Skip main navigation

Assume Compromise Philosophy

In the best of all worlds, our organization’s information systems are in a pristine state when we start implementing security controls. In this model, intrusions are something that exists as …

Increasing Regulation

A final aspect of the cybersecurity landscape that is worthy of attention isn’t strictly technology-related but instead relates to regulation and legislation. For many years the information technology industry was …

Monetization of malware

A big change in the recent cybersecurity landscape is coin mining software. Coin minding software is software that mines cryptocurrency, such as Monero, Bitcoin, or Ethereum. This is a big …

Cybersecurity Landscape Overview

The current cybersecurity landscape is complex. Attackers develop new and ingenious methods of compromising systems on a daily basis. Intrusion tools, originally developed by the intelligence agencies of nation-states, have …

Course Syllabus

Thank you for telling us a little bit about yourself. We hope this course will be an enjoyable learning journey for you. This course is designed to help you learn …

Breach Factors

Breach investigation After the attacker has been successfully ejected from the organization’s information systems, an organization should perform a thorough investigation to determine as much as it can about the …

Cost of a breach

Overview The cost of a breach is always an estimate. Even after a breach occurs, the actual cost of the breach may never be accurately determined. On top of the …

Disclosure Responsibility

Post-breach activity doesn’t stop once the configuration vulnerabilities that were leveraged to perform the intrusion are remediated. An increasing amount of legislation and regulation dictates that organizations must inform certain …

Processes

The processes that an organization should follow when maintaining an information security posture are like those outlined in the Blue Team Kill Chain section of the previous module. These processes …

Developing and Maintaining Policies

Overview Organizations should not approach information security in an ad-hoc manner. One way of ensuring that an organization’s approach to information security is deliberate and planned is to document rules …

Audit and Monitor

Change tracking and auditing Change tracking and auditing allow you to determine who modified a document, when the document was modified, and what modifications were made to the document. Implementing …

Information Classification

As part of an organization’s approach to preparing and maintaining an effective information security posture, it is necessary to determine which information needs to be protected and the level of …