDR: Incident Detection & Response | Google


Cybersecurity Certificate

This course focuses on incident detection, analysis, and response,


and applying these concepts using practical tools.

I. Incident Response Lifecycle (NIST)

 Framework: Provides a standardized approach to incident


response. This course specifically focuses on the Detect, Respond,
and Recover functions of the NIST Cybersecurity Framework (CSF).

 Phases of NIST Incident Response Lifecycle:

1. Preparation: Activities to prepare for incidents.

2. Detection and Analysis: Discovering and investigating


incidents.

3. Containment, Eradication, and Recovery: Actions to


mitigate and resolve incidents.

4. Post-Incident Activity: Reviewing and improving processes.

 Cyclical Nature: The incident lifecycle is not linear; steps can


overlap as new discoveries are made.

 Incident Definition: According to NIST, an incident is an


occurrence that "actually or imminently jeopardizes, without lawful
authority, the confidentiality, integrity, or availability of information
or an information system or constitutes a violation or imminent
threat of violation of law, security policies, security procedures, or
acceptable-use policies".

o Event vs. Incident: All security incidents are events, but not
all events are security incidents. An event is an observable
occurrence on a network, system, or device (e.g., a user
forgetting their password).
II. Incident Investigation & Documentation

 Incident Investigation: Reveals the "five Ws" of an incident: Who,


What, When, Where, and Why.

 Importance of Documentation:

o Reduces uncertainty and confusion, especially during high-


tension security incidents.

o Provides transparency, acting as a source of evidence for


insurance claims, regulatory investigations, and legal
proceedings.

o Offers standardization, ensuring consistent guidelines for


tasks and workflows.

o Improves clarity, providing clear understanding of roles,


duties, and how to get tasks done.

o Supports continuous improvement by identifying gaps in


actions.

 Documentation Tools: Word processors (Google Docs, OneNote),


ticketing systems (Jira), Google Sheets, audio recorders, cameras,
and handwritten notes.

 Types of Documentation:

o Incident Handler's Journal: A form of documentation used


to take notes on incident details (the five Ws) throughout
investigations.

o Playbooks: Manuals that provide detailed, step-by-step


instructions for operational actions when an incident occurs.
They offer structure and order during chaotic times, reducing
guesswork.

 Types: Non-automated (manual steps), Automated


(tasks done by automation), Semi-automated (combines
human action with automation).

 Playbooks are living documents that must be regularly


maintained and updated as threats evolve.

o Chain of Custody: A process of documenting evidence


possession and control during the entire incident lifecycle. It's
critical for legal proceedings, ensuring transparency and
proving evidence integrity. A "broken chain" occurs when
there are inconsistencies. Common elements include evidence
description, custody log (names, dates, purpose), and
cryptographic hashes to detect tampering.

o Final Report: Comprehensive documentation providing a


review of an incident, including a timeline and
recommendations for future prevention. Used as a reference
in lessons learned meetings.

III. Incident Response Teams

 Computer Security Incident Response Teams (CSIRTs):


Specialized groups of security professionals trained in incident
management and response.

o Goals: Effectively and efficiently manage incidents, provide


services and resources for response and recovery, and
prevent future incidents.

o Cross-functional Collaboration: CSIRTs work with other


departments (e.g., legal, public relations) to share information
and coordinate efforts, especially for regulatory compliance
and public disclosure.

o Roles:

 Security Analyst: Investigates security alerts to


determine if an incident has occurred.

 Technical Lead: Provides technical guidance.

 Incident Manager: Oversees the response process,


ensuring procedures are followed.

 Communications Lead: Manages internal and external


communications.

o CSIRTs can also be known as Incident Handling Teams (IHT) or


Security Incident Response Teams (SIRT).

 Incident Response Plans: Formal documents outlining procedures


for responding to incidents, tailored to an organization's unique
requirements (mission, size, culture, industry, structure). They
include step-by-step procedures, system information (network
diagrams, asset inventory), and contact lists. Plans must be
regularly reviewed and tested through exercises like tabletops or
simulations.

IV. Detection & Management Tools

 Detection Tools:
o Intrusion Detection System (IDS): An application that
monitors activity and alerts on possible intrusions.

 Host-based IDS: Monitors activity of the host it's


installed on (e.g., laptop, server).

 Network-based IDS: Collects and analyzes network


traffic at specific points in the network.

 Both log detected information as IDS logs and generate


alerts.

o Intrusion Prevention System (IPS): Monitors activity and


blocks threats.

o Popular Tools (often combine IDS/IPS functions): Snort,


Zeek, Kismet, Sagan, Suricata.

o IDS Signatures: Detection rules that specify the types of


network intrusions an IDS should detect. They consist of:

 Action: Determines what the IDS does if rule criteria are


met (e.g., alert, pass, reject).

 Header: Defines the signature's network traffic


(source/destination IPs, ports, protocols, direction).

 Rule Options: Customize signatures with additional


parameters (e.g., msg for alert text, sid for unique ID,
rev for revision, content to inspect packet content).

 Security Information and Event Management (SIEM): A tool


that collects and analyzes log data from various sources (IDS, IPS,
databases, firewalls, applications) to monitor critical activities and
provide a high-level overview of network events.

o Process:

1. Collect and Aggregate Data: Gathers logs from


diverse sources and centralizes them.

2. Normalize Data: Cleans up raw data, removes non-


essential attributes, and creates consistency in log
records.

