Cyber Security Course
Cyber Security Course
Cyber Security
Dr. Mustafa Sadiq
What we will Introduction
learn in this
01
What is Cybersecurity?
General overview about Cybersecurity fields.
Where to start in this major?
course: Perimeter of the system
Anti viruses, Firewalls, IDS, IPS, and NGFW.
Cybersecurity Certification Path
Penetration Testing
03
Kali Linux as a penetration testing platform.
Installing Kali Linux.
Discovering Kali Linux Features and components
Wireshark.
Mustafa Sadiq Latief
Bsc, Msc, and PhD in Computer Engineering.
Www.mustafasadiq0.com
Www.youtube.com/mustafasadiq
Www.facebook.com/mustafasadiq85
Chapter-1: Introduction
to Cybersecurity
In Cybersecurity
world, there is
no such thing as
100% secured
system.
What is Cybersecurity?
Cyber security is the practice of defending
computers, servers, mobile devices, electronic OR:
systems, networks, and data from malicious attacks. Cyber Security is a set of principles and
It's also known as information technology security or practices designed to safeguard your
electronic information security. The term applies in a computing assets and online information
variety of contexts, from business to mobile against threats.
computing, and can be divided into a few common
categories.
- Network Security.
- Application Security.
- Information Security.
- Operational Security.
- Disaster Recovery and Business Continuity.
- End user Education and Awareness.
Why should we care about the Cybersecurity?
Being Online in any kind of business requires
protecting:
- Email
- Mobile devices
- Corporate website
- Social media
- E-commerce systems
- Online banking
- Bring your own device (BYOD) and office policy.
- Network management
- Backup and remote access
Cybersecurity Specialization Requirements
Qualifications of Cyber Security Specialist:
- Cyber/information/network security.
- Computer science.
- Computing and information systems.
- Software/electrical/network engineering.
- Mathematics.
- Physics.
- Other IT/security/network-related degrees.
Where should the Cybersecurity specialists work?
Internet
!
A firewall is a network security device that monitors
incoming and outgoing network traffic and decides
whether to allow or block specific traffic based on a
defined set of security rules.
Firewall is a:
- Choke point of control and monitoring Interconnects networks
with differing trust
- Imposes restrictions on network services where only authorized
traffic is allowed
- Auditing and controlling access where it can implement alarms
for abnormal behavior.
- Itself immune to penetration
- Provides perimeter defence
Network Based Intrusion Detection Systems
(NIDS)
NIDS detects malicious traffic on a network. NIDS
usually require promiscuous network access in order
to analyze all traffic, including all uni-cast traffic. NIDS
are passive devices that do not interfere with the
traffic they monitor;
NIDS functions include:
Watches all passing traffic
Reviews the events
Looks for potential attacks
Can use signatures
Can also look for unexpected behavior
When an attack is suspected, triggers an
alert
- may include a packet capture
Network Based Intrusion Prevention Systems
(NIPS)
An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines
network traffic flows to detect and prevent vulnerability exploits. Vulnerability exploits usually come in the form
of malicious inputs to a target application or service that attackers use to interrupt and gain control of an
application or machine. Following a successful exploit, the attacker can disable the target application
(resulting in a denial-of-service state), or can potentially access to all the rights and permissions available to
the compromised application.
NIPS functions include:
Where does the SSL/TLS works in Secure Shell (SSL) Handshake to secure
the TCP/IP stack? web pages
Securing your web browser