๐Ÿš€ Our training courses are CPF-eligible!

seela logo

Cybersecurity glossary: understanding the basics

If you are a technology enthusiast and want to learn more about cybersecurity, you've come to the right place! This cybersecurity lexicon is going to give you an overview of the key concepts of computer security.

Contents

Cybersecurity is an ever-evolving field and the demand for qualified professionals continues to grow. Companies of all sizes and industries are looking for qualified professionals to help protect their data and systems. Salaries in the cybersecurity field are often high due to the scarcity of these skills.

By training in cybersecurity, you can open doors to exciting and profitable careers in a field that is increasingly crucial in our connected world. The skills you learn will also help you better protect your own privacy and personal data online.

So, ready to dive into the world of cybersecurity?

We will talk about DIC / TN, IAM / AAA, vulnerabilities, threats and risks, concepts in methodology and certification, true/false positives and negatives, the Kill Chain and continuous improvement.

Follow us to discover the key concepts in this exciting field!

DIC / TN

Data, in the computer world, is information that can be stored or processed digitally.

One of the main objectives of cyber security is to protect the data of the company or an individual.

In this lesson, we will study the criteria for classifying this data in order to put in place adequate protection solutions.

IAM / AAA

In this lesson we will discuss several fundamental aspects of cyber security, grouped under several names, or frameworks.

These are the principles of IAM (Identity and Access Management) or otherwise called AAA (Authentication, Authorization and Accounting).

These principles allow us to implement a policy for managing access to resources or data.

Vulnerability, threat and risk

It is obvious to say that you can defend yourself better when you know your weaknesses. The same is true when you know your opponents.

This lesson will allow us to better understand the concepts of vulnerability, threat and risk.

These concepts are essential foundations for implementing vulnerability management and risk management processes.

Concepts in methodology and certification

Let's remember the main objective of cyber security, which could be defined as: protecting the company's business and data.

We can say that this objective has no definite end in time, so we must work in an iterative and agile way.

Finally, we can also say that today the advantage is with the attackers (opportunity of vulnerabilities, surprise effect, means), which means that we must also be reactive and supervise in real time our security posture.

So an essential mantra for someone working in cyber security is: preparedness - agility - resilience.

The achievement of our goals cannot be done without methodology, and it is the basics of these methodologies that we will discover in this lesson.

True / false positive or negative

In this lesson we will try to sort out the real from the fake... remember that when a negative event occurs, always stay positive!

We will introduce four elements that allow us to classify events.

This vocabulary will allow us to be better understood when we have to qualify an incident or analyze a vulnerability for example.

Kill Chain

The concept of "Kill Chain" is again a concept that comes from the military world.

In the world of cybersecurity, this concept is attached to the field of "Cyber Threat Intelligence" (CTI), which is the field where intelligence about attackers is sought in order to better protect against them.

The "Kill Chain" concept has been implemented in two different repositories, which we will discover in this lesson.

Continuous improvement

Continuous improvement is an approach that consists of improving through small, regular changes, rather than planning to introduce large changes on a much less regular basis. More precisely, there are many methodologies to implement a continuous improvement approach, such as the Deming wheel.
logo cyber training

Start your cybersecurity training!

Launch your career in cybersecurity and train for the job that fits you. Our online platform allows you to train at your own pace for a quick and efficient increase in skills.

100% online

Theory & Practice

Customized by level

Start your cybersecurity training

Training

Career

Cybersecurity

100% online

Breathe new life into your career with our cybersecurity training courses

Phone

01 46 84 15 23

Mail

information@seela.io