3. Analyze Data: Processed data is analyzed against


configured rules to detect and categorize security
incidents as alerts.
o Tools: Splunk (data analysis platform, offers Enterprise
Security for SIEM solutions, self-hosted and cloud-hosted
versions) and Chronicle (Google Cloud's SIEM, cloud-native
tool).

o Searching: SIEMs allow searching and filtering of log data


using queries. Splunk uses Search Processing Language (SPL).
Chronicle uses YARA-L language and Unified Data Model (UDM)
search.

o SIEM Dashboards: Visual representations (charts, graphs,


tables) of security-related data, providing quick and clear
insights into an organization's security posture and metrics.

 Security Orchestration Automation and Response (SOAR): A


collection of applications, tools, and workflows that uses automation
to respond to security events. SOAR automates analysis and
response to incidents and can track/manage cases. It can be
configured to automate playbooks.

V. Network Monitoring & Analysis

 Network Monitoring: Involves observing network activity to


identify potential malicious activity, such as data exfiltration.

 Network Traffic: The amount of data that moves across a network.

 Network Data: The data that's transmitted between devices on a


network.

 Packet Sniffers (Network Protocol Analyzers): Tools designed


to capture and analyze data traffic within a network (e.g., tcpdump
and Wireshark).

o Packet Capture (P-cap): A file containing data packets


intercepted from an interface or network, incredibly useful
during incident investigation to build a storyline of events.

o Packet Analysis: The process of interpreting and


understanding network communications captured in packets.
It involves filtering network traffic to gather relevant
information efficiently.

o Packet Components:

 Header: Includes delivery information like network


protocol, port, sender/receiver IP addresses, version,
type of service, time to live, and fragmentation details.
 Payload: Contains the actual data being delivered.

 Footer: Signifies the end of a packet.

 Logs: Records of events occurring within an organization's systems,


providing visibility into the environment and crucial details for
incident investigation.

o Log Analysis: The process of examining logs to identify


events of interest.

o Log Forwarders: Software that collects logs from various


sources and forwards them to a centralized repository.

o Log Sources: Include network logs (proxies, routers,


firewalls), system logs (operating systems), application logs
(software), security logs (IDS/IPS), and authentication logs.

o Log Formats: Logs come in different formats, some human-


readable, some machine-readable (e.g., syslog, JSON, XML,
CSV).

 Telemetry: The collection and transmission of data for analysis;


while logs record events, telemetry describes the data itself (e.g.,
packet captures are network telemetry).

VI. Incident Response Phases in Practice

 Detection and Analysis: The prompt discovery and investigation


of security events. Involves examining indicators of compromise
(IOCs) to validate alerts. Challenges include the impossibility of
detecting everything and high alert volumes (often from
misconfigurations or new vulnerabilities).

 Containment: Limiting and preventing additional damage caused


by an incident (e.g., isolating an affected system to prevent
malware spread).

 Eradication: Complete removal of incident elements from all


affected systems (e.g., performing vulnerability tests, applying
patches).

 Recovery: Returning affected systems back to normal operations


(e.g., reimaging systems, resetting passwords, adjusting network
configurations).

 Post-Incident Activity: Reviewing an incident to identify areas for


improvement during handling. Includes creating a final report and
holding lessons learned meetings to discuss what happened,
actions taken, and how to improve future responses. The focus is on
learning and improvement, not blaming.

3. Cybersecurity for Beginners | Google Cybersecurity Certificate

This course introduces the fundamental concepts of cybersecurity, the


role of a security analyst, historical attacks, security domains,
frameworks, controls, ethics, and common tools and programming
languages.

I. Introduction to Cybersecurity

 Instructor: Toni.

 Cybersecurity Definition: The practice of ensuring


confidentiality, integrity, and availability (CIA triad) of
information by protecting networks, devices, people, and data from
unauthorized access or criminal exploitation.

 Threat Actor: Any person or group who presents a security risk.

 Benefits of Implementing Security:

o Mitigates (reduces impact of) threats.

o Ensures regulatory compliance (laws and guidelines) to


avoid fines and audits, upholding ethical obligations.

o Maintains and improves business productivity and


business continuity (ability to do jobs even during
incidents).

o Reduces expenses associated with risk (e.g., data loss,


downtime).

o Maintains brand trust and reputation.

II. Role of a Security Analyst

 Core Traits: Curiosity and excitement.

 Responsibilities:

o Monitoring and protecting information and systems.

o Protecting computer and network systems: Monitoring


internal networks, being the first to respond to detected
threats, and participating in exercises like penetration
testing or ethical hacking to identify vulnerabilities.
o Preventing threats: Working with IT teams to install
prevention software, supporting product security by setting up
appropriate processes and systems during software/hardware
development.

o Conducting periodic security audits: Reviewing security


records, activities, and documents to ensure confidentiality of
information.

 Core Skills:

o Transferable Skills: Collaboration, analyzing complex


scenarios, problem-solving, intellectual curiosity, motivation to
keep learning.

o Technical Skills: Familiarity with Security Information and


Event Management (SIEM) tools, computer forensics
(identifying, analyzing, preserving digital evidence), Python,
and SQL.

III. Historical Security Attacks

 Computer Virus: Malicious code interfering with operations,


causing damage, and spreading.

 Worm: A type of computer virus that can duplicate and spread on


its own.

 Malware: Software designed to harm devices or networks (modern


term for viruses/worms).

 Brain Virus (1986): Intended to track pirated software, but


unexpectedly spread globally via infected disks, slowing productivity
and impacting business operations. Emphasized the need for
security and productivity plans.

