Introduction to Computer Science

  1. Cybersecurity Fundamentals
    1. Information Security Principles
      1. CIA Triad
        1. Confidentiality
          1. Data Privacy
            1. Access Control
              1. Information Classification
              2. Integrity
                1. Data Accuracy
                  1. Data Consistency
                    1. Change Detection
                    2. Availability
                      1. System Uptime
                        1. Disaster Recovery
                          1. Business Continuity
                        2. Additional Security Principles
                          1. Authentication
                            1. Authorization
                              1. Non-Repudiation
                                1. Accountability
                              2. Threat Landscape
                                1. Threat Categories
                                  1. Natural Disasters
                                    1. Human Errors
                                      1. Malicious Attacks
                                      2. Threat Actors
                                        1. Script Kiddies
                                          1. Hacktivists
                                            1. Cybercriminals
                                              1. Nation-State Actors
                                                1. Insider Threats
                                                2. Attack Vectors
                                                  1. Network-Based Attacks
                                                    1. System-Based Attacks
                                                      1. Application-Based Attacks
                                                        1. Social Engineering
                                                      2. Common Security Threats
                                                        1. Malware
                                                          1. Viruses
                                                            1. Worms
                                                              1. Trojans
                                                                1. Ransomware
                                                                  1. Spyware
                                                                    1. Adware
                                                                    2. Network Attacks
                                                                      1. Denial of Service (DoS)
                                                                        1. Distributed Denial of Service (DDoS)
                                                                          1. Man-in-the-Middle Attacks
                                                                            1. Packet Sniffing
                                                                            2. Social Engineering
                                                                              1. Phishing
                                                                                1. Spear Phishing
                                                                                  1. Pretexting
                                                                                    1. Baiting
                                                                                      1. Tailgating
                                                                                      2. Web Application Attacks
                                                                                        1. SQL Injection
                                                                                          1. Cross-Site Scripting (XSS)
                                                                                            1. Cross-Site Request Forgery (CSRF)
                                                                                          2. Security Controls and Countermeasures
                                                                                            1. Preventive Controls
                                                                                              1. Access Controls
                                                                                                1. Firewalls
                                                                                                  1. Antivirus Software
                                                                                                    1. Encryption
                                                                                                    2. Detective Controls
                                                                                                      1. Intrusion Detection Systems
                                                                                                        1. Log Monitoring
                                                                                                          1. Security Audits
                                                                                                          2. Corrective Controls
                                                                                                            1. Incident Response
                                                                                                              1. Backup and Recovery
                                                                                                                1. Patch Management
                                                                                                                2. Personal Security Practices
                                                                                                                  1. Password Management
                                                                                                                    1. Strong Password Creation
                                                                                                                      1. Password Managers
                                                                                                                        1. Multi-Factor Authentication
                                                                                                                        2. Safe Computing Habits
                                                                                                                          1. Software Updates
                                                                                                                            1. Safe Browsing
                                                                                                                              1. Email Security
                                                                                                                                1. Social Media Privacy