in this course what we're gonna be covering, we're gonna start off with just some of the basics. For instance, What do we mean when we say cyber security? What does that include? What's that encompass? Well, you know, really, you can look at it is all the processes, all the things that we do to protect our data and our information.
Ah, but not just that data and information, but
all the systems and elements that go into preserving that information.
So our computer systems are networks are processes themselves that we put in place. So ultimately, what we're gonna do is we're gonna come very security minded in this course And look at how many things that we do can really affect the overall security
off the organization.
We'll also talk about the C I A. Triad. Confidentiality, integrity and availability will talk about what each of those mean and how we can protect.
Now when we get to the topic down below, why do we care? I think most people can answer that right. We look at billions of dollars in identity theft, credit card fraud, um, millions and sometimes hundreds of millions of dollars in fines for organizations that failed to properly protect their patient
for their customers. Information
privacy being violated. You know, now is really a point in time, like none other than we've seen
in the realm of information itself having its value and being targeted. So got a lot of information we want to cover and hopefully this is gonna help you play your part
in the world of cybersecurity. So when we do talk about where do all these threats come from? Who is it that's launching these attacks?
Well, you could really come from a wide range, you know, from the very basics of, you know, younger kids, just launching virus is seeing what they can do. Maybe with no real knowledge or intent.
Sometimes we call those folks script kiddies all the way up to state sponsored crimes. Organized crime's the Mafia has really gotten very heavily involved with the world of identity theft. It's a lot safer and a lot more lucrative than brat. Some of the elements that they would have been involved with in the past.
Ah, we have seen elements where terrorists are starting to use Ah, cyber warfare against us. Whether it's information that they become, um,
information that they've acquired and release at appropriate times. You know, there was quite a bit of intelligence suggesting that ah, for nation had affected our voting process is when we think of terrorists, you know, we may think of taking out electric grids
navigational systems of planes. You know, there are lots of ways that we're going to begin to see. Ah, cyberattacks used against us, I think in a much larger scale. Insiders,
you know, so many times we focused our efforts on keeping the bad guys out. Well, we sometimes forget to protect against internal fraud. So we want to make sure that we're putting the right things, the right mechanisms in place to protect ourselves as much as possible.
Um, another term that's coming very popular. Today. We talk about activists, and these are the folks you've probably heard of. Anonymous. There was a group couples set,
but basically what they're looking to do is to force their political opinions and those that oppose them. Essentially, they'll maybe deny service. They make hack in and cause a breach of data. But again, they're using computer skills in order to push their political agenda. So you know what
attacks come from
All different directions today is so what we have to do is we have to be very forward thinking, and we have to start taking security suit seriously on all levels of the organization.
Now again, when we do talk about security, what we want to focus on bringing to our environment is called the CIA, sometimes called the security triad or see a triad.
confidentiality, integrity and availability
and confidentially is usually confidentiality is usually what we're most concerned with. We think about privacy secrecy,
you know, protecting the information of our company. A lot of times were revolving around privates, sure,
but we also have to think about integrity, making fun, sure that files don't get modified or altered in any sort of way
and then availability.
You know, it can cost your company thousands or even hundreds of thousands of dollars to be offline for a mere matter of minutes, so that availability piece has to be there as well.
And those were the three elements that really come together for us, for those of us that are in the security field looking to bring that element into an empire,
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
Kali Linux Fundamentals
In this Kali Linux course you will learn about the industry standard tool for penetration ...
1 CEU/CPE Hours Available
Certificate of Completion Offered