 Morris Worm (1988): Designed to assess internet size, but


uncontrollably reinstalled itself, crashing ~6,000 computers. Cost
millions and led to the establishment of Computer Emergency
Response Teams (CERTs).

 LoveLetter (early 2000s): Malware disguised as a "love letter"


email, exploiting social engineering to spread. Increased
understanding of social engineering attacks.

 Equifax Breach (2017): One of the largest data breaches, stealing


PII of over 143 million customers due to multiple security failures.

IV. Security Domains (CISSP)


 CISSP (Certified Information Systems Security Professional) defines
eight domains to organize the work of security professionals. Gaps
in one domain can negatively affect the entire organization.

1. Security and Risk Management: Defining security goals,


risk mitigation, compliance, business continuity, and legal
aspects (e.g., updating policies for GDPR).

2. Asset Security: Securing digital and physical assets,


including storage, maintenance, retention, and destruction of
data.

3. Security Architecture and Engineering: Optimizing data


security through effective tools, systems, and processes (e.g.,
configuring firewalls). Emphasizes shared responsibility in
lowering risk.

4. Communication and Network Engineering: Managing and


securing physical networks and wireless communications
(e.g., creating network policies for unsecured Wi-Fi).

5. Identity and Access Management (IAM): Ensuring users


follow policies to control and manage physical and logical
assets, validating identities, and documenting access roles
(e.g., setting up keycard access). Goal is to reduce overall risk.

6. Security Assessment and Testing: Conducting security


control testing, data collection/analysis, and security audits to
monitor for risks, threats, and vulnerabilities (e.g., auditing
user permissions to payroll data).

7. Security Operations: Conducting investigations and


implementing preventative measures (e.g., responding to
alerts about unknown devices, digital forensic investigations).

8. Software Development Security: Using secure coding


practices and incorporating security reviews into the Software
Development Lifecycle (SDLC).

V. Frameworks, Controls, and Ethics

 Security Frameworks: Guidelines for building plans to mitigate


risk and threats to data and privacy. They provide a structured
approach to a continuously evolving security lifecycle.

o Purpose: Protect PII/financial information, identify


weaknesses, manage risks, and align security with business
goals.
o Core Components: Identifying/documenting security goals,
setting guidelines, implementing strong security processes,
and monitoring/communicating results.

 Security Controls: Safeguards designed to reduce specific security


risks. Examples include security keys for multi-factor authentication
(MFA) and privacy training. Other types include encryption,
authentication, and authorization.

 CIA Triad (Confidentiality, Integrity, Availability): A


foundational model that helps organizations consider risk when
setting up systems and security policies.

o Confidentiality: Only authorized users can access specific


assets or data (e.g., strict access controls).

o Integrity: Data is correct, authentic, and reliable (e.g., using


encryption to safeguard data from tampering).

o Availability: Data is accessible to those who are authorized


to access it (e.g., systems functioning properly for timely
access).

 NIST Cybersecurity Framework (CSF): A voluntary framework


for managing cybersecurity risk with five core functions (Identify,
Protect, Detect, Respond, Recover).

 NIST Special Publication (SP) 800-53: Provides a unified


framework for protecting information systems within the U.S. federal
government.

 Security Ethics: Guidelines for making appropriate decisions as a


security professional, emphasizing respect for privilege and avoiding
abuse of access. Key ethical principles include:

o Confidentiality: Handling proprietary or private information


appropriately.

o Privacy Protections: Adhering to policies and procedures


regarding sharing of personal information.

o Laws: Following legal rules enforced by governing entities,


especially concerning sensitive data.

VI. Common Tools and Programming Languages

 Tools and programming languages enhance efficiency by


automating tasks.
 Logs: Records of events occurring within an organization’s systems,
helping identify vulnerabilities and potential breaches.

 Security Information and Event Management (SIEM) Tools:


Applications that collect and analyze log data to monitor critical
activities, provide real-time visibility, and generate alerts.

o Examples: Splunk (data analysis platform, self-hosted) and


Google's Chronicle (cloud-native SIEM).

 Playbooks: Manuals that provide detailed instructions for


operational actions, guiding analysts on how to handle security
incidents before, during, and after they occur.

 Network Protocol Analyzer (Packet Sniffer): A tool designed to


capture and analyze data traffic within a network.

o Examples: tcpdump and Wireshark.

 Linux: An open-source operating system that relies on a command


line interface as the primary user interface. Used for examining logs
and other security-related tasks.

 SQL (Structured Query Language): A programming language


used to create, interact with, and request information from
databases. Useful for filtering through large datasets.

 Python: A programming language used by security professionals to


automate repetitive and time-consuming tasks with high accuracy
and efficiency, reducing human error.

4. Fundamentals of Python for Cybersecurity | Google


Cybersecurity Certificate

This course focuses on foundational Python programming concepts


and how they can be used to automate common security tasks. Python
helps free up time from repetitive tasks, increases productivity, and
reduces human error.

I. Introduction to Python Programming

 Instructor: Ángel.

 Programming: Used to create a specific set of instructions for a


computer to execute tasks.

 Python in Security: A general-purpose language primarily used to


automate tasks. It's good for automating short, simple tasks like
sorting through log files, managing access control lists, analyzing
network traffic, and combining separate tasks into one workflow.
Python has cross-platform support and a large community that
develops Python-based tools.

 Program Structure:

o Comments: Notes programmers make about the intention


behind their code, starting with #. They improve code
readability.

o print() function: Outputs specified data to the screen.

II. Python Building Blocks

 Data Types: Categories for particular types of data items.

o String: Data consisting of an ordered sequence of characters,


written in single or double quotation marks (e.g., "Hello
Python"). Can be concatenated with +.

