If you are a technology enthusiast and want to learn more about cybersecurity, you've come to the right place! This cybersecurity lexicon is going to give you an overview of the key concepts of computer security.
Cybersecurity is an ever-evolving field and the demand for qualified professionals continues to grow. Companies of all sizes and industries are looking for qualified professionals to help protect their data and systems. Salaries in the cybersecurity field are often high due to the scarcity of these skills.
By training in cybersecurity, you can open doors to exciting and profitable careers in a field that is increasingly crucial in our connected world. The skills you learn will also help you better protect your own privacy and personal data online.
So, ready to dive into the world of cybersecurity?
We will talk about DIC / TN, IAM / AAA, vulnerabilities, threats and risks, concepts in methodology and certification, true/false positives and negatives, the Kill Chain and continuous improvement.
Follow us to discover the key concepts in this exciting field!
Data, in the computer world, is information that can be stored or processed digitally.
One of the main objectives of cyber security is to protect the data of the company or an individual.
In this lesson, we will study the criteria for classifying this data in order to put in place adequate protection solutions.
In this lesson we will discuss several fundamental aspects of cyber security, grouped under several names, or frameworks.
These are the principles of IAM (Identity and Access Management) or otherwise called AAA (Authentication, Authorization and Accounting).
These principles allow us to implement a policy for managing access to resources or data.
It is obvious to say that you can defend yourself better when you know your weaknesses. The same is true when you know your opponents.
This lesson will allow us to better understand the concepts of vulnerability, threat and risk.
These concepts are essential foundations for implementing vulnerability management and risk management processes.
Let's remember the main objective of cyber security, which could be defined as: protecting the company's business and data.
We can say that this objective has no definite end in time, so we must work in an iterative and agile way.
Finally, we can also say that today the advantage is with the attackers (opportunity of vulnerabilities, surprise effect, means), which means that we must also be reactive and supervise in real time our security posture.
So an essential mantra for someone working in cyber security is: preparedness - agility - resilience.
The achievement of our goals cannot be done without methodology, and it is the basics of these methodologies that we will discover in this lesson.
In this lesson we will try to sort out the real from the fake... remember that when a negative event occurs, always stay positive!
We will introduce four elements that allow us to classify events.
This vocabulary will allow us to be better understood when we have to qualify an incident or analyze a vulnerability for example.
The concept of "Kill Chain" is again a concept that comes from the military world.
In the world of cybersecurity, this concept is attached to the field of "Cyber Threat Intelligence" (CTI), which is the field where intelligence about attackers is sought in order to better protect against them.
The "Kill Chain" concept has been implemented in two different repositories, which we will discover in this lesson.
Start your cybersecurity training!
Theory & Practice
Customized by level
Start your cybersecurity training
Breathe new life into your career with our cybersecurity training courses