Practical Foundations in Cybersecurity
  • 🖌️Practical Foundations in Cybersecurity
  • 1. IT career planning
    • Introduction - IT career planning
    • IT career paths – everything you need to know
    • Job roles in IT and cybersecurity
    • How to break into information security
    • The Security Operations Center (SOC) career path
    • The GRC analyst role
    • How to get CCNA certification
    • Job search strategy
  • 2. Introduction to cybersecurity
    • Introduction - Introduction to cybersecurity
    • Foundational cybersecurity concepts and practices
    • The cybersecurity threat landscape
    • Common cyber attacks
    • Risk mitigation methods
    • Network security risk mitigation best practices
  • 3. Cybersecurity GRC
    • Introduction - Cybersecurity GRC
    • Cybersecurity GRC
  • 4. Networking fundamentals
    • Introduction - Networking fundamentals
    • How data flow through the Internet
  • 5. Wireless security and cryptography
    • Introduction - Wireless security and cryptography
    • SSL/TLS cryptography
    • Wireless network security
  • 6. Practical foundations in ethical hacking
    • Introduction - Practical foundations in ethical hacking
    • Ethical assessment of teaching ethical hacking
    • The ethical teaching of ethical hacking
    • Professional ethical hacking body of knowledge
      • The ethics of ethical hackers
      • The penetration testing process
      • What do ethical hackers do?
    • Who are ethical hackers?
  • 7. Conclusion
    • Introduction - Conclusion
    • Final words
Powered by GitBook
On this page
  • Learning objectives
  • Topics covered in this section
  • Definitions of information security and cybersecurity
  • The goals of cybersecurity
  • Cybersecurity risk management concepts
  • Other foundational cybersecurity concepts and practices
  • Key lesson takeaways
  • References
  1. 2. Introduction to cybersecurity

Foundational cybersecurity concepts and practices

This sections introduces core and foundational cybersecurity concepts and practices such as confidentiality, integrity, and availability (the CIA triad)

Learning objectives

• Point 1 • Point 2 • Point 3 • Point 4 • Point 5

This section introduces core and foundational cybersecurity concepts and practices to help learners develop a practical understanding of the goals of cybersecurity and how it is defined and practiced within organizations. This section covers definitions of information security, the CIA triad, risk, threat, vulnerability, mitigation, and the AAA framework (Authentication, Authorization, and Accounting).

Topics covered in this section

  • Definitions of information security and cybersecurity

  • The goals of cybersecurity

  • Cybersecurity risk management concepts

  • Other foundational cybersecurity concepts and practices

Definitions of information security and cybersecurity

Definitions of information security

Definitions of cybersecurity

The goals of cybersecurity

The main goals of cybersecurity are confidentiality, integrity, and availability of information (the CIA triad).

Information confidentiality

Information integrity

Information availability

Cybersecurity risk management concepts

How cybersecurity is practiced within organizations

Understanding/approaching enterprise cybersecurity in terms of risk, threat, vulnerability, and mitigation

Other foundational cybersecurity concepts and practices

The AAA framework (Authentication, Authorization, and Accounting)

The primary goals of cryptography (confidentiality, authentication, data integrity, and non-repudiation)

Key lesson takeaways

• Point 1 • Point 2 • Point 3 • Point 4

References

Reference

PreviousIntroduction - Introduction to cybersecurityNextThe cybersecurity threat landscape

Last updated 9 hours ago