Practical Foundations in Cybersecurity
  • 🖌️Practical Foundations in Cybersecurity
  • 1. IT career planning
    • Introduction - IT career planning
    • IT career paths – everything you need to know
    • Job roles in IT and cybersecurity
    • How to break into information security
    • The Security Operations Center (SOC) career path
    • The GRC analyst role
    • How to get CCNA certification
    • Job search strategy
  • 2. Introduction to cybersecurity
    • Introduction - Introduction to cybersecurity
    • Foundational cybersecurity concepts and practices
    • The cybersecurity threat landscape
    • Common cyber attacks
    • Risk mitigation methods
    • Network security risk mitigation best practices
  • 3. Cybersecurity GRC
    • Introduction - Cybersecurity GRC
    • Cybersecurity GRC
  • 4. Networking fundamentals
    • Introduction - Networking fundamentals
    • How data flow through the Internet
  • 5. Wireless security and cryptography
    • Introduction - Wireless security and cryptography
    • SSL/TLS cryptography
    • Wireless network security
  • 6. Practical foundations in ethical hacking
    • Introduction - Practical foundations in ethical hacking
    • Ethical assessment of teaching ethical hacking
    • The ethical teaching of ethical hacking
    • Professional ethical hacking body of knowledge
      • The ethics of ethical hackers
      • The penetration testing process
      • What do ethical hackers do?
    • Who are ethical hackers?
  • 7. Conclusion
    • Introduction - Conclusion
    • Final words
Powered by GitBook
On this page
  • Learning objectives
  • Topics covered in this section
  • Point 1
  • Key lesson takeaways
  • References
  1. 2. Introduction to cybersecurity

Risk mitigation methods

This section discusses network security risk mitigation methods, including technologies, network design, networking protocols, organizational polices, compliance frameworks, and risk assessment

Learning objectives

• Point 1 • Point 2 • Point 3 • Point 4 • Point 5

Risk mitigation methods spanning technologies (firewalls, IDS/IPS, encryption, VPN), network design (segmentation, DMZ, and honeypots), networking protocols (don't use DTP/VTP; use encryption protocols), organizational policies (e.g., usage policies, security policy, privacy policy), compliance frameworks, risk assessment/security testing, professional conduct, and security training.

Topics covered in this section

  • Point 1

  • Point 2

  • Point 3

  • Point 4

Point 1

Risk mitigation methods spanning technologies (firewalls, IDS/IPS, encryption, VPN), network design (segmentation, DMZ, and honeypots), networking protocols (don't use DTP/VTP; use encryption protocols), organizational policies (e.g., usage policies, security policy, privacy policy), compliance frameworks, risk assessment/security testing, professional conduct, and security training.

Key lesson takeaways

• Point 1 • Point 2 • Point 3 • Point 4

References

Reference

PreviousCommon cyber attacksNextNetwork security risk mitigation best practices

Last updated 9 hours ago