Cybersecurity Essentials
Cybersecurity Essentials
Security
Essentials
protecting computers, networks,
and data from hackers, viruses,
and other cyber threats.
Table of Content
NEXT
2
What is Cybersecurity
Cybersecurity is the practice of protecting
systems, networks, and data from cyber
attacks. These attacks are aimed at
accessing, changing, or destroying
sensitive information, extorting money, or
disrupting normal business processes.
10 Important facts about Cybersecurity
01 02 03 04 05
The annual
A cyberattack 95% of 90% of cyber
30,000 average cost of
occurs every cybersecurity attack starts
websites are cybercrime is
39 seconds breaches are with phishing
hacked daily projected to
caused by emails
exceed $23
human error
trillion by 2027
10 09 08 07 06
Security Engineer
Designs, implements, and maintains security infrastructure,
including firewalls, intrusion detection systems. SIEM platforms
(e.g., Splunk, IBM QRadar), antivirus software, EDR tools.
Penetration Tester
Penetration tester Simulates cyberattacks to
identify weaknesses.
Incident Responder
Responds to security incidents, investigates breaches, and
implements recovery procedures.Forensic tools (e.g., EnCase,
Key Roles in
FTK), threat detection platforms, SOAR tools (e.g., Palo Alto
Cortex XSOAR)
CISO
Cybersecurity Lead the organization's overall cybersecurity strategy and
oversee incident response, compliance, and risk management
activities. GRC tools (e.g., RSA Archer, ServiceNow)
GRC Analyst
Ensure the organization complies with regulatory
requirements (e.g., GDPR, H).
Who is a
Hacker?
6
Hacker 2
03 04
01 03
Websites Internet
Social
Advertizers you visit Service
media Platforms Providers (ISP)
These platforms gather Websites use cookies to Your ISP tracks your
Advertisers monitor and
information about your track your activities in online activity and, in
track your online activities
gender, geolocation, order to provide a more some countries, they can
such as shopping habits
phone number and personalized experience. sell this data to
and personal preferences
political and religious But this leaves a data trail advertisers for a profit. In
and send targeted ads
ideologies based on your that is linked to your certain circumstances,
your way.
search histories and online identity that can ISPs may be legally
online identity. This often end up in the hands required to share your
information is then sold to of advertisers information with
advertisers for a profit. government surveillance
agencies or authorities.
Black Hat Hacker White Hat Hacker
TYPES OF
HACKERS
Grey Hat Hacker
Black-Hat Hacker
7 Phishing
Phishing is a type of cyberattack where
attackers impersonate a trusted source,
such as a bank, company, or friend, to trick
individuals into revealing sensitive
information or taking actions that benefit
the attacker. They may create fake
websites resembling familiar ones like G1B,
Faceb00k, or Wi-Fi networks
Basic Kali
Linux Commands
whoami Shows the current logged-in user
Command s
Thank You
NEXT