diff --git a/README.md b/README.md index 6c511ed..a4007b3 100644 --- a/README.md +++ b/README.md @@ -1,20 +1,24 @@ # Cybersecurity for Beginners – a curriculum +> View these instructions in [Spanish](/translations/es/README.md) + This course is designed to teach you fundamental cyber security concepts to kick-start your security learning. It is vendor agnostic and is divided into small lessons that should take around 30-60 mins to complete. Each lesson has a small quiz and links to further reading if you want to dive into the topic a bit more. ![Cybersecurity for Beginners](images/banner.jpg) -What this course covers: -- Basic cyber security concepts such as the CIA triad, the differences between risks, threats, etc, -- Understanding what a security control is and what forms they take. -- Understanding what zero trust is and why this is important in modern cyber security. -- Understanding key concepts and themes across identity, networking, security operations, infrastructure and data security. -- Giving some examples of tools used to implement security controls. +What this course covers 📚 + +- 🔐 Basic cyber security concepts such as the CIA triad, the differences between risks, threats, etc, +- 🛡️ Understanding what a security control is and what forms they take. +- 🌐 Understanding what zero trust is and why this is important in modern cyber security. +- 🔑 Understanding key concepts and themes across identity, networking, security operations, infrastructure and data security. +- 🔧 Giving some examples of tools used to implement security controls. + +What this course does not cover 🙅♂️ -What this course does not cover: -- How to use specific security tools. -- How to "hack" or do red teaming/offensive security. -- Learning about specific compliance standards. +- 🚫 How to use specific security tools. +- 🚫 How to "hack" or do red teaming/offensive security. +- 🚫 Learning about specific compliance standards. [![Watch the video](images/intro_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=a0fe1cef-c064-4d59-97a9-e89e12a99b4d) @@ -22,6 +26,7 @@ When you have finished this course, you can move onto some of our Microsoft Lear If you have any feedback or suggestions on this course and any content we're missing, we'd love to hear from you! +## Modules Overview 📝 | **Module number** | **Module name** | **Concepts taught** | **Learning objectives** | |-------------------|-------------------------------------------|--------------------------------------|-----------------------------------------------------------------------------------------------------------------| | **1.1** | Basic security concepts | [The CIA triad](https://github.com/microsoft/Security-101/blob/main/1.1%20The%20CIA%20triad%20and%20other%20key%20concepts.md) | Learn about confidentiality, availability and integrity. Also authenticity and also nonrepudiation and privacy. | @@ -53,6 +58,10 @@ If you have any feedback or suggestions on this course and any content we're mis | **7.2** | Data security fundamentals | [Data security capabilities](https://github.com/microsoft/Security-101/blob/main/7.2%20Data%20security%20capabilities.md) | Learn about data security tooling – DLP, inside risk management, data governance, etc. | | **7.3** | [End of module quiz](https://github.com/microsoft/Security-101/blob/main/7.3%20End%20of%20module%20quiz.md) | +## 🌐 Help Wanted! + +Would you like to contribute a translation? Please read our [translation guidelines](https://github.com/microsoft/Security-101). + ## 🎒 Other Courses Our team produces other courses! Check out: diff --git a/1.1 The CIA triad and other key concepts.md b/modules/1-BasicSecurityConcepts/1.1 The CIA triad and other key concepts.md similarity index 96% rename from 1.1 The CIA triad and other key concepts.md rename to modules/1-BasicSecurityConcepts/1.1 The CIA triad and other key concepts.md index cee5658..736fdbf 100644 --- a/1.1 The CIA triad and other key concepts.md +++ b/modules/1-BasicSecurityConcepts/1.1 The CIA triad and other key concepts.md @@ -1,6 +1,6 @@ # The CIA triad and other key concepts -[![Watch the video](images/1-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=d4c2f633-fa6a-4a3d-8d41-7a1d71189832) +[![Watch the video](../../images/1-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=d4c2f633-fa6a-4a3d-8d41-7a1d71189832) ## Introduction diff --git a/1.2 Common cybersecurity threats.md b/modules/1-BasicSecurityConcepts/1.2 Common cybersecurity threats.md similarity index 98% rename from 1.2 Common cybersecurity threats.md rename to modules/1-BasicSecurityConcepts/1.2 Common cybersecurity