Introduction to
Cybersecurity
Explore the fundamentals of cybersecurity, including its
importance in the digital age and the key principles that
protect information systems.
por Francisco Borges
Week 3: Basic Networking Concepts
Network Basics
Understand the fundamentals of computer networks, including the
TCP/IP model and OSI model. Learn how data travels across networks
and the role of different network layers.
Home Network Setup
In a hands-on lab, you'll configure a home router, connect devices,
and secure your network against common threats.
Networking Concepts Quiz
Test your knowledge of basic networking principles with an assessment quiz.
Types of Cyber Threats
Malware Phishing Social Engineering
Malicious software Fraudulent attempts Manipulating people
designed to cause to obtain sensitive into revealing
harm, such as information through confidential
viruses, worms, and deceptive emails or information or
ransomware. websites. performing actions
that compromise
security.
Principles of Secure Design
1 Least Privilege
Ensure users and processes only have the minimum access
required to perform their tasks, limiting the potential impact of
a breach.
2 Defense in Depth
Implement multiple layers of security controls to provide
redundancy and protect against a wide range of threats.
3 Secure Defaults
Configure systems to be secure by default, rather than relying
on users to manually enable security features.
Week 5: Types of Cyber Threats
Malware
1 Viruses, worms, Trojans
Phishing
2 Fraudulent emails and websites
Denial of Service
3 Overwhelming systems with traffic
This module will provide an overview of the most common types of cyber threats, including
malware, phishing attacks, and denial of service attacks. We'll explore how these threats work,
their potential impacts, and strategies for defending against them.
Week 11: Security Monitoring and Analysis
SOC Roles
1
Monitoring
2
Incident Response
3
A Security Operations Center (SOC) plays a critical role in detecting and responding to security
incidents. This includes monitoring systems, analyzing security data, and leading incident
response efforts.
Introduction to Cryptography
NIST and ISO Standards
Understand the incident response guidelines provided by industry standards like NIST
and ISO, and how to apply them to create effective incident response plans.
Incident Response Best Practices
Learn about the key steps in incident response, including preparation, detection,
analysis, containment, eradication, and recovery.
Incident Response Frameworks
Assess your knowledge of incident response frameworks and best practices through a quiz.
Introduction to Penetration Testing
Reconnaissance
1
Scanning
2
Exploitation
3
Reporting
4
This module introduces the fundamentals of penetration testing and ethical hacking. You will learn
about various methodologies, including reconnaissance, scanning, exploitation, and reporting. The
goal is to develop the skills needed to identify vulnerabilities and mitigate them effectively.
Cybersecurity Policies and
Governance
1 Cybersecurity Policies
Develop effective policies to guide an organization's security
practices, including access control, incident response, and data
protection.
2 Policy Frameworks and Compliance
Understand how policy frameworks like GDPR, HIPAA, and PCI
DSS influence policy development and ensure organizational
compliance.
3 Governance Models and Risk Management
Implement effective governance structures and risk
management strategies to maintain cybersecurity and mitigate
potential threats.
Emerging Trends and Technologies in
Cybersecurity
Advanced Persistent Threats
1
Zero-Day Exploits
2
Emerging Technology Threats
3
Cyber threats are constantly evolving, with new and emerging threats like advanced persistent
threats (APTs), zero-day exploits, and threats targeting emerging technologies. Organizations must
stay vigilant and prepare for these changing threats.