Get started with cybersecurity by reviewing the vocabulary heard in the cybersecurity industry, as well as scenarios where those words, phrases, and acronyms are used.
- [Serge] Welcome to our cybersecurity awareness series. The world of cybersecurity is complex and can be intimidating to the uninitiated. This course aims to break down some of the vocabulary often heard in the cybersecurity industry and expose you to common situations where these words, phrases, and acronyms are often spoken. Learning anything new is a process. Throughout this course, you will be introduced to new topics. The expectation is that you will take the time to understand these topics and expand upon the basic course elements to master the material.
The general way this course will work is by stating a topic of discussion, delving in to the topic, and finishing each topic with something to take away, be it a question to you the learner, or an exercise to reinforce the learning material. By the end of this course you should have a solid foundation of what cybersecurity is and what it entails. Let's get started and enjoy. My name is Serge Borso and I'm the CEO of SpyderSec. SpyderSec is an information security consulting organization specializing in penetration testing services. We also offer phishing solutions, discovery scanning, and education awareness training.
Now, what is penetration testing you might ask. What's the difference between discovery scanning and vulnerability scanning? Throughout this course I will be highlighting terminology and vocabulary often heard in the cybersecurity industry both in board meetings and technical discussions. We'll talk about the difference between phishing and spear phishing, delve in to TOR, or the Onion router, and provide insight into other applicable areas of computer security as well. All the time introducing new vocabulary and having fun learning.
The course topics are as follows. We start off with an overview of cybersecurity and the course objectives. Then we jump in to terminology, the role that humans play, and how this fits into the industry. We stay with the theme of the course by introducing new vocabulary and acronyms, but not just to size with words as I don't intend for this to be a glorified dictionary. Rather we discuss each vocabulary word in its natural context and provide background on its meaning and relevance. This idea intertwines with actually using the new vocabulary.
Finally putting everything together to provide a cohesive structure to build from. If learning new vocabulary and concepts, specific to cybersecurity sounds exciting, then let's continue.
This course was created and produced by Mentor Source, Inc. We are pleased to host this training in our library.