This module introduces learners to the key concepts that make up the current state and structure of cybersecurity. It begins with an Introduction to the world of cybersecurity, explaining how modern organizations defend themselves against digital threats and why cybersecurity has become a critical business function. Students gain an understanding of the CIA Triad—Confidentiality, Integrity, and Availability, which serves as the core framework for designing and evaluating security measures.
The module then explores Gap Analysis, a process used to compare an organization’s current security posture with industry standards or regulatory requirements. This helps learners understand how to identify weaknesses and plan corrective actions. The section on Access Control talks about the techniques and tools used to make sure that only people with the proper authorization can access sensitive resources. It also introduces concepts such as authentication, authorization, and accountability.
Learners are also introduced to the fundamental Information Security Competencies needed in a security role, such as technical skills, analytical abilities, and a strong understanding of risk management. This flows into a discussion on Information Security Roles and Responsibilities, where key positions such as Security Analysts, Incident Responders, Risk Managers, and CISOs are outlined, highlighting how each contributes to the overall security strategy.
To provide organizational context, the module examines Information Security Business Units, explaining how departments such as Security Operations (SOC), and IT Infrastructure work together to protect information assets. This leads into a structured look at Security Control Categories—administrative, technical, and physical controls—and Security Control Functional Types, such as preventive, detective, and corrective controls, which together form the backbone of effective security programs.
Finally, students are introduced to Kali Linux, a widely used penetration-testing distribution. This introduction provides a beginner-friendly look at its interface, common tools, and how cybersecurity professionals leverage it for ethical hacking, vulnerability assessment, and security testing. By the end of this module, learners will have a strong foundational understanding of the principles, roles, tools, and strategies that define the cybersecurity field.