
Chapter 1: Introduction to Cybersecurity Fundamentals
Overview of Cybersecurity: Define what cybersecurity is and its importance in today's digital landscape. Discuss the evolution of cyber threats and the increasing need for robust cybersecurity measures.
- Core Concepts: Cover foundational concepts such as confidentiality, integrity, and availability (CIA triad), as well as other key principles like defense-in-depth, least privilege, and the principle of least astonishment.
- Threat Landscape: Explore common cyber threats and attack vectors, including malware, phishing, social engineering, DDoS attacks, insider threats, and more. Discuss real-world examples and case studies to illustrate the impact of these threats.
Chapter 2: Cybersecurity Technologies and Tools
- Network Security: Examine network security fundamentals, including firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, and secure protocols. Discuss network segmentation, DMZs, and best practices for securing networks.
- Endpoint Security: Cover endpoint protection mechanisms such as antivirus software, host-based firewalls, endpoint detection and response (EDR) tools, and device encryption. Discuss the importance of patch management and secure configurations for endpoints.
- Encryption and Cryptography: Introduce encryption concepts, symmetric and asymmetric cryptography, key management, and digital signatures. Discuss the role of encryption in securing data at rest and in transit, as well as its applications in authentication and integrity verification.
Chapter 3: Cybersecurity Governance and Risk Management
- Governance Frameworks: Explore cybersecurity governance frameworks such as NIST Cybersecurity Framework, ISO 27001, COBIT, and others. Discuss the components of effective cybersecurity governance, including policies, procedures, and compliance requirements.
- Risk Management: Introduce the risk management process, including risk identification, assessment, mitigation, and monitoring. Discuss risk analysis techniques, risk appetite, and the importance of aligning risk management with business objectives.
- Incident Response and Disaster Recovery: Cover the fundamentals of incident response planning, including incident detection, containment, eradication, and recovery. Discuss the role of incident response teams, incident handling procedures, and the importance of regular testing and refinement of incident response plans. Additionally, explore disaster recovery planning and the principles of business continuity to ensure resilience in the face of cyber incidents.
- Teacher: Koloma SORO

- Teacher: Koloma SORO