In the best of all worlds, our organization’s information systems are in a pristine state when we start implementing security controls. In this model, intrusions are something that exists as …
A final aspect of the cybersecurity landscape that is worthy of attention isn’t strictly technology-related but instead relates to regulation and legislation. For many years the information technology industry was …
Automation of detection One aspect of the cybersecurity landscape that has become brighter for defenders is that it has become easier to detect attacks that would have otherwise only been …
A big change in the recent cybersecurity landscape is coin mining software. Coin minding software is software that mines cryptocurrency, such as Monero, Bitcoin, or Ethereum. This is a big …
Sophistication of attack tools An adage within the cybersecurity industry is that tools that are only available to the elite hacking teams of nation-state intelligence agencies today will be available …
Technology Lag When considering the cybersecurity landscape, it’s important to note that the versions of products that organizations have deployed exist on a spectrum, with a small number of organizations …
The current cybersecurity landscape is complex. Attackers develop new and ingenious methods of compromising systems on a daily basis. Intrusion tools, originally developed by the intelligence agencies of nation-states, have …
Thank you for telling us a little bit about yourself. We hope this course will be an enjoyable learning journey for you. This course is designed to help you learn …
Breach investigation After the attacker has been successfully ejected from the organization’s information systems, an organization should perform a thorough investigation to determine as much as it can about the …
Overview The cost of a breach is always an estimate. Even after a breach occurs, the actual cost of the breach may never be accurately determined. On top of the …
Post-breach activity doesn’t stop once the configuration vulnerabilities that were leveraged to perform the intrusion are remediated. An increasing amount of legislation and regulation dictates that organizations must inform certain …
The processes that an organization should follow when maintaining an information security posture are like those outlined in the Blue Team Kill Chain section of the previous module. These processes …
Overview Organizations should not approach information security in an ad-hoc manner. One way of ensuring that an organization’s approach to information security is deliberate and planned is to document rules …
Change tracking and auditing Change tracking and auditing allow you to determine who modified a document, when the document was modified, and what modifications were made to the document. Implementing …
As part of an organization’s approach to preparing and maintaining an effective information security posture, it is necessary to determine which information needs to be protected and the level of …