Module 3: Introduction to Cybersecurity

The Practice of Cybersecurity

Challenges in Cybersecurity

A Word on Mindsets

On Emulating the Minds of our Opponents

Threats and Threat Actors

The Evolution of Attack and Defense

Risks, Threats, Vulnerabilities, and Exploits

Threat Actor Classifications

Recent Cybersecurity Breaches

The CIA Triad

Confidentiality

Integrity

Availability

Balancing the Triad with Organizational Objectives

Security Principles, Controls, and Strategies

Security Principles

Security Controls and Strategies

Security Models

Shift-Left Security

Administrative Segmentation

Threat Modelling and Threat Intelligence

Table-Top Tactics

Continuous Patching and Supply Chain Validation

Backups

Encryption

Logging and Chaos Testing

Cybersecurity Laws, Regulations, Standards, and Frameworks

Laws and Regulations

Standards and Frameworks

Anatomy of Cyber

Career Opportunities in Cybersecurity

Cybersecurity Career Opportunities: Attack

Cybersecurity Career Opportunities: Defend

Cybersecurity Career Opportunities: Build

Additional Roles

Last updated