Introduction
Today, internet-connected services are everywhere, and as a result, so are threats from spammers, hackers, and cybercriminals. Understanding the basics of cybersecurity is the first step toward preparing for the fundamentals-level security, compliance, and identity course as well as preventing malicious attacks.
Learning objectives
Upon completion of this module, you'll be able to:
- Define cybersecurity and cybercriminals
- Explain how to defend against cyberattacks
- Describe the principles of Zero Trust
- Explain types of attacks, attack vectors, and the threat landscape
- Identify mitigation strategies
Resources
- CIA triad diagram (Microsoft Learn)
- Zero trust principles graphic (Microsoft Learn)
- Hashing diagram (Microsoft Learn)
- Symmetric and asymmetric encryption diagram (Microsoft Learn)
- Examine ransomware and extortion-based threats (Microsoft Learn)
- Prepare to teach SC-900 Microsoft Security, Compliance, and Identity Fundamentals in academic programs (Microsoft Learn)