Module 3: Introduction to Cybersecurity
The Practice of Cybersecurity
Challenges in Cybersecurity
A Word on Mindsets
On Emulating the Minds of our Opponents
Threats and Threat Actors
The Evolution of Attack and Defense
Risks, Threats, Vulnerabilities, and Exploits
Threat Actor Classifications
Recent Cybersecurity Breaches
The CIA Triad
Confidentiality
Integrity
Availability
Balancing the Triad with Organizational Objectives
Security Principles, Controls, and Strategies
Security Principles
Security Controls and Strategies
Security Models
Shift-Left Security
Administrative Segmentation
Threat Modelling and Threat Intelligence
Table-Top Tactics
Continuous Patching and Supply Chain Validation
Backups
Encryption
Logging and Chaos Testing
Cybersecurity Laws, Regulations, Standards, and Frameworks
Laws and Regulations
Standards and Frameworks
Anatomy of Cyber
Career Opportunities in Cybersecurity
Cybersecurity Career Opportunities: Attack
Cybersecurity Career Opportunities: Defend
Cybersecurity Career Opportunities: Build
Additional Roles
PreviousModule 2: Penetration Testing with Kali Linux: General Course InformationNextModule 4: Effective Learning Strategies
Last updated