π‘️ Cybersecurity Essentials Overview
π 1. Encryption
-
What it is: The process of converting readable data into unreadable code to prevent unauthorized access.
-
Example: End-to-end encryption in WhatsApp ensures only you and the recipient can read messages.
-
Two types:
-
Symmetric encryption: Same key to encrypt/decrypt (e.g., AES)
-
Asymmetric encryption: Public key to encrypt, private key to decrypt (e.g., RSA)
-
π₯ 2. Firewalls
-
What it is: A security system that filters incoming/outgoing traffic based on rules.
-
Example: Blocking all traffic except web traffic (ports 80 and 443).
-
Types:
-
Software firewall: Installed on a device (e.g., Windows Defender Firewall)
-
Hardware firewall: Physical device between network and gateway
-
π΅️ 3. Threat Detection
-
What it is: Identifying malicious activity like malware, viruses, or unauthorized access.
-
Example: Antivirus detects a suspicious file; SIEM alerts about unusual login attempts.
-
Key tools:
-
IDS (Intrusion Detection System): Alerts you
-
IPS (Intrusion Prevention System): Blocks it
-
SIEM (Security Information and Event Management): Monitors and analyzes logs
-
π️ 5-Week Beginner Cybersecurity Study Plan
Each week includes:
-
✅ Learning goals
-
π― Daily tasks
-
π Free resources
π§ Week 1: Cybersecurity Fundamentals
Goal: Understand core concepts (CIA triad, malware types, basic threats)
Day | Task |
---|---|
1-2 | Watch "What is Cybersecurity?" by IBM on YouTube |
3-4 | Read Introduction to Cybersecurity on Cybrary |
5 | Explore Cybersecurity Path on TryHackMe |
6 | Write notes on malware types: virus, worm, trojan, ransomware |
7 | Take a quiz or flashcard review (e.g., Quizlet) |
π§± Week 2: Encryption & Secure Communication
Goal: Learn how encryption protects data
Day | Task |
---|---|
1-2 | Read How Encryption Works – Cloudflare |
3-4 | Learn about symmetric vs asymmetric encryption |
5 | Try this tool: CyberChef to encrypt/decrypt a message |
6-7 | Practice RSA demo: Practical Crypto - CrypTool |
π§± Week 3: Network Security & Firewalls
Goal: Understand ports, firewalls, and basic network rules
Day | Task |
---|---|
1-2 | Watch: Firewalls Explained Simply |
3 | Read: What is a Firewall? - Kaspersky |
4-5 | Complete TryHackMe room: Network Security |
6-7 | Set up UFW (Uncomplicated Firewall) on a Linux VM (see project below) |
π§± Week 4: Threat Detection & Malware
Goal: Learn how threats are detected and prevented
Day | Task |
---|---|
1 | Read: IDS vs IPS – Cisco Guide |
2-3 | Explore Splunk Fundamentals 1 - Free course |
4 | TryHackMe room: Intro to SIEM |
5-6 | Study antivirus/anti-malware detection strategies |
7 | Reflect: How does detection help mitigate ransomware? |
π§± Week 5: Cyber Hygiene & Phishing
Goal: Learn about user-level security practices
Day | Task |
---|---|
1 | Read: Phishing 101 by Norton |
2-3 | Complete TryHackMe room: Phishing |
4 | Watch: How Hackers Crack Passwords |
5 | Research password managers (Bitwarden, LastPass, etc.) |
6 | Enable 2FA on your personal accounts |
7 | Write a checklist for secure account management |
π ️ Practical Project: Setup a Firewall on a VM
π¦ What You Need:
-
VirtualBox or VMware (Install a Linux distro like Ubuntu)
-
Basic terminal commands
-
Internet connection
⚙️ Steps:
-
Install Ubuntu on VirtualBox.
-
Open terminal and install
-
Enable firewa
-
Check status:
-
Allow only HTTP and SSH:
-
Try pinging other ports to verify blocking.
✅ This simulates basic server security for real-world systems.
π§ Practice Questions (Cybersecurity Basics)
-
What is phishing and how can you avoid it?
A. It’s spam mail; ignore all emails.
B. It’s an email attack to steal credentials — avoid clicking suspicious links. ✅
C. It’s a brute force attack.
D. It’s secure communication. -
What’s the most secure way to manage multiple passwords?
A. Write them down in a notebook.
B. Use the same password for all accounts.
C. Store them in a password manager with 2FA. ✅
D. Ask a friend to remember them. -
What is the purpose of encryption?
A. To compress files.
B. To format hard drives.
C. To make data unreadable to unauthorized users. ✅
D. To speed up networks. -
Which command enables UFW firewall in Linux?
A.ufw off
B.ufw run
C.sudo ufw enable
✅
D.firewall -on
-
What does an Intrusion Detection System (IDS) do?
A. Deletes viruses automatically.
B. Encrypts passwords.
C. Monitors and alerts on suspicious activity. ✅
D. Blocks DDoS attacks.
No comments:
Post a Comment