Cybersecurity Fundamentals

Author: Dr. Jim Marquardson (jimarqua@nmu.edu)

This page links to the content for NMU's IS 116 Cybersecurity Foundations course content.

Table of Contents

Introduction to Cybersecurity

Cybersecurity will be important as long as people use technology. This section introduces key cybersecurity concepts and provides guidelines for ethical cybersecurity behavior.

Cyber Hygiene

Follow these key principles and you will protect yourself from the vast majority of cyber threats.

Networking and Cloud Computing

Cybersecurity relies on secure networks. We must know how networks work before we can secure them.

Windows Operating System

The Windows operating system dominates corporate environments.

Linux Operating System

Billions of computers, smartphones, and other devices run Linux.

Cryptography

Cryptography protects the confidentiality and integrity of your data. Privacy and modern commerce would be impossible without cryptography.

Python

Python is the most popular programming language for cybersecurity experts. But you can also use Python for developing websites, data analytics, game development, and more.

Threats

We face many threats. Threats often combine technical and social methods to cause us harm.

Management Tools

Cybersecurity is a process driven by people. People must follow best practices and be intentional about cybersecurity efforts.

Glossary