threats.md index 07027e3..35affab 100644 --- a/1.2 Common cybersecurity threats.md +++ b/modules/1-BasicSecurityConcepts/1.2 Common cybersecurity threats.md @@ -1,6 +1,6 @@ # Common cybersecurity threats -[![Watch the video](images/1-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=12bdcffa-12b7-44ef-b44d-882602ca7a38) +[![Watch the video](../../images/1-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=12bdcffa-12b7-44ef-b44d-882602ca7a38) ## Introduction diff --git a/1.3 Understanding risk management.md b/modules/1-BasicSecurityConcepts/1.3 Understanding risk management.md similarity index 98% rename from 1.3 Understanding risk management.md rename to modules/1-BasicSecurityConcepts/1.3 Understanding risk management.md index 0e1959d..e92c38b 100644 --- a/1.3 Understanding risk management.md +++ b/modules/1-BasicSecurityConcepts/1.3 Understanding risk management.md @@ -1,6 +1,6 @@ # Understanding risk management -[![Watch the video](images/1-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=e8efc6f3-eab3-421b-aec7-dcc0244bd8f1) +[![Watch the video](../../images/1-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=e8efc6f3-eab3-421b-aec7-dcc0244bd8f1) ## Introduction diff --git a/1.4 Security practices and documentation.md b/modules/1-BasicSecurityConcepts/1.4 Security practices and documentation.md similarity index 97% rename from 1.4 Security practices and documentation.md rename to modules/1-BasicSecurityConcepts/1.4 Security practices and documentation.md index b922152..1dbb846 100644 --- a/1.4 Security practices and documentation.md +++ b/modules/1-BasicSecurityConcepts/1.4 Security practices and documentation.md @@ -2,7 +2,7 @@ You may have heard the phrases “security policy”, “security standard”, etc. used before, but the reality is that many cybersecurity professionals don’t use them properly, so in this section we will explain what each of these phrases mean and why an organization would utilize these. -[![Watch the video](images/1-4_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=fb8667f3-a627-495a-9fa1-6a7aa9dcf07e) +[![Watch the video](../../images/1-4_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=fb8667f3-a627-495a-9fa1-6a7aa9dcf07e) ## Introduction diff --git a/1.5 Zero trust.md b/modules/1-BasicSecurityConcepts/1.5 Zero trust.md similarity index 97% rename from 1.5 Zero trust.md rename to modules/1-BasicSecurityConcepts/1.5 Zero trust.md index 3a71b9c..0cdcc1b 100644 --- a/1.5 Zero trust.md +++ b/modules/1-BasicSecurityConcepts/1.5 Zero trust.md @@ -2,7 +2,7 @@ “Zero trust” is a phrase that is used a lot in security circles nowadays. But what does it mean, is it just a buzzword? In this lesson, we’ll dive into exactly what zero trust is. -[![Watch the video](images/1-5_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=ee1551cc-e7a5-4db6-a897-c286abe68a69) +[![Watch the video](../../images/1-5_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=ee1551cc-e7a5-4db6-a897-c286abe68a69) ## Introduction diff --git a/1.6 Shared responsibility model.md b/modules/1-BasicSecurityConcepts/1.6 Shared responsibility model.md similarity index 97% rename from 1.6 Shared responsibility model.md rename to modules/1-BasicSecurityConcepts/1.6 Shared responsibility model.md index 19e5fb7..b446d0c 100644 --- a/1.6 Shared responsibility model.md +++ b/modules/1-BasicSecurityConcepts/1.6 Shared responsibility model.md @@ -2,7 +2,7 @@ Shared responsibility is a newer concept in IT that came into being with the advent of cloud computing. From a cybersecurity perspective, it is critical to understand who is providing which security controls so that there are no gaps in defense. -[![Watch the video](images/1-6_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=20bf114b-e90d-428e-ae62-81aa9e9a7175) +[![Watch the video](../../images/1-6_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=20bf114b-e90d-428e-ae62-81aa9e9a7175) ## Introduction diff --git a/1.7 End of module quiz.md b/modules/1-BasicSecurityConcepts/1.7 End of module quiz.md similarity index 100% rename from 1.7 End of module quiz.md rename to modules/1-BasicSecurityConcepts/1.7 End of module quiz.md diff --git a/2.1 IAM key concepts.md b/modules/2-IdentityAccessManagementFundamentals/2.1 IAM key concepts.md similarity index 98% rename from 2.1 IAM key concepts.md rename to modules/2-IdentityAccessManagementFundamentals/2.1 IAM key concepts.md index 585af55..c799fae 100644 --- a/2.1 IAM key concepts.md +++ b/modules/2-IdentityAccessManagementFundamentals/2.1 IAM key concepts.md @@ -2,7 +2,7 @@ Have you ever logged into a computer or a website? Of course