 String Methods: Functions that belong to the string


data type, appearing after the string (e.g., .upper()
returns uppercase, .lower() returns lowercase, .split()
converts a string into a list based on a separator).

 Index: A number assigned to every element in a


sequence, indicating its position, starting from 0. Used
for accessing individual characters or slicing parts of a
string.

o Float: Numerical data with decimal points.

o Integer: Whole number data.

o Boolean: Data that can only be one of two values: True or


False. Used in conditional statements.

o List: A data structure consisting of a collection of data in


sequential form, enclosed in square brackets [] (e.g.,
['username1', 'username2']).

 Lists are mutable, meaning their values can be freely


changed, added, or removed (unlike strings).

 Can be concatenated with +.

 Methods include .remove() to delete an element


and .append() to add an item to the end of a list.
 Variables: Containers that store data, created through an
"assignment" (e.g., device_id = "h32rb17"). Variable names should
be relevant to their use.

o Type Error: Occurs from using the wrong data type (e.g.,
trying to add a number and a string).

 Conditional Statements: Help incorporate logic into programs,


allowing different actions based on conditions (e.g., if statements).

 Iterative Statements (Loops): Code that repeatedly executes a


set of instructions, automating repetitive tasks.

o for loops: Repeat code for a specified sequence (e.g.,


iterating through items in a list).

o while loops: Repeat code as long as a condition is true.

III. Writing Effective Python Code

 Functions: Reusable sections of code that can be called upon any


number of times in a program. They save time and simplify changes.

o Built-in Functions: Functions that exist within Python and


can be called directly (e.g., print(), type(), max(), min()).

o Parameters/Arguments: Information passed into a function.


Functions can have specific expected inputs and outputs.

o Return Statements: Allow functions to send information out.

 Modules and Libraries: Collections of usable Python code,


functions, and data types that can be imported to add functionality.

o Python Standard Library: An extensive collection of pre-


packaged Python code (e.g., re for regular expressions, csv,
glob, os, time, datetime).

o External Libraries: Can be downloaded for specific tasks


(e.g., Beautiful Soup for HTML parsing, NumPy for numerical
computations).

 Code Readability: Guidelines for writing clean and understandable


code, promoting consistency among programmers.

o Style Guide: A manual that informs writing, formatting, and


design (e.g., PEP 8 for Python, which provides stylistic
guidelines related to syntax, comments, and indentation).
o Indentation: Spaces added at the beginning of a line of code,
improving readability and ensuring proper execution. PEP 8
recommends four spaces.

IV. Putting Python into Practice

 Algorithms: A set of rules (steps) that take an input, perform tasks,


and return a solution as an output. Breaking down problems into
smaller parts is recommended for designing algorithms.

 Regular Expressions (Regex): A sequence of characters that


forms a pattern, used for efficiently searching within strings or log
files for specific patterns (e.g., IP addresses, email addresses). The
re module is used for this.

 File Handling:

o Opening and Reading Files: Using the with statement


(handles errors, manages external resources, automatically
closes files) and the open() function. The .read() method
converts file contents into a string.

o Parsing Files: The process of converting data into a more


readable format, often using the .split() method to convert a
string into a list based on a specified character or whitespace.

 Debugging Code: The process of interpreting error messages to


make code work correctly.

o Syntax Errors: Result from incorrectly written code that


Python can identify.

o Logic Errors: Code runs but produces unintended or incorrect


results, often difficult to find. Strategies include using print()
statements to trace execution or debuggers with breakpoints
to segment and run code sections.

o Exceptions: Occur when the program doesn't know how to


execute code, even if the syntax is valid.

5. How To Manage Security Risks & Threats | Google


Cybersecurity Certificate

This course focuses on managing security risks and threats, detailing


CISSP's eight security domains, NIST's Risk Management Framework
(RMF), security audits, and common security tools.

I. Security Domains (CISSP)


 Instructor: Ashley.

 Security Posture: An organization's ability to manage its defense


of critical assets and data and react to change.

 Eight Security Domains (revisiting and expanding on prior


course):

1. Security and Risk Management: Focuses on defining


security goals/objectives, risk mitigation, compliance,
business continuity, and legal regulations. Emphasizes
following ethical behavior to minimize negligence, abuse, or
fraud.

2. Asset Security: Dedicated to securing digital and physical


assets, including their storage, maintenance, retention, and
destruction. Knowing what data is held and who has access is
crucial for a strong security posture.

3. Security Architecture and Engineering: Aims to optimize


data security by ensuring effective tools, systems, and
processes are in place. A core concept is shared
responsibility, meaning all individuals contribute to lowering
risk and maintaining security.

4. Communication and Network Security: Focuses on


managing and securing physical networks and wireless
communications, protecting data whether on-site, in the
cloud, or accessed remotely.

5. Identity and Access Management (IAM): Concentrates on


controlling access and authorization to keep data secure,
ensuring user access is limited to only what employees need
(principle of least privilege).

6. Security Assessment and Testing: Involves conducting


security control testing, collecting and analyzing data, and
performing security audits to monitor for risks, threats, and
vulnerabilities.

7. Security Operations: Focused on conducting investigations


and implementing preventative measures, requiring urgency
to minimize risks during active attacks. Includes digital
forensic investigations to determine incident root cause and
improve future measures.

8. Software Development Security: Emphasizes using


secure coding practices and integrating security reviews
into every phase of the Software Development Lifecycle
(SDLC) (e.g., secure design reviews, code reviews, penetration
testing).

