Module 1 – Introduction to Cyber Security
About This Course
Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm.
Curriculum
82 Lessons
Introduction to Cybersecurity
Introduction to Cybersecurity
What Is Cybersecurity?
Safeguarding Your Personal Information
Your Data
Where Is Your Data?
What’s More…
Smart Devices
Identity Theft
Who Else Wants My Data?
Organizational Data
Before you can effectively apply best practices to protect data within an organization, you need a clear understanding of what kinds of data you're dealing with. Typically, there are two main types that are especially important to recognize.
Let’s explore them now.
Scenario 1
Security breaches are becoming increasingly frequent, as cybercriminals continue to develop new and creative methods to break into organizations and steal sensitive information.
Let’s take a look at one of the latest major cybersecurity incidents.
Cyber Attackers
Attackers can be individuals or organized groups who take advantage of security weaknesses for profit or personal benefit. As we've seen, their targets can include anything from financial data to proprietary business information.
Cyberwarfare
Cyberwarfare refers to the use of technological tools to infiltrate and assault the computer systems and networks of another country, aiming to inflict harm or interrupt critical services, like disabling an electrical power grid.
Quiz
You're about to take a quiz based on the material you've just covered. It includes fourteen questions, and you’ll need a minimum score of 70% to successfully pass.
Analyzing a Cyber Attack
Methods of Infiltration
Security Vulnerability and Exploits
Before we delve deeper, it’s helpful to understand some fundamental terms.
A security vulnerability refers to any flaw or weakness found in software or hardware. When someone creates a program to exploit such a weakness, it is known as an exploit. Cybercriminals use these exploits to take advantage of vulnerabilities with the intention of accessing systems, stealing data, or reaching specific resources without permission.
The Cybersecurity Landscape
Have You Heard of Cryptocurrency?
You’ve probably come across the term cryptocurrency, but do you actually understand what it is and how it functions?
Let’s break it down and explore it in more detail.
Quiz
Protecting Your Devices and Network
You have likely come across the term "online security." It involves measures to protect your personal data from being accessed by unauthorized individuals.
Data Maintenance
Would you be comfortable sharing all your photos with strangers? Or your financial details with your friends? How about your email passwords with the general public? Probably not. That’s why protecting your data through encryption is essential.
Who Owns Your Data?
Safeguarding Your Online Privacy
Discover Your Own Risky Online Behavior
Quiz
Cybersecurity Devices and Technologies
No single device or technology can fully address all of an organization’s network security requirements. It’s essential to choose and combine the most effective tools as part of a comprehensive security strategy
Behavior Approach to Cybersecurity
Great work so far! You’re starting to understand how a security system is structured.
Let’s keep going…