0% found this document useful (0 votes)
51 views2 pages

Cybersecurity Handwritten Style Notes

The document provides a comprehensive overview of cybersecurity, covering basic concepts such as the CIA triad and common threats, intermediate topics like cryptography and network tools, and advanced practices including penetration testing and incident response. It emphasizes the importance of protecting systems and data from digital attacks while detailing various security measures and frameworks. Key tools and methodologies, such as SIEM, VPNs, and the Red Team vs Blue Team approach, are also highlighted.

Uploaded by

nosiv83394
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views2 pages

Cybersecurity Handwritten Style Notes

The document provides a comprehensive overview of cybersecurity, covering basic concepts such as the CIA triad and common threats, intermediate topics like cryptography and network tools, and advanced practices including penetration testing and incident response. It emphasizes the importance of protecting systems and data from digital attacks while detailing various security measures and frameworks. Key tools and methodologies, such as SIEM, VPNs, and the Red Team vs Blue Team approach, are also highlighted.

Uploaded by

nosiv83394
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cybersecurity Notes - Basic to Advanced

1. Basics of Cybersecurity

- Cybersecurity: Protecting systems, networks, and data from digital


attacks.
- Importance: Prevent data breaches, ensure privacy, and maintain trust.
- Common Threats:
- Malware: Malicious software like viruses, worms, spyware.
- Phishing: Trick users into giving sensitive info.
- Ransomware: Locks files until ransom is paid.
- CIA Triad:
- Confidentiality - keep data private.
- Integrity - ensure data isn't altered.
- Availability - ensure systems are accessible.
- Firewalls: Filter traffic between trusted and untrusted networks.
- Antivirus: Detects and removes malicious software.

2. Intermediate Cybersecurity

- TCP/IP & OSI Model: Basics of network communication.


- Cryptography:
- Symmetric: Same key for encrypt/decrypt (AES).
- Asymmetric: Public/private key (RSA).
- Hashing: Converts data to fixed-length string (SHA, MD5).
- Tools:
- Wireshark - Network packet analysis.
- Nmap - Port scanning.
- Metasploit - Exploitation framework.
- VPN: Secures internet connection via encryption.
- IDS/IPS: Detects/prevents intrusion attempts.
- Linux Commands:
Cybersecurity Notes - Basic to Advanced

- ls, cd, pwd, chmod, chown, netstat, ps

3. Advanced Cybersecurity

- Penetration Testing Phases:


- Reconnaissance, Scanning, Gaining Access, Maintaining Access,
Covering Tracks.
- SIEM Tools: Collect and analyze logs (Splunk, Wazuh).
- SOC (Security Operations Center): Monitors and responds to security
incidents.
- OWASP Top 10: Common web app vulnerabilities (XSS, SQLi, CSRF, etc.).
- Digital Forensics:
- Identify, collect, preserve, analyze digital evidence.
- Cloud Security:
- Secure AWS, Azure resources.
- IAM roles, encryption, audits.
- Red Team vs Blue Team:
- Red - attackers.
- Blue - defenders.
- Zero Trust: "Never trust, always verify" model.
- Incident Response:
- Preparation, Identification, Containment, Eradication, Recovery,
Lessons Learned.

You might also like