Understand security controls for networks, servers and applications.
Learn valuable security principals and how to develop compliant policies.
Implement proper procedures for data confidentiality and availability.
Develop critical thinking and problem-solving skills using real equipment and Cisco Packet Tracer.
Module 1 - Cybersecurity Threats, Vulnerabilities and Attacks
Welcome to this module, which aims to explore the range of cybersecurity risks and threats that are
ever-present in our world today.
Cybercriminals are constantly finding new ways to exploit vulnerabilities in systems and networks, often
with the intention of stealing sensitive information and/or money.
As a cybersecurity professional, you must be able to consider the possibility of a cyber attack
occurring (a threat), recognize what makes a target susceptible to an attack (a vulnerability) and
understand the different types of cyber attacks and their effects.
Chapter 1.1 - Common Threats
1.1.1 Threat Domains
With organizations facing an ever-growing number of cyber threats, it is critical that they have
robust security solutions in place. But in order to protect themselves, organizations first need to
know what vulnerabilities exist within their threat domains. A ‘threat domain’ is considered to be
an area of control, authority or protection that attackers can exploit to gain access to a system.
There are many ways that attackers can uncover vulnerabilities and exploit systems within a domain.
Cybersecurity professionals can also use these domains to perform an analysis of an organization’s
current cybersecurity status. In this module, we will look at the different types of domains that exist
within an organization. It is important to approach cybersecurity risks from a multi-scale, systems
perspective, taking into account the interaction of cyber, physical and human systems.