This tutorial introduction to cybersecurity explains many of the common terms and concepts in the field, particularly as they pertain to the U.S. Government. It has three major parts: Part 1, Cybersecurity Overview, provides a general introduction to cybersecurity, and introduces many of the basic terms pertaining to attack and defense. You’ve come to the right place if you’ve wondered about things such as spear phishing, malware, advanced persistent threats (APT), buffer overflows, stateful firewalls, intrusion detection and prevention systems (IDPS), etc. The goal of Part 1 is to make you feel comfortable with how the pieces fit and the general topic of cybersecurity. (Jump to video of abbreviated presentation of Part 1.)
Because of the prominent role of the U.S. Government (Government) in cybersecurity and its formalization, Part 2, Cybersecurity and the U.S. Government, deals with items associated with this body. You will become acquainted with organizations such as US-CERT and commonly encountered terms and references such as FISMA, FIPS, NIST SP 800-53, TIC 2.0, MTIPS, Einstein, etc. We have had good feedback on the overview of NIST SP 800-53 and how it is applied. (Video of abbreviated presentation of Part 2.) In Part 3, Cybersecurity and the U.S. Department of Defense, we look at cybersecurity elements pertaining to the U.S. Department of Defense (DoD), focusing on the new Risk Management Framework for DoD IT (RMF for DoD IT) and the associated changes to DoD cybersecurity as it comes more into alignment with other Government cybersecurity initiatives and standards. More broadly speaking, DoD IT systems are encompassed within and subject to requirements for National Security Systems (NSS). Corresponding to Part 2’s thorough treatment of NIST SP 800-53, Part 3 addresses the use of CNSSI 1253 in a well organized manner. (Video of abbreviated presentation of Part 3.)
Would your company benefit from private labeling this cybersecurity overview tutorial or a variant of it more suitable to your product or service? If your company is in the cybersecurity field, such content can be part of an effective marketing program. Contact us if you’re interested.
Video and text: Some things are conveyed well in video so the video presentations can be a good place to start. The text (Part 1, Part 2, Part 3) provides a more expansive treatment of the material, including links to many standards and descriptions, and is tuned and updated frequently.
Video Presentation of Part 1, Cybersecurity Overview (in parts A and B) – watch in HD