II. Threats, Risks, and Vulnerabilities

 Threat: Any circumstance or event that can negatively impact


assets (e.g., social engineering, like phishing, which manipulates
human error to gain private information).

 Risk: The likelihood of a threat occurring, impacting the


confidentiality, integrity, or availability of an asset. Risks are
rated as low, medium, or high, based on potential harm to
reputation, operations, or finances.

 Vulnerability: A weakness that can be exploited by a threat.


Examples include outdated software, weak passwords, unprotected
confidential data, and even people's actions. Educating employees
(e.g., on identifying phishing) is a key security measure.

 Ransomware: A type of malware that encrypts data and demands


a ransom for a decryption key, often involving the dark web.

 Three Layers of the Web:

1. Surface Web: Content accessible via a standard web browser


(most people use).

2. Deep Web: Requires authorization to access (e.g.,


organizational intranets).

3. Dark Web: Only accessible with special software, often


preferred by criminals due to secrecy.

 Impacts of Threats, Risks, and Vulnerabilities:

o Financial Impact: Costs from interrupted production,


services, remediation, and fines for non-compliance.

o Identity Theft: Sensitive PII (Personally Identifiable


Information) can be stolen and sold.

o Damage to Reputation: Compromised services or data can


erode customer trust and harm the brand long-term.

III. NIST Risk Management Framework (RMF)

 The NIST RMF provides a structured approach for managing security


and privacy risks.

 Seven Steps:
1. Prepare: Activities necessary to manage security/privacy
risks before a breach (e.g., monitoring risks, identifying
controls).

2. Categorize: Developing risk management processes and


tasks by considering the impact on the CIA triad of systems
and information.

3. Select: Choosing, customizing, and documenting controls that


protect the organization (e.g., maintaining playbooks).

4. Implement: Putting security and privacy plans into action.

5. Assess: Determining if established controls are implemented


correctly and effectively, identifying weaknesses, and
suggesting changes.

6. Authorize: Being accountable for security and privacy risks,


generating reports, and establishing action plans aligned with
security goals.

7. Monitor: Continuously assessing and maintaining technical


operations to ensure systems meet security goals and
minimize risk.

IV. Security Frameworks and Controls in Detail

 Security Frameworks: Guidelines used as a starting point for


organizations to create their own security policies and processes,
mitigating risks and threats. They can guide both virtual and
physical security and are crucial for increasing employee awareness
(e.g., phishing training).

 Security Controls: Safeguards designed to reduce specific security


risks.

o Encryption: Converts data from a readable format (plaintext)


to an encoded, unreadable format (ciphertext) for protection.

o Authentication: The process by which a user proves their


identity (e.g., password, MFA).

o Authorization: The concept of granting access to specific


resources within a system, verifying a person has permission.

V. OWASP Security Principles

 These principles are useful in conjunction with NIST frameworks and


the CIA triad to minimize threats and risks.
o Minimize the Attack Surface Area: Reducing all potential
vulnerabilities that a threat actor could exploit (e.g., disabling
software features, restricting access, complex passwords).

o Principle of Least Privilege: Ensuring users have the


minimum amount of access required to perform their daily
tasks, limiting potential damage from a breach.

o Defense in Depth: Implementing multiple security controls


that address risks and threats in different ways, creating
multiple layers of defense (e.g., MFA, firewalls, IDS, permission
settings).

o Separation of Duties: Preventing individuals from carrying


out fraudulent or illegal activities by not granting too many
privileges to one person (e.g., someone who signs paychecks
shouldn't also prepare them).

o Keep Security Simple: Avoiding unnecessarily complicated


security solutions that can become unmanageable and hinder
collaboration.

o Fix Security Issues Correctly: Identifying the root cause of


an incident, correcting identified vulnerabilities, and
conducting tests to ensure repairs are successful.

VI. Security Audits

 Internal Security Audits: Help security teams identify


organizational risk, assess controls, and correct compliance issues.

 Common Elements:

1. Establishing Scope and Goals: Defining the specific criteria


(people, assets, policies, etc.) and security objectives of the
audit.

2. Conducting a Risk Assessment: Identifying potential


threats, risks, and vulnerabilities to determine necessary
security measures.

3. Completing a Controls Assessment: Reviewing existing


assets and evaluating potential risks to ensure internal
controls and processes are effective. Controls are classified as:

 Administrative Controls: Policies and procedures


related to human aspects (e.g., password policies).
 Technical Controls: Hardware and software solutions
(e.g., IDS, encryption).

 Physical Controls: Measures to prevent physical


access (e.g., surveillance cameras, locks).

4. Assessing Compliance: Determining adherence to


necessary compliance regulations (e.g., GDPR, PCI DSS).

5. Communicating Results: Summarizing the audit's scope,


goals, risks, compliance needs, and providing
recommendations to stakeholders.

o Audits are opportunities to improve security posture.

VII. Security Tools (Revisited and Detailed)

 Logs: Records of events within an organization's systems and


networks, crucial for security analysts to identify vulnerabilities and
breaches.

o Common Log Sources: Firewall logs (incoming/outbound


traffic), Network logs (devices entering/leaving network,
connections), Server logs (website, email, file share events
like logins/passwords).

