Cisco Cursus H0-H8 PDF

Title Cisco Cursus H0-H8
Course Cybersecurity
Institution Hogeschool Gent
Pages 187
File Size 14.2 MB
File Type PDF
Total Downloads 115
Total Views 161

Summary

Download Cisco Cursus H0-H8 PDF


Description

Cybersecurity Essentials 0

Course Introduction

1

Cybersecurity - A World of Experts and Criminals

2

The Cybersecurity Cube

3

Cybersecurity Threats, Vulnerabilities, and Attacks

4

The Art of Protecting Secrets

5

The Art of Ensuring Integrity

6

The Five Nines Concept

7

Protecting a Cybersecurity Domain

8

Becoming a Cybersecurity Specialist

Packet Tracer

p

Labs

p

Cisco Cybersecurity

1 /187

Course Index Inhoud Course Index.........................................................................................................................................................................................2 Inleiding ..............................................................................................................................................................................................16 The Cybersecurity Landscape ............................................................................................................................................................16 A Global Community .........................................................................................................................................................................16 More Than Just Information ...............................................................................................................................................................16 How We Teach...................................................................................................................................................................................16 Course Overview................................................................................................................................................................................17 Chapter 1: Cybersecurity - A World of Experts and Criminals ............................................................................................................18 1.0 Introduction .............................................................................................................................................................................18 1.1 The Cybersecurity World .........................................................................................................................................................18 1.1.1 Cybersecurity Domains .....................................................................................................................................................18 Overview of the Cybersecurity Domains ...........................................................................................................................................18 Examples of Cybersecurity Domains .................................................................................................................................................18 The Growth of the Cyber Domains ....................................................................................................................................................19 1.2 Cybersecurity Criminals versus Cybersecurity Specialists ........................................................................................................19 1.2.1 Cybersecurity Criminals ....................................................................................................................................................19 Who Are the Cyber Criminals? ..........................................................................................................................................................19 1.2 Cybersecurity Criminals versus Cybersecurity Specialists ........................................................................................................20 Cyber Criminal Motives .....................................................................................................................................................................20 1.2.2 Cybersecurity Specialists ..................................................................................................................................................21 Why Become a Cybersecurity Specialist? ..........................................................................................................................................21 Thwarting Cyber Criminals ................................................................................................................................................................21 Lab - Cybersecurity Job Hunt ............................................................................................................................................................23 1.3 Common Threads .....................................................................................................................................................................24 1.3.1 Threat Arenas ...................................................................................................................................................................24 Common Threats to End Users ..........................................................................................................................................................24 ypes of Personal Records ...................................................................................................................................................................24 Threats to Internet Services ................................................................................................................................................................24 Threats to Key Industry Sectors .........................................................................................................................................................25 Threats to People’s Way of Life ........................................................................................................................................................25 Lab - Threat Identification .................................................................................................................................................................26 1.4 Spreading Cybersecurity Threats .............................................................................................................................................26 1.4.1 How Threats Spread .........................................................................................................................................................26 Internal and External Threats .............................................................................................................................................................26 Cisco Cybersecurity

