ISBI (IS SECURITY BAKED IN)
Course Overview
This foundational cybersecurity course is designed to provide
students with a comprehensive understanding of essential security
concepts and practices. It serves as a crucial stepping stone for
those aspiring to pursue careers as security specialists and lays
the groundwork for advanced courses and diverse career pathways in
the rapidly evolving field of cybersecurity.
In an increasingly interconnected world, the importance of
cybersecurity cannot be overstated. This course aims to equip
students with the knowledge and skills necessary to protect
digital assets, understand potential threats, and implement
effective security measures across various technological platforms
Key Learning Areas
Fundamental Security Concepts
-
CIA Triad: Confidentiality, Integrity, and
Availability
- Security models and frameworks
- Ethical considerations in cybersecurity
Threat Landscape, Vulnerabilities, and Mitigations
-
Types of cyber threats (malware, social engineering,
etc.)
-
Common vulnerabilities in systems and applications
- Threat intelligence and analysis
- Mitigation strategies and best practices
Identity and Access Management
- Authentication methods and protocols
- Authorization and access control models
-
Single Sign-On (SSO) and Multi-Factor Authentication
(MFA)
- Identity management in cloud environments
Network Architecture and Security
-
Network topologies and their security implications
-
Firewalls, IDS/IPS, and other network security
devices
- Virtual Private Networks (VPNs)
- Wireless network security
Cryptographic Solutions
- Basic cryptography concepts
- Symmetric and asymmetric encryption
- Public Key Infrastructure (PKI)
- Hash functions and digital signatures
Resiliency and Site Security
-
Business continuity and disaster recovery planning
-
Redundancy and fault tolerance in system designed
- Physical security measures and their importance
Vulnerability Management
- Vulnerability assessment techniques
- Penetration testing fundamentals
- Patch management strategies
- Continuous monitoring and scanning
Endpoint and Mobile Device Security
- Endpoint protection platforms
- Mobile device management (MDM)
- BYOD (Bring Your Own Device) policies
- IoT security considerations
Incident Response and Digital Forensics
- Incident response planning and procedures
-
Log analysis and security information and event
management (SIEM)
- Disaster recovery and business continuity
Application and Cloud Security
- Secure software development lifecycle
- Web application security
- Cloud security models and shared responsibility
- Containerization and microservices security
Security Governance and Compliance
-
Cybersecurity frameworks (NIST, ISO 27001, etc.)
-
Regulatory compliance (GDPR, HIPAA, PCI DSS, etc.)
- Security policies and procedures
- Security awareness training
Risk Management Process
- Risk assessment methodologies
- Qualitative and quantitative risk analysis
- Risk mitigation strategies
- Ongoing risk management and monitoring
Data Protection and Privacy
- Data classification and handling
- Data loss prevention (DLP) strategies
-
Privacy regulations and their impact on security
- Encryption for data at rest and in transit