Introduction to Security Fundamentals
Topics Covered
Introduction to Security Fundamentals
Provides the foundation for the course. Useful for beginners and as a refresher for experienced learners.
Soft Skills
Communication, teamwork, and stakeholder interaction are essential alongside technical skills.
Security Controls
Technical: Firewalls, antivirus
Administrative: Policies, training
Physical: Access controls, guards
Networking 101
Covers core concepts: IP addressing, protocols, and network infrastructure basics.
Management Principles
Focuses on risk assessment, policy creation, and compliance to align security with business goals.
Active Directory
Blue Team Roles
Introduction to Security Fundamentals
The blue team focuses on defensive cybersecurity roles. This section introduces common positions, their responsibilities, and how they contribute to protecting organizational systems.
Common Roles in the Blue Team
SOC Analyst
Monitors tools like SIEM, EDR, and IDS.
Responds to alerts such as suspicious logins, phishing attempts, or abnormal network activity.
IT Security Analyst
Safeguards sensitive data and prevents breaches.
Performs tasks like system hardening, monitoring activity, and ensuring timely updates.
Incident Responder
Acts quickly during security incidents.
Handles events such as ransomware outbreaks, malware infections, DDoS attacks, and website defacements.
Threat Analyst
Analyzes IOCs, vulnerabilities, and threat intelligence.
Identifies potential or active threats that could affect the organization.
Security Engineer
Designs secure system architectures and defense strategies.
Ensures systems can resist attacks and recover from disruptions.
Security Consultant
Advises on security strategies and improvements.
Creates protocols, standards, and contingency plans.
Security Architect
Designs and maintains layered security frameworks.
Anticipates attacker tactics and builds defenses to counter them.
Identity and Access Analyst
Manages account security and access control.
Enforces least privilege, detects shared accounts, and removes unused accounts.
Forensic Analyst
Collects and examines digital evidence for investigations.
Supports incident response or legal action, depending on organizational needs.
Last updated