2
Most read
9
Most read
10
Most read
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecurity Course | Edureka
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Agenda
01
Need for
cybersecurity
02
What is
Cybersecurity
Security?
Ensuring
Cybersecurity:
Scenario
0403
Cybersecurity
Fundamentals
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Need For Cybersecurity
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Digital Era
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Cyberattacks
Malware
Phishing
DDoS
Ransomware
MITM
Malvertising
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
What Is Cybersecurity?
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Cybersecurity
Cybersecurity is the body of technologies, processes and practices designed to
protect networks, computers, programs and data from attack, damage or
unauthorized access.
Application Security
Network Security
Information Security
Operational Security
Disaster Security End-user Education
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Fundamentals Of Cybersecurity
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
CIA Triad
Confidentiality Integrity Availability
Confidentiality is about
preventing the disclosure of
data to unauthorized
parties.
Integrity refers to
protecting information from
being modified by
unauthorized parties.
Availability is making sure
that authorized parties are
able to access the
information when needed
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
CIA Triad Broken Down
Confidentiality Integrity Availability
Attacks
Countermeasures
•Cracking Encrypted Data
•Man In The Middle
•Installing Spyware
•Doxxing
•Web Penetration
•Unauthorised Scans
•Remote Controlling
•DDoS attacks
•Ransomware
Attacks
•Disrupting Server
•Access Control
•Encryption
•Biometric Verification
•Intrusion Detection
•Cryptography
•Hashing
•Regular Backup
•Data Replication
•Adequate communication
bandwidth
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
The Three Pillars of Cybersecurity
People Processes Technology
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Cyberattack Incident
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Meet Wendy
Book Appointments
Make Payments
Manage Accounts
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Incident
Book Appointments
Make Payments
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Solution – Incident Response Team
Active Response System
Identify the source and performs business
impact analysis
Detects logs and access control issues
Contains the threat paths to stop further
damage
Prioritizes recovery and install prevention
software
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

More Related Content

PPTX
Cybersecurity
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PPTX
Cybersecurity
PDF
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
PPTX
Cyber attacks and IT security management in 2025
PDF
Introduction to Cybersecurity
Cybersecurity
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
Cyber attacks and IT security management in 2025
Introduction to Cybersecurity

What's hot (20)

PDF
Cyber Security Awareness
PPTX
Introduction to cyber security amos
PPTX
Information security
PPTX
Cyber Security
PPTX
Cyber security
PDF
Network Security Presentation
PPTX
Cybersecurity 1. intro to cybersecurity
PDF
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
ODP
Cyber security awareness
PDF
Cybersecurity Employee Training
PPTX
CYBER SECURITY
PPTX
Cyber security
PPTX
cyber security presentation.pptx
PPT
Introduction to Cyber Security
DOCX
The CIA Triad - Assurance on Information Security
PDF
Cyber security
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Cyber Security
PPTX
Cyber security system presentation
PPTX
Security Policies and Standards
Cyber Security Awareness
Introduction to cyber security amos
Information security
Cyber Security
Cyber security
Network Security Presentation
Cybersecurity 1. intro to cybersecurity
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cyber security awareness
Cybersecurity Employee Training
CYBER SECURITY
Cyber security
cyber security presentation.pptx
Introduction to Cyber Security
The CIA Triad - Assurance on Information Security
Cyber security
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber Security
Cyber security system presentation
Security Policies and Standards
Ad

Similar to Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecurity Course | Edureka (20)

PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PDF
Network Security Tutorial | Introduction to Network Security | Network Securi...
PDF
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
PDF
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
PDF
Cyber-Security-Whitepaper.pdf
PDF
Cyber-Security-Whitepaper.pdf
PDF
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
PPTX
Career in cyber security
PPTX
Introduction to Cyber Security and its importance
PDF
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
PDF
Preparing for a Cyber Security Career in Emerging Technologies.pdf
PPTX
Securing the Future Diving into the Foundations of Cyber security
PPTX
Introduction-to-Cybersecurity-Apponix.pptx
PPTX
Cyber Security Certificate Training
PDF
Introduction-to-Cyber-Security certification training.pdf
PDF
Cyber+Security+Fundamentals.pdf.....network security
PPTX
Explore Advanced Cybersecurity Training Programs
PDF
Cybersecurity Skilling at a Tipping Point.pdf
PDF
Advance Your Career with Cyber Security Training in Kerala
PPTX
The Future of Cybersecurity courses.pptx
Application Security | Application Security Tutorial | Cyber Security Certifi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Career in cyber security
Introduction to Cyber Security and its importance
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Preparing for a Cyber Security Career in Emerging Technologies.pdf
Securing the Future Diving into the Foundations of Cyber security
Introduction-to-Cybersecurity-Apponix.pptx
Cyber Security Certificate Training
Introduction-to-Cyber-Security certification training.pdf
Cyber+Security+Fundamentals.pdf.....network security
Explore Advanced Cybersecurity Training Programs
Cybersecurity Skilling at a Tipping Point.pdf
Advance Your Career with Cyber Security Training in Kerala
The Future of Cybersecurity courses.pptx
Ad

