Cybersecurity Fundamentals
Author: Dr. Jim Marquardson (jimarqua@nmu.edu)
This page links to the content for NMU's IS 116 Cybersecurity Foundations course content.
Table of Contents
Introduction to Cybersecurity
Cybersecurity will be important as long as people use technology. This section introduces key cybersecurity concepts and provides guidelines for ethical cybersecurity behavior.
- About this Content
- Rise of the Machine: A Brief History of Computing
- Confidentiality, Integrity, and Availability
- Acceptable Use Policies
- Ethical Hacking
- Cybersecurity Careers
Cyber Hygiene
Follow these key principles and you will protect yourself from the vast majority of cyber threats.
- Ad Blocking
- Password Managers
- Multifactor Authentication
- Passkeys
- Manage Your Credit
- Endpoint Monitoring
Networking and Cloud Computing
Cybersecurity relies on secure networks. We must know how networks work before we can secure them.
- How the Internet Connected Us
- Cloud Computing
- Cloud Computing
- Complete the following three exercises to set up your lab in the cloud.
- Networking with Packet Tracer
- Networking Tools
Windows Operating System
The Windows operating system dominates corporate environments.
- The Rise of Windows
- Windows Folders
- Windows Accounts
- Folder Permissions
- Task Manager
- Windows Firewall
- Virus Protection
- Group Policy
- Command Line Interface
Linux Operating System
Billions of computers, smartphones, and other devices run Linux.
- Open Source Software
- The Rise of Linux
- Linux Distributions
- Getting Started with Linux
- Work with Files and Directories
- Accounts and Permissions
- Information Gathering
- Linux Review with GameShell
- Linux Command Cheat Sheet
Cryptography
Cryptography protects the confidentiality and integrity of your data. Privacy and modern commerce would be impossible without cryptography.
- Cryptography Overview
- Symmetric Encryption
- Asymmetric Encryption
- How HTTPS Works
- Hashing
- Cryptocurrency
Python
Python is the most popular programming language for cybersecurity experts. But you can also use Python for developing websites, data analytics, game development, and more.
- First Coding Languages
- Why Python?
- Visual Studio Code
- Practice Files
- String and Numbers
- Working with Strings
- Variables
- Lists
- String, Integer, and List Review
- Dictionaries
- User Input
- Conditionals
- Loops
- Functions
- Main Methods
- F-Strings
- Importing Libraries
- Review: Reading Code
- Project: Dictionary-based Password Cracker
- Project: Hybrid Password Cracker
- AI-enhanced Coding
Threats
We face many threats. Threats often combine technical and social methods to cause us harm.
Management Tools
Cybersecurity is a process driven by people. People must follow best practices and be intentional about cybersecurity efforts.
- Cybersecurity Frameworks
- Disaster Recovery Planning
- Risk Management Strategies
- Control Types and Goals
- Access Control Methods
- HIPAA, FERPA, and Other Laws