Practical Foundations in Cybersecurity
  • 🖌️Practical Foundations in Cybersecurity
  • 1. IT career planning
    • Introduction - IT career planning
    • IT career paths – everything you need to know
    • Job roles in IT and cybersecurity
    • How to break into information security
    • The Security Operations Center (SOC) career path
    • The GRC analyst role
    • How to get CCNA certification
    • Job search strategy
  • 2. Introduction to cybersecurity
    • Introduction - Introduction to cybersecurity
    • Foundational cybersecurity concepts and practices
    • The cybersecurity threat landscape
    • Common cyber attacks
    • Risk mitigation methods
    • Network security risk mitigation best practices
  • 3. Cybersecurity GRC
    • Introduction - Cybersecurity GRC
    • Cybersecurity GRC
  • 4. Networking fundamentals
    • Introduction - Networking fundamentals
    • How data flow through the Internet
  • 5. Wireless security and cryptography
    • Introduction - Wireless security and cryptography
    • SSL/TLS cryptography
    • Wireless network security
  • 6. Practical foundations in ethical hacking
    • Introduction - Practical foundations in ethical hacking
    • Ethical assessment of teaching ethical hacking
    • The ethical teaching of ethical hacking
    • Professional ethical hacking body of knowledge
      • The ethics of ethical hackers
      • The penetration testing process
      • What do ethical hackers do?
    • Who are ethical hackers?
  • 7. Conclusion
    • Introduction - Conclusion
    • Final words
Powered by GitBook
On this page
  • Learning objectives
  • Topics covered in this section
  • Point 1
  • Key lesson takeaways
  • References
  1. 2. Introduction to cybersecurity

The cybersecurity threat landscape

This section explores the evolving cyber threat landscape and its key technological and sociopolitical influences

Learning objectives

• Point 1 • Point 2 • Point 3 • Point 4 • Point 5

Cybersecurity threats at the individual, business, and societal levels - and underlying technological and sociopolitical factors.

Understand the changing cyber threat landscape and key technological and sociopolitical factors shaping it.

Topics covered in this section

  • Point 1

  • Point 2

  • Point 3

  • Point 4

Point 1

Cybersecurity threats at the individual, business, and societal levels - and underlying technological and sociopolitical factors.

Key lesson takeaways

• Point 1 • Point 2 • Point 3 • Point 4

References

Reference

PreviousFoundational cybersecurity concepts and practicesNextCommon cyber attacks

Last updated 9 hours ago