More from Edureka! (20)

PDF
What to learn during the 21 days Lockdown | Edureka
PDF
Top 10 Dying Programming Languages in 2020 | Edureka
PDF
Top 5 Trending Business Intelligence Tools | Edureka
PDF
Tableau Tutorial for Data Science | Edureka
PDF
Python Programming Tutorial | Edureka
PDF
Top 5 PMP Certifications | Edureka
PDF
Top Maven Interview Questions in 2020 | Edureka
PDF
Linux Mint Tutorial | Edureka
PDF
How to Deploy Java Web App in AWS| Edureka
PDF
Importance of Digital Marketing | Edureka
PDF
RPA in 2020 | Edureka
PDF
Email Notifications in Jenkins | Edureka
PDF
EA Algorithm in Machine Learning | Edureka
PDF
Cognitive AI Tutorial | Edureka
PDF
AWS Cloud Practitioner Tutorial | Edureka
PDF
Blue Prism Top Interview Questions | Edureka
PDF
Big Data on AWS Tutorial | Edureka
PDF
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
PDF
Kubernetes Installation on Ubuntu | Edureka
PDF
Introduction to DevOps | Edureka
What to learn during the 21 days Lockdown | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
Tableau Tutorial for Data Science | Edureka
Python Programming Tutorial | Edureka
Top 5 PMP Certifications | Edureka
Top Maven Interview Questions in 2020 | Edureka
Linux Mint Tutorial | Edureka
How to Deploy Java Web App in AWS| Edureka
Importance of Digital Marketing | Edureka
RPA in 2020 | Edureka
Email Notifications in Jenkins | Edureka
EA Algorithm in Machine Learning | Edureka
Cognitive AI Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
Blue Prism Top Interview Questions | Edureka
Big Data on AWS Tutorial | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
Kubernetes Installation on Ubuntu | Edureka
Introduction to DevOps | Edureka

Recently uploaded (20)

PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
Internet of Everything -Basic concepts details
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PPTX
Configure Apache Mutual Authentication
PDF
Statistics on Ai - sourced from AIPRM.pdf
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PPTX
Microsoft User Copilot Training Slide Deck
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
4 layer Arch & Reference Arch of IoT.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
Rapid Prototyping: A lecture on prototyping techniques for interface design
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Advancing precision in air quality forecasting through machine learning integ...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Internet of Everything -Basic concepts details
Basics of Cloud Computing - Cloud Ecosystem
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Configure Apache Mutual Authentication
Statistics on Ai - sourced from AIPRM.pdf
Auditboard EB SOX Playbook 2023 edition.
Co-training pseudo-labeling for text classification with support vector machi...
Microsoft User Copilot Training Slide Deck
MuleSoft-Compete-Deck for midddleware integrations
Data Virtualization in Action: Scaling APIs and Apps with FME
4 layer Arch & Reference Arch of IoT.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Custom Battery Pack Design Considerations for Performance and Safety

Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecurity Course | Edureka

  • 2. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Agenda 01 Need for cybersecurity 02 What is Cybersecurity Security? Ensuring Cybersecurity: Scenario 0403 Cybersecurity Fundamentals
  • 3. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Need For Cybersecurity
  • 4. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Digital Era
  • 5. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Cyberattacks Malware Phishing DDoS Ransomware MITM Malvertising
  • 6. Copyright © 2018, edureka and/or its affiliates. All rights reserved. What Is Cybersecurity?
  • 7. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Cybersecurity Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Application Security Network Security Information Security Operational Security Disaster Security End-user Education
  • 8. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Fundamentals Of Cybersecurity
  • 9. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training CIA Triad Confidentiality Integrity Availability Confidentiality is about preventing the disclosure of data to unauthorized parties. Integrity refers to protecting information from being modified by unauthorized parties. Availability is making sure that authorized parties are able to access the information when needed
  • 10. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training CIA Triad Broken Down Confidentiality Integrity Availability Attacks Countermeasures •Cracking Encrypted Data •Man In The Middle •Installing Spyware •Doxxing •Web Penetration •Unauthorised Scans •Remote Controlling •DDoS attacks •Ransomware Attacks •Disrupting Server •Access Control •Encryption •Biometric Verification •Intrusion Detection •Cryptography •Hashing •Regular Backup •Data Replication •Adequate communication bandwidth
  • 11. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training The Three Pillars of Cybersecurity People Processes Technology
  • 12. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Cyberattack Incident
  • 13. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Meet Wendy Book Appointments Make Payments Manage Accounts
  • 14. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Incident Book Appointments Make Payments
  • 15. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Solution – Incident Response Team Active Response System Identify the source and performs business impact analysis Detects logs and access control issues Contains the threat paths to stop further damage Prioritizes recovery and install prevention software
  • 16. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training