 Security Information and Event Management (SIEM) Tools:


Applications that collect, analyze, and store log data from multiple
sources in a centralized location. They provide real-time visibility,
event monitoring, and automated alerts, increasing efficiency.

o SIEM Dashboards: Visual representations (charts, graphs,


tables) of security information, allowing quick identification of
patterns and trends. They also display metrics (e.g., response
time, availability, failure rate) and can be customized for
different stakeholders.

o Types of SIEM Tools: Self-hosted (organization maintains


infrastructure), Cloud-hosted (vendor manages), Hybrid
(combination).

o Examples: Splunk Enterprise (self-hosted), Splunk Cloud


(cloud-hosted), Google's Chronicle (cloud-native, takes full
advantage of cloud computing).

VIII. Playbooks and Incident Response Phases

 Playbooks: Manuals detailing operational actions and tools for


security incidents, ensuring consistency, urgency, efficiency, and
accuracy in response. Different types exist for various attacks
(ransomware, malware, DDoS).

 Six Phases of an Incident Response Playbook:

1. Preparation: Documenting procedures, staffing plans, and


user education to mitigate likelihood, risk, and impact.

2. Detection and Analysis: Detecting and analyzing events


using defined processes and technology to determine if a
breach occurred and its magnitude.

3. Containment: Preventing further damage and reducing the


immediate impact of an incident by taking actions to contain
it.

4. Eradication and Recovery: The complete removal of


incident artifacts and restoring the affected environment to a
secure state (IT restoration).

5. Post Incident Activity: Documenting the incident, informing


leadership, and applying lessons learned (e.g., root cause
analysis, implementing updates) to enhance overall security
posture for future incidents.

6. Coordination: Reporting incidents and sharing information


throughout the process based on established standards,
ensuring compliance and coordinated response.

 Playbooks and SIEM Integration: SIEM tools detect threats and


generate alerts, which then inform the security team to use the
appropriate playbook to guide the response process. Playbooks are
"living documents" frequently updated based on new threats and
lessons learned.

6. How To Prepare For Your Cybersecurity Career | Google


Cybersecurity Certificate

This course focuses on practical application of core security


concepts, incident escalation, communicating with stakeholders,
engaging with the security community, and preparing for cybersecurity
jobs.

I. Security Mindset & Data Protection

 Instructors: Dion and Emily.


 Security Mindset: The ability to evaluate risk and constantly seek
out and identify potential or actual breaches. It involves staying up-
to-date with attack trends, helps analysts defend against constant
attacker pressure, and prepares for worst-case scenarios. It is crucial
for protecting all levels of assets, from low to high importance.

 Importance of Data Protection: The data protected (e.g., PII,


credit card numbers, passwords) affects multiple levels of an
organization and its customers, who trust their data will be
protected. Handling sensitive data with care and attention to detail
is vital.

II. Incident Escalation

 Definition: The process of identifying a potential security incident,


triaging it, and, if appropriate, handing it off to a more experienced
team member. Not every incident requires escalation.

 Essential Skills for Escalation:

o Attention to detail: Helps quickly identify when something


seems wrong.

o Ability to follow escalation guidelines/processes: Crucial


for knowing how to properly escalate issues.

 Organizational Structure: Larger organizations have many levels


and teams involved in security (CISO, engineering, PR, legal), each
with defined roles depending on the incident's nature and scope.
Smaller organizations may have fewer security personnel.

 Incident Classification Types:

o Malware Infection: Malicious software (e.g., ransomware)


disrupting systems.

o Unauthorized Access: Gaining digital or physical access


without permission (e.g., brute force attacks). Urgency of
escalation depends on the criticality of the system.

o Improper Usage: Misuse of a system or data by an


authorized user.

 Impact of Unescalated Incidents: Even small incidents can


escalate into much larger problems, leading to financial loss,
operational downtime, and data breaches. Incident criticality (low,
medium, high) is determined by the value of the affected asset.
 Escalation Policy: Each organization has its own process outlining
who should be notified when an alert occurs and how it should be
handled. It's important to understand and bookmark this policy, as
challenges can arise (e.g., supervisor being out of office).

III. Communicating with Stakeholders

 Stakeholders: Individuals or groups with an interest in an


organization's decisions or activities. They provide input on security
team decisions, as security incidents can affect the entire
company's operations.

o Key Stakeholders: Risk Managers (identify risks, manage


response, notify legal/PR). CEO (highest-ranking,
financial/managerial decisions). CFO (manages financial
operations, concerned about incident costs). CISO (high-level
executive, develops security architecture, conducts risk
analysis/audits, creates plans). Operations Managers (oversee
security professionals, first line of defense, daily
maintenance).

 Effective Communication Strategies: Communications to


stakeholders should be clear, concise, focused, and avoid
unnecessary technical terms.

o Security Story: Detail the security challenge, its impact, and


possible solutions, supported by data/reports. It should
reference established procedures (e.g., incident response
playbooks) and suggest solutions.

o Communication Methods: Email, sharing documents, phone


calls, incident management/ticketing systems.

o Visuals: Highly effective for conveying impactful data and


metrics (e.g., graphs, charts, videos, visual dashboards). An
example involves creating a bar chart in Google Sheets to
show departments with high phishing email click rates.

o Qualities: Precise, confident, natural tone, normal pace.


Follow-up shows initiative.

IV. Preparing for a Cybersecurity Career

 Engaging with the Security Community:

o Reliable Resources: Websites and blogs like CSO Online,


Krebs on Security, and Dark Reading help stay updated on
security news and trends.
o Social Media: LinkedIn is useful for connecting with
professionals, following industry leaders (e.g., CISOs), and
finding security-related events and groups.

o Professional Organizations: Joining cybersecurity


associations for networking and learning.

