Cybersecurity Basic (Part 1)
What is Cybersecurity?

Cybersecurity Basic (Part 1)

What is Cybersecurity?

We also known Cybersecurity as >> Information Security (INFOSEC) >> Information Assurance (IA) >> System Security.

Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, programs, data and information from attack, damage or unauthorized access.

Or, It is a technique and practice designed to protect data; applied to digital data and stored, transmitted, in use or it is Protect Computer and networking systems from potential hackers and cyber attacks

No alt text provided for this image

What does cybersecurity engineers do?

1. Analyses computer networks

2. Foresee possible security issues

3. Ensure that sensitive data is safe

In short a security engineer focuses on designing computer systems equipped to deal with disruptions, like natural disasters or malicious cyber-attacks.

What cybersecurity engineers' roles and responsibilities?

1. Developing security practices and standards

2. Monitoring networks for intrusions and breaches

3. Performing penetration testing to check for weakness

4. Developing automation scripts to manage and track incidents

5. Investigate intrusion incidents, conduct forensic investigations

6. Developing & implementing an incident response plan

No alt text provided for this image

The cybersecurity field is a must;

1. Understanding of cybersecurity methodologies.

2. Proficiency in Java, Python, .Net, bash.

3. Solid understanding of Operating systems.

4. Network & Web related protocols.

5. A solid understanding of the OSI model.

Soft Skill for Cybersecurity Engineers:

1. Analytical Thinking

2. Inductive reasoning

3. Quick Thinker

4. Communication

5. Detail-oriented

6. Dealing with the stress I mean, that is work under pressure.

Cyber Engineer Career Pathway:

Feeder Role

1. Networking 2. Software Development 3. System Engineer 4. Security intelligence

Entry-Level:

1. Cybersecurity technician >> 2. Cyber Crime Analyst >>3. Incident responder

>>4. IT Auditor

Mid-Level:

1. Cybersecurity Analyst >>2. Cybersecurity consultant >> 3. Penetration Tester

Advanced-Level:

1. Cybersecurity Admin >>2. Cybersecurity Engineer >> 3. Cybersecurity Architect

No alt text provided for this image

Cyber security Basic Terms

1. Anti- Virus software

2. Anti – Spyware software

3. Firewall

4. Updates

5. Login name & User name

6. Threat

7. Vulnerability

8. Penetration Test / Pentest

9. Authentication

10. Authorization

11. Identity – Individual unique data

12. Environmental security

13. Physical security

14. Allowed IP address list

15. Internet security suite

16. Site advisor

17. Exploit – side of data

18. Cryptography.

Youtube link:

(https://youtu.be/ooJSgsB5fIE?list=PL9ooVrP1hQOGPQVeapGsJCktzIO4DtI4_)

Source: edureka

** Cyber Security Course: https://www.edureka.co/cybersecurity-... **

Continue.......


Thanks for reading me, I have collected this information from google specially edureka and some of the youtube videos. I have shared video links for your reference. I drafted my study and shared on my profile so that those who are interested in knowing about any specific topic they can learn from here. Thank you again,Please keep me in your prayer.

#khan_farhanaa

email: [email protected]


 


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Rokonuzzaman Rony

Entrepreneur | Multidimensional | StoryTeller

4 年

Love it dear. My favorite topic

Md Shohidul Islam

Web Master | Landing Page And Sales Funnel Expert ( Unbounce, Systeme.IO, Clickfunnels, GHL, Shopify, Wordpress)

4 年

Good written

回复
MD MASUDUR RAHMAN

CCNA | MCSA | CompTIA Security + | Active Directory l Service Now | Zoho ( Patch Management ) | MS O365 | MDM | Intune | Trend Micro - XDR | Veritas Backup | ITIL | MTCNA

4 年

Good post?

回复
Siem Sepi

Student at PNG University of Technology

4 年

I'm really interested in that field of computer science..But don't know how to get there .

回复

要查看或添加评论,请登录

Farhana Akter ??的更多文章

社区洞察

其他会员也浏览了