{"id":283,"date":"2024-12-07T00:52:55","date_gmt":"2024-12-07T00:52:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/?page_id=283"},"modified":"2024-12-07T01:33:20","modified_gmt":"2024-12-07T01:33:20","slug":"introduction-to-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/introduction-to-cybersecurity\/","title":{"rendered":"Introduction to Cybersecurity"},"content":{"rendered":"\n<p>This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies and practices, and develop a foundation for further study in cybersecurity.<\/p>\n\n\n\n<ul>\n<li><strong>Basic Cybersecurity Concepts<\/strong><br>Understanding the CIA Triad (Confidentiality, Integrity, Availability)<br>Overview of cyber threats and types of attacks (e.g., malware, phishing, DoS, DDoS, etc.)<br>Differentiating between cybersecurity, information security, and network security<br>Understanding risk management and threat assessment<\/li>\n\n\n\n<li><strong>Cyber Threats and Attack Vectors<\/strong><br>Identifying common cyber threats (viruses, worms, ransomware, spyware, etc.)<br>Recognizing social engineering attacks (e.g., phishing, spear phishing, vishing)<br>Understanding attack vectors (e.g., email, web applications, network vulnerabilities)<br>Exploring advanced persistent threats (APTs) and their impact<\/li>\n\n\n\n<li><strong>Network Security Fundamentals<\/strong><br>Basic concepts of networking (e.g., TCP\/IP, DNS, DHCP, VPN, firewalls)<br>Understanding network defense mechanisms (e.g., IDS\/IPS, firewalls, NAT, VPNs)<br>Recognizing and preventing man-in-the-middle (MITM) attacks<br>Overview of Wi-Fi security (e.g., WPA2, WPA3, encryption)<\/li>\n\n\n\n<li><strong>Cryptography Basics<\/strong><br>Introduction to encryption and decryption (symmetric vs. asymmetric)<br>Understanding public key infrastructure (PKI) and SSL\/TLS<br>Exploring hashing (e.g., MD5, SHA) and its role in data integrity<br>Learning about digital signatures and certificates in cybersecurity<\/li>\n\n\n\n<li><strong>Security Policies and Governance<\/strong><br>Understanding the role of security policies, standards, and frameworks (e.g., NIST, ISO 27001)<br>Recognizing the importance of security awareness training for employees<br>Overview of compliance requirements (e.g., GDPR, HIPAA, PCI-DSS)<br>Implementing basic security protocols and security policies in an organization<\/li>\n\n\n\n<li><strong>Authentication and Access Control<\/strong><br>Understanding the principles of authentication (something you know, something you have, something you are)<br>Configuring multi-factor authentication (MFA) for enhanced security<br>Implementing access control models (e.g., RBAC, DAC, MAC)<br>Managing password security (e.g., password policies, password hashing)<\/li>\n\n\n\n<li><strong>Incident Response and Reporting<\/strong><br>Recognizing cybersecurity incidents and how to respond effectively<br>Understanding incident response procedures (e.g., identification, containment, eradication, recovery)<br>Introduction to forensics (e.g., data collection, evidence handling, analysis)<br>Understanding the importance of post-incident reporting and root cause analysis<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jaquanclark413\/introduction-to-cybersecurity\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":21899,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/pages\/283"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/users\/21899"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/pages\/283\/revisions"}],"predecessor-version":[{"id":325,"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/pages\/283\/revisions\/325"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/media?parent=283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}