2 /187

The Vulnerabilities of Mobile Devices ..............................................................................................................................................27 The Emergence of the Internet of Things ...........................................................................................................................................27 The Impact of Big Data ......................................................................................................................................................................28 1.4.2 Threat Complexity ............................................................................................................................................................28 Using Advanced Weapons .................................................................................................................................................................28 Broader Scope and Cascade Effect ....................................................................................................................................................28 Safety Implications.............................................................................................................................................................................28 Heightened Recognition of Cybersecurity Threats ............................................................................................................................29 1.5 Creating More Experts .............................................................................................................................................................29 1.5.1 A Workforce Framework for Cybersecurity ......................................................................................................................29 Addressing the Shortage of Cybersecurity Specialists .......................................................................................................................29 The National Cybersecurity Workforce Framework ..........................................................................................................................29 1.5.2 Online Cybersecurity Communities ..................................................................................................................................31 Professional Organizations.................................................................................................................................................................31 Cybersecurity Student Organizations and Competitions ....................................................................................................................31 1.5.3 Cybersecurity Certifications .............................................................................................................................................31 Industry Certifications ........................................................................................................................................................................31 Company-Sponsored Certifications ...................................................................................................................................................31 How to Become a Cybersecurity Expert ............................................................................................................................................32 Lab - Exploring the World of Cybersecurity Professionals ...............................................................................................................32 Packet Tracer - Creating a Cyber World ............................................................................................................................................32 Packet Tracer - Communicating in a Cyber World ............................................................................................................................33 Conclussion Chapter 1: Cybersecurity - A World of Experts and Criminals ...................................................................................33 Chapter 2: The Cybersecurity Cube ....................................................................................................................................................34 2.0 Introduction .............................................................................................................................................................................34 2.1 The Three Dimensions of the Cybersecurity Cube ...................................................................................................................34 2.1.1 The Three Dimensions ......................................................................................................................................................34 The Principles of Security ..................................................................................................................................................................34 The States of Data ..............................................................................................................................................................................35 Cybersecurity Safeguards...................................................................................................................................................................35 2.2 CIA Triad ...................................................................................................................................................................................35 2.2.1 Confidentiality ..................................................................................................................................................................35 The Principle of Confidentiality .........................................................................................................................................................35 Protecting Data Privacy......................................................................................................................................................................35 Controlling Access .............................................................................................................................................................................36 Laws and Liability .............................................................................................................................................................................36 2.2.2 Integrity ............................................................................................................................................................................37 Principle of Data Integrity ..................................................................................................................................................................37 Need for Data Integrity ......................................................................................................................................................................37 Cisco Cybersecurity

3 /187

Integrity Checks .................................................................................................................................................................................38 2.2.3 Availability ........................................................................................................................................................................39 The Principle of Availability ..............................................................................................................................................................39 Five Nines ..........................................................................................................................................................................................39 Ensuring Availability .........................................................................................................................................................................40 2.3 States of data ...........................................................................................................................................................................41 Types of Data Storage ........................................................................................................................................................................41 Challenges of Protecting Stored Data ................................................................................................................................................41 Methods of Transmitting Data ...........................................................................................................................................................42 Challenges of Protecting Data In-Transit ...........................................................................................................................................42 Forms of Data Processing and Computation ......................................................................................................................................43 Challenges of Protecting Data In-Process ..........................................................................................................................................43 2.4 Cybersecurity Countermeasures ..............................................................................................................................................44 Software-based Technology Safeguards ............................................................................................................................................44 Hardware-based Technology Safeguards ...........................................................................................................................................44 Network-based Technology Safeguards .............................................................................................................................................44 Cloud-based Technology Safeguards .................................................................................................................................................44 Implementing Cybersecurity Education and Training .......................................................................................................................45 Establishing a Culture of Cybersecurity Awareness ..........................................................................................................................45 Policies ...............................................................................................................................................................................................45 Standards ............................................................................................................................................................................................46 Guidelines ..........................................................................................................................................................................................46 Procedures ..........................................................................................................................................................................................47 2.5 IT Security Management Framework.......................................................................................................................................48 2.5.1 The ISO Cybersecurity Model ...........................................................................................................................................48 Overview of the Model ......................................................................................................................................................................48 Cybersecurity Domains ......................................................................................................................................................................48 Control Objectives .............................................................................................................................................................................49 Controls ..............................................................................................................................................................................................49 2.5.2 Using the ISO Cybersecurity Model ..................................................................................................................................50 The ISO Cybersecurity Model and the CIA Triad .............................................................................................................................50 The ISO Cybersecurity Model and the States of Data........................................................................................................................50 The ISO Cybersecurity Model and Safeguards ..................................................................................................................................51 Lab - I...


Similar Free PDFs