Practical Foundations in Cybersecurity
  • 🖌️Practical Foundations in Cybersecurity
  • 1. IT career planning
    • Introduction - IT career planning
    • IT career paths – everything you need to know
    • Job roles in IT and cybersecurity
    • How to break into information security
    • The Security Operations Center (SOC) career path
    • The GRC analyst role
    • How to get CCNA certification
    • Job search strategy
  • 2. Introduction to cybersecurity
    • Introduction - Introduction to cybersecurity
    • Foundational cybersecurity concepts and practices
    • The cybersecurity threat landscape
    • Common cyber attacks
    • Risk mitigation methods
    • Network security risk mitigation best practices
  • 3. Cybersecurity GRC
    • Introduction - Cybersecurity GRC
    • Cybersecurity GRC
  • 4. Networking fundamentals
    • Introduction - Networking fundamentals
    • How data flow through the Internet
  • 5. Wireless security and cryptography
    • Introduction - Wireless security and cryptography
    • SSL/TLS cryptography
    • Wireless network security
  • 6. Practical foundations in ethical hacking
    • Introduction - Practical foundations in ethical hacking
    • Ethical assessment of teaching ethical hacking
    • The ethical teaching of ethical hacking
    • Professional ethical hacking body of knowledge
      • The ethics of ethical hackers
      • The penetration testing process
      • What do ethical hackers do?
    • Who are ethical hackers?
  • 7. Conclusion
    • Introduction - Conclusion
    • Final words
Powered by GitBook
On this page
  • Chapter 2: Introduction to cybersecurity
  • Topics covered in this chapter
  1. 2. Introduction to cybersecurity

Introduction - Introduction to cybersecurity

This chapter introduces students to the goals of cybersecurity and how it is defined and practiced within organizations

PreviousJob search strategyNextFoundational cybersecurity concepts and practices

Last updated 1 day ago

Chapter 2: Introduction to cybersecurity

Through an exploration of key concepts and practices, this chapter will help students develop a practical understanding of the goals of cybersecurity and how it is defined and practiced within organizations.

This chapter will help students:

• Understand key concepts and learn key definitions within the cybersecurity field, including information confidentiality, integrity, and availability (CIA triad).

• Approach information security in terms of risk, threat, vulnerability, and mitigation.

• Understand the changing cybersecurity threat landscape and key technological and sociopolitical factors driving the change.

• Become familiar with common cyber attacks and malware types.

• Describe risk mitigation methods.

• Describe network security risk mitigation best practices.

Topics covered in this chapter

Foundational cybersecurity concepts and practices
The cybersecurity threat landscape
Common cyber attacks
Risk mitigation methods
Network security risk mitigation best practices