Lesson 1
Lesson 1: Fundamental Security Concepts
CIA Triad
Core security principles: Confidentiality, Integrity, Availability
Non-repudiation: Proof of origin/actions
Cybersecurity Frameworks
NIST Cybersecurity Framework (CSF)
5 Core Functions:
Identify: Asset management, risk assessmentProtect: Access control, encryptionDetect: Monitoring, anomaly detectionRespond: Incident response planRecover: Backups, continuity planning
Function details:
- Identify: Understanding what needs protection - asset inventories, risk evaluations, classifying systems
- Protect: Securing systems before incidents - encryption protocols, MFA, user training, hardening configurations
- Detect: Looking for suspicious behavior - log analysis, IDS/IPS, SIEM tools, alerts
- Respond: Actions after incident occurs - isolating systems, notifying stakeholders, forensics investigation
- Recover: Getting back to normal - restoring from backups, disaster recovery sites, continuity plans
ISO Standards
ISO 27001: Requirements for ISMS (Information Security Management System)ISO 27002: Best practices for security controls
Gap Analysis
Compares current security measures against standards (NIST, ISO) to identify weaknesses and compliance gaps
AAA Framework
Authentication: Verifies identity (passwords, MFA, biometrics)Authorization: Determines permissions (RBAC, ABAC)Accounting: Logs actions (audit trails, SIEM)
Technologies:
- Authentication: RADIUS, TACACS+, LDAP, Kerberos, biometrics, smart cards, MFA
- Authorization: RBAC systems, Active Directory group policies, ACLs, ABAC
- Accounting: RADIUS accounting, TACACS+ logs, Syslog, SIEM, audit trails
Access Control Models
RBAC (Role-Based): Permissions based on job roleMAC (Mandatory): Labels (Top Secret, Confidential) - central authority enforcesABAC (Attribute-Based): Dynamic rules (time, location, user profile)DAC (Discretionary): Owner-controlled (file permissions)Rule-Based: System-wide conditions and logic applied universally
Security Control Types
By Category:
Technical: Firewalls, IDS/IPS, encryptionManagerial: Security policies, risk assessments, compliance requirementsOperational: Security training, incident response plans, backup operationsPhysical: Locks, cameras, biometric scanners
By Function:
Preventive: Firewalls, encryptionDetective: IDS, CCTV, log monitoringCorrective: Patches, backups, incident responseDeterrent: Warning signs, finesCompensating: Alternative controls (MFA if passwords weak)Directive: Security awareness training, policies
Information Security Roles
CIO (Chief Information Officer): Overall IT responsibilityCTO (Chief Technology Officer): New/emerging computing platformsDevOps: Software development + systems operationsDevSecOps: Development + security + operationsCIRT (Computer Incident Response Team): Incident response responsibilitySOC (Security Operations Center): Monitor and protect critical assetsCSO (Chief Security Officer): Overall information assurance responsibilityISSO (Information Systems Security Officer): Technical implementation of security policies
All Content
Lesson 0: Study Tips and Resources
Study Tips and Resources
Lesson 2: Threat Types
Study Tips and Resources
Lesson 3: Cryptographic Solutions
Study Tips and Resources
Lesson 4: Identity and Access Management (IAM)
Study Tips and Resources
Lesson 5: Enterprise Network Architecture
Study Tips and Resources
Lesson 6: Cloud & Zero Trust
Study Tips and Resources
esson 7: Resiliency and Site Security
Study Tips and Resources
Lesson 8: Vulnerability Management
Study Tips and Resources
Lesson 9: Network Security Capabilities
Study Tips and Resources
Lesson 10: Endpoint Security
Study Tips and Resources
Lesson 11: Application Security
Study Tips and Resources
Lesson 12: Alerting and Monitoring
Study Tips and Resources
Lesson 13: Analyze Indicators of Malicious Activity
Study Tips and Resources
Lesson 14: Security Governance Concepts
Study Tips and Resources
Lesson 15: Risk Management Processes
Study Tips and Resources
Lesson 16: Data Protection and Compliance Concepts
Study Tips and Resources