Practical Foundations in Cybersecurity
This gitbook covers key theoretical and practical foundations that have real-world relevance especially for those transitioning to cybersecurity from nontechnical domains
Introduction
This effort aims to cover the key theoretical and practical foundations of cybersecurity, specifically, the core skill areas of an IT professional looking to specialize in security. The main audience for this book is learners without technical background or experience in IT and who want to break into a networking career.
Understand the opportunities/threats related to IT and networking technology changes, including social and business/industry impacts and compliance needs, and the emerging cybersecurity skill gap and job roles.
This text covers theoretical and practical foundations regarding the core/key cybersecurity concepts, the changing IT and networking technology applications and practices, the changing cybersecurity threat landscape, the changing enterprise security needs, the changing compliance landscape, and the emerging cybersecurity job roles.
This gitbook aims to help you gain a solid understanding of the core/key concepts defining cybersecurity, the evolving nature of cybersecurity as it relates to IT and networking technological changes and industry practices, and best practices and regulatory (mitigation) countermeasures.
Book Chapters
Don't jump before you look! This chapter lays out the IT and cybersecurity career paths, related job roles and job skills, and where to find learning resources for the career paths.
Understand the goals of cybersecurity and how it is defined and situated within enterprises as a risk management concern.
Businesses use Governance, Risk, and Compliance frameworks to manage cybersecurity risk. Understand the tools used and how they can be implemented to achieve compliance.
Networking is the foundation of IT and cybersecurity. Understand how data travels through the Internet - to and from your desktop application and a server perhaps thousands of miles away.
A discussion of foundational topics in network security, including network security layers, types of network attacks, and network security risk mitigation best practices.
Ethical hacking is the cornerstone of security verification and improvement within organizations. Understand who are ethical hackers and what they do. Understand the benefits and risks of ethical hacking.
Learn about the key ethical principles and their operationalization. Understand how to reduce cybersecurity risk through improved organizational communication. Get familiar with the process of working with IT recruiters and preparing for the infosec interview.
Last updated