CPIT1 Embarking on the Journey The Universe and Fundamentals of Cybersecurity
Автор: MyKCAT
Загружено: 2025-12-15
Просмотров: 11
SecureKCON is a learning series designed to make cybersecurity understandable, practical, and relevant—whether you’re a student, professional, business owner, or simply someone who uses the internet every day.
This playlist kicks off with Episode 1: The Universe and Fundamentals of Cybersecurity, where we lay the foundation. Instead of jumping straight into tools or hacks, this session explains how cybersecurity actually works as a system: people, processes, technology, risks, and real-world threats.
In this episode, you’ll learn:
What cybersecurity really means (beyond buzzwords)
The CIA Triad—Confidentiality, Integrity, and Availability—and why it matters in everyday life
Who the real threat actors are and how they think
Common cyberattacks explained in plain language (phishing, malware, DDoS, social engineering)
How organizations manage cyber risk instead of trying to eliminate it
The core pillars of cybersecurity: People, Process, and Technology
Basic protections that apply to schools, small businesses, LGUs, and households
SecureKCON is part of an ongoing effort to build cyber awareness, digital resilience, and informed communities. Each episode builds on the previous one, so this playlist is the best place to start your journey.
📌 New episodes added regularly
📌 Designed for beginners, but structured like real-world cybersecurity
📌 Educational content—no hacking tutorials, no fear-mongering
👉 Subscribe and follow the playlist to grow your cyber literacy step by step.
00:00 Start of Broadcast & Waiting
06:13 Opening Remarks & Certificate Instructions
08:46 Message from USAID Beacon (John Garrity)
12:34 Message from USAID OEDG (Eric Florimon-Reed)
19:43 Message from DICT Cybersecurity Bureau (Dir. Jose Carlos Reyes)
31:33 LECTURE START: Fundamentals of Cybersecurity
34:42 Defining Cybersecurity & The CIA Triad
48:40 The Universe of Cybersecurity: Domains & Certifications
1:11:02 Threat Actors: Who are the enemies?
1:22:18 Common Cyber Attack Tactics (DoS, MitM, Social Engineering)
1:31:54 Demo: How Social Engineering Works
1:43:37 Malware Types (Ransomware, Trojans, Rootkits)
1:48:05 Risk Management: Probability vs. Impact
2:05:53 The 3 Pillars: People, Process, Technology
2:20:54 Protection: Frameworks (NIST) & Best Practices
2:29:36 Encryption & Data Security
2:39:39 User vs. Privileged Account Management
2:54:59 Vulnerability Assessment vs. Penetration Testing
3:13:23 Career Paths in Cybersecurity
3:37:21 Q&A Session
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: