The Essentials
  • Why You Should Learn Cybersecurity
  • Resources
  • Introduction
  • What is Information Security
  • Multi-Discipline Approach to Information Security
  • Roles and Responsibilities
  • Information Security Governance
  • Information Security Control Frameworks
  • Information Security Laws, Regulations and Compliance
  • Information Security Policy, Standards, Procedures, and Guidelines
  • Secure Design Principles
  • Configuration Management (CM)
  • Change Management
  • Vulnerability and Patch Management
  • Risk Assessment and Management
  • Business Continuity
  • Cryptography and Encryption
  • Defining the Cyberspace
  • What is cybersecurity?
  • Cyber Threats
  • Cyber Threat Actors
  • Teams in Cybersecurity
  • Security Operation Centers
  • Penetration Tests
  • Data Security
  • Network Security
  • Cybersecurity Boundaries
  • Cloud Security
  • LAB-1 Compliance Automation Tool
  • LAB-2 Hashing for Integrity
  • LAB-3 Open Source Intelligence
Bonus
  • Bonus