CYS401 · Chapters
CYS401 Chapters
Cybersecurity notes covering foundations, threat modeling, asset protection, cryptography, PKI, secure design, vulnerabilities, ICS/SCADA security, and access control.
Open The Resources¶
Ch 1 - Introduction to Cyber SecurityOpen resource
Ch 2 - Foundations & PrinciplesOpen resource
Ch 3 - Threat ModelingOpen resource
Ch 4 - Protection of Information AssetsOpen resource
Ch 5 - CryptographyOpen resource
Ch 6 - Asymmetric Cryptography & PKIOpen resource
Ch 7 - Principles of Security Design, Models, & CapabilitiesOpen resource
Ch 8 - Security Vulnerabilities, Threats, & CountermeasuresOpen resource
Ch 9 - ICS/SCADA System SecurityOpen resource
Ch 10 - Authentication & Access ControlOpen resource
Study Path¶
Start with security foundations.
Review threat modeling and asset protection.
Study cryptography and PKI.
Finish with secure design principles, system vulnerabilities, ICS/SCADA security, and access control.
Study note: Keep definitions precise: many cybersecurity questions hinge on exact wording.