 Finding and Applying for Jobs:

o Monster Jobs. Research company, job role, and


required/preferred skills before applying.

o Resume (Curriculum Vitae/CV): Should be tailored to the


job.

 Content: Highlight skills and concepts learned in the


certificate program (e.g., Python, SQL, Linux command
line, security mindset, NIST CSF, CIA triad, SIEM tools,
packet sniffers). Include transferable skills (detail-
oriented, collaborative, communication) from previous
experience.

 Structure: Name, professional title, contact info, brief


summary statement, bulleted skills section, work history
(start bullets with verbs, quantify accomplishments),
education and certifications.

 Tips: No spelling/grammar errors, typically ~2 pages,


list last 10 years of experience or less. Use templates.

o Interview Preparation:

 Pre-interview Research: Understand the company's


mission/values, the employer's needs, and how your
skills can add value. Prepare questions for the
interviewer.

 Building Rapport: Professional, polite, and friendly


communication from the first interaction. Express
appreciation.

 STAR Method (Situation, Task, Action, Result): A


technique to answer behavioral and situational interview
questions thoughtfully.

 Elevator Pitch: A short, persuasive summary


explaining who you are, why you care about security,
and your relevant qualifications/skills. Highlight
transferable and technical skills. Practice but avoid
sounding robotic, and speak at a normal pace. Take
deep breaths and deliver with confidence.

7. Internet Networks & Network Security | Google Cybersecurity


Certificate

This course delves into the basic structure and function of networks,
commonly used network tools and protocols, and methods for securing
networks against attacks through security hardening practices.

I. Network Structure and Devices

 Instructor: Chris Roosenraad.

 Network Definition: A group of connected devices that


communicate with each other over network cables or wireless
connections. Devices use unique IP and MAC addresses to locate
each other.

 Network Types:

o Local Area Network (LAN): Spans a small geographical area


(e.g., office, home) and connects to the internet.

o Wide Area Network (WAN): Spans a large geographical


area (e.g., city, state, country), with the internet being a large
WAN.

 Common Network Devices:

o Hub: Broadcasts information to every device on the network.

o Switch: Makes connections between specific devices, passing


data only to the intended destination, making it more secure
and improving network performance compared to a hub. It
uses a MAC address table to direct data packets.

o Router: Connects multiple networks together and forwards


data to the intended network's router.

o Modem: Connects the router to the internet, providing


internet access to the LAN.

o Virtualization Tools: Software that performs operations


typically handled by physical hubs, switches, routers, or
modems, often offered by cloud service providers for cost
savings and scalability.
 Data Packets: Data sent across a network is divided into packets,
which contain delivery information (where it's going, where it's from)
and the message content.

o Components: Header (network protocol, port,


source/destination IP), Payload (actual data), and Footer
(packet end).

II. Network Operations and Protocols

 TCP/IP Model: A framework used to visualize how data is organized


and transmitted across a network. It has four layers:

1. Network Access Layer: Deals with the creation and


transmission of data packets, including hardware devices.

2. Internet Layer: Where IP addresses are used for routing


packets.

3. Transport Layer: Handles error control and ensures smooth


data flow.

4. Application Layer: Protocols determine how data packets


interact with receiving devices (e.g., file transfers, email
services).

 Network Protocols: A set of rules used by devices to communicate


on a network, describing the order of delivery and data structure.

o Transmission Control Protocol (TCP): Used to establish


communication between devices [76-Fi)**: A set of standards
defining communications for wireless LANs, adapted to be
more secure and reliable over time.

III. Network Security Features

 Firewalls: Network security devices that monitor traffic to and from


a network, allowing or blocking it based on defined security rules.
They can use port filtering to limit unwanted communication.

o Types: Hardware, software, and cloud-based firewalls.

o Stateful vs. Stateless: Stateful firewalls keep track of


information and proactively filter out suspicious traffic,
offering greater security than stateless ones.

 Virtual Private Networks (VPNs): Add security by encrypting


personal data in transit and creating an encrypted tunnel between
the device and the VPN server, making IP addresses and virtual
locations unreadable to malicious actors.
 Security Zones: Network security features that divide a network to
maintain privacy and security.].

 Proxy Servers: Servers that sit between the internet and the rest
of the network, fulfilling client requests by forwarding them to other
servers and determining if a connection is safe. They use temporary
memory to store regularly requested data, reducing contact with
internal servers.

IV. Network Attacks

 Malware: Malicious software that can infiltrate networks and


disrupt operations.

 Denial-of-Service (DoS) Attack: Floods a network or server with


traffic to disrupt its operations.

 Distributed Denial-of-Service (DDoS) Attack: A DoS attack


originating from multiple compromised devices. Examples include
ICMP flooding, SYN attacks, and Ping of Death.

 Packet Sniffing (Malicious): Threat actors use software tools to


observe or intercept data packets not intended for them, potentially
to spy on or alter data.

o Protection: Using encryption (HTTPS, VPNs), avoiding


unprotected public Wi-Fi.

 Spoofing: Threat actors disguise themselves as a legitimate source


(e.g., IP spoofing, MAC spoofing, email spoofing, caller ID spoofing,
GPS spoofing) to gain unauthorized access or manipulate systems.

 Man-in-the-Middle (MITM) Attack (now often called On-Path


Attacks): A threat actor places themselves in the middle of an
authorized connection to intercept or alter data in transit.

 **Re Securing the OS, as a compromised OS can affect the entire


network.

o Regular Tasks: Patch installation (updates), backups, keeping


up-to-date lists of devices and authorized users. New OS
updates should be added to the baseline configuration (a
documented set of specifications for future builds). Proper
hardware/software disposal is also crucial.

o One-time Tasks: Configuring device settings for secure


encryption standards. Implementing strong812]. Network
segmentation (creating isolated subnets and security zones
like restricted zones). Encrypting all network communication
using the latest encryption standards.

 Cloud Hardening: Securing cloud networks (servers, data,


applications hosted remotely). While cloud service providers have a
shared responsibility, organizations must also implement security
measures. This includes separating data and applications based on
service categories (e.g., older vs. newer applications, internal vs.
front-end).

8. The Basics of Computing Security: Linux & SQL | Google


Cybersecurity Certificate

This course introduces the fundamentals of computing security,


focusing on operating systems, the Linux operating system and its
command line, and SQL for database interaction. Understanding how
systems work is crucial for a security analyst to protect systems and
investigate events efficiently.

I. Operating Systems (OS)

 Instructor: Kim.

 Definition: Software that manages computer hardware and


software resources, acting as the interface betweenCLI)**: Relies on
text-based commands (e.g., Linux), an essential tool for security
analysts.

II. Linux Operating System

 History: Linux was developed by Linus Torvalds, who introduced the


Linux kernel. Richard Stallman worked on GNU, an operating system
based on Unix, aiming for free and open-source software. Their
innovations combined to form what we know as Linux.

 Components of Linux Architecture:

o User: Interacts with the system. *].

o Kernel: The core component that manages processes and


memory, communicating with hardware to execute commands
via drivers.

o Hardware: Physical components of the computer (e.g., CPU,


mouse, keyboard).

 Distributions (Distros/Flavors): Different versions of Linux, each


with specific tools and apps, designed to fit user needs.
o Examples: Debian (parent distribution), Ubuntu (derived from
Debian), Kali Linux (derived from Debian), Red Hat (parent),
CentOS (derived from Red Hat), SUSE (derived from
Slackware).

o Kali Linux: Specifically designed for penetration testing


and digital forensics. It comes preinstalled with many tools
(e.g., tcpdump, Wireshark, Autopsy). It is recommended to use
Kali Linux on a virtual machine to prevent system damage
and allow reverting to previous states.

III. Linux Command Line in Security Context

 Foundational Skill: Essential for security analysts to navigate,


manage, and analyze files remotely, verify/configure users, and set
file permissions.

 Basic Communication: Commands (instructions) are typed into


the Bash shell prompt ($) and can take arguments (specific
information). Linux commands and arguments are case-sensitive.

 Navigating the File System:

o pwd: Prints the working directory (current content** of a


file.

o head: Displays the beginning of a file (default 10 lines).

 Filtering (Searching for Information):

o grep: Searches a specified file for a string (e.g., finding


malware strings).

o Piping (|): Sends the standard output of one command as


standard input to another command for further processing
(e.g., ls | grep "users").

 Managing Directories and Files:

o mkdir: Creates a new directory.

o rmdir: Removes/deletes a directory, with a built-in warning


if it's not empty.

o touch: Creates a new file.

o rm: Removes/deletes a file and Directory Permissions:


Define the type of access granted. Related to authorization.

o Types of Permissions:
 Read (r): Read file contents; read files in a directory.

 Write (w): Modify file contents; create new files in a


directory.

 Execute (x): Execute an executable file; enter a


directory and access its files.

o Owners: Permissions are granted for three types of owners:


User (owner of the file), Group (users in a specific group),
and Other (all other users on the system).

o Representation: Permissions are represented in a rwx format


for user, group, and other (e.g., rwxrwxrwx). A hyphen -
indicates a missing permission.

o chmod: The command to change permissions on files and


directories. It can be used in symbolic mode to add (+) or
remove (`--root users to temporarily execute commands with
root privileges, providing a safer alternative to direct root
login.

 Accessing Learning Resources: Online resources like Google


Search and Unix and Linux Stack Exchange offer support for Linux
tasks. Within the command line, commands like man (manual for
commands), whatis (brief description), and apropos (searches
manuals for a string) provide direct help.

IV. SQL (Structured Query Language)

 Definition: A programming language used to create, interact with,


and request information from a database. Nearly all relational
databases use some version of SQL.

 Databases: Organized collections of information or data, designed


to store massive amounts of data and be accessed by multiple
people simultaneously. Databases are crucial for security analysts to
access information on logins, machines, software updates, etc..

o Relational Databases: Structured databases containing


multiple tables that are related to each other [90 A request for
data from a database table or a combination of tables. SQL
can efficiently search through millions of data points.

 Syntax: SQL keywords are generally not case-sensitive (e.g.,


SELECT, FROM), and statements usually end with a semicolon.

 Basic Queries:
o SELECT column1, column2 FROM table_name;: Selects
specified columns from a table.

o SELECT * FROM table_name;: Selects all columns from a table


(commonly referred to as SELECT ALL).

 Filters (WHERE clause): Used to refine queries and retrieve


specific information.

o Operators: Include = (equal to), != (not equal to), > (greater


than), < (less than), >= (greater than or equal to), <= (less
than or equal to).

o LIKE operator: Filters based on a pattern (e.g., `WHERE


country LIKE 'US%' Negates a condition, returning entries that
do not match.

 Joining Tables: Combines information from two different tables,


useful when needing data from multiple sources.

o Syntax: table_name.column_name is used to specify which


table a column comes from when columns share names across
joined tables.

o INNER JOIN: Returns records that have matching values in


specified columns from both tables [935, 936, 937 there is a
match in one of the tables.

You might also like