you have! That means you’ve already used identity controls in your day-to-day life. Identity and access management (IAM) is a key pillar of security, we’ll learn more about it in the next few lessons. -[![Watch the video](images/2-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=3d2a9cb5-e25a-4b25-9e5a-b3fee2360f24) +[![Watch the video](../../images/2-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=3d2a9cb5-e25a-4b25-9e5a-b3fee2360f24) **Introduction** diff --git a/2.2 IAM zero trust architecture.md b/modules/2-IdentityAccessManagementFundamentals/2.2 IAM zero trust architecture.md similarity index 97% rename from 2.2 IAM zero trust architecture.md rename to modules/2-IdentityAccessManagementFundamentals/2.2 IAM zero trust architecture.md index 404f469..eec1b29 100644 --- a/2.2 IAM zero trust architecture.md +++ b/modules/2-IdentityAccessManagementFundamentals/2.2 IAM zero trust architecture.md @@ -2,7 +2,7 @@ Identity is a key part of implementing a zero trust architecture and building a perimeter for any IT environment. In this section we’ll explore why it’s important to use identity controls to implement zero trust. -[![Watch the video](images/2-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=69fb20f6-0f81-4660-b6cd-dcd75d34bd98) +[![Watch the video](../../images/2-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=69fb20f6-0f81-4660-b6cd-dcd75d34bd98) ## Introduction diff --git a/2.3 IAM capabilities.md b/modules/2-IdentityAccessManagementFundamentals/2.3 IAM capabilities.md similarity index 97% rename from 2.3 IAM capabilities.md rename to modules/2-IdentityAccessManagementFundamentals/2.3 IAM capabilities.md index db76668..3b998e1 100644 --- a/2.3 IAM capabilities.md +++ b/modules/2-IdentityAccessManagementFundamentals/2.3 IAM capabilities.md @@ -2,7 +2,7 @@ In this section, we’ll cover more details about the core tools and capabilities that are used in identity security. -[![Watch the video](images/2-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=330158a0-95ef-434b-b308-6fc41eab4bd5) +[![Watch the video](../../images/2-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=330158a0-95ef-434b-b308-6fc41eab4bd5) ## Introduction diff --git a/2.4 End of module quiz.md b/modules/2-IdentityAccessManagementFundamentals/2.4 End of module quiz.md similarity index 100% rename from 2.4 End of module quiz.md rename to modules/2-IdentityAccessManagementFundamentals/2.4 End of module quiz.md diff --git a/3.1 Networking key concepts.md b/modules/3-NetworkSecurityFundamentals/3.1 Networking key concepts.md similarity index 97% rename from 3.1 Networking key concepts.md rename to modules/3-NetworkSecurityFundamentals/3.1 Networking key concepts.md index ede617c..b5ba969 100644 --- a/3.1 Networking key concepts.md +++ b/modules/3-NetworkSecurityFundamentals/3.1 Networking key concepts.md @@ -1,6 +1,6 @@ # Networking key concepts -[![Watch the video](images/3-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=1d8606a8-8357-4dae-8b8f-0a13c3fddd7a) +[![Watch the video](../../images/3-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=1d8606a8-8357-4dae-8b8f-0a13c3fddd7a) If you have done any work in IT, it’s likely that you’ve been exposed to networking concepts. Although we use identity as our primary perimeter control in modern environments, this doesn’t mean that network controls are redundant. Although this is a huge topic, in this lesson we will cover some key networking concepts. diff --git a/3.2 Networking zero trust architecture.md b/modules/3-NetworkSecurityFundamentals/3.2 Networking zero trust architecture.md similarity index 98% rename from 3.2 Networking zero trust architecture.md rename to modules/3-NetworkSecurityFundamentals/3.2 Networking zero trust architecture.md index e519a32..7ef40d6 100644 --- a/3.2 Networking zero trust architecture.md +++ b/modules/3-NetworkSecurityFundamentals/3.2 Networking zero trust architecture.md @@ -1,6 +1,6 @@ # Networking zero trust architectures -[![Watch the video](images/3-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=9f425fdb-1c53-4e67-b550-68bdac35df45) +[![Watch the video](../../images/3-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=9f425fdb-1c53-4e67-b550-68bdac35df45) The network provides a crucial layer in zero trust controls, in this lesson we will learn more about this: diff --git a/3.3 Network security capabilities.md b/modules/3-NetworkSecurityFundamentals/3.3 Network security capabilities.md similarity index 97% rename from 3.3 Network security capabilities.md rename to modules/3-NetworkSecurityFundamentals/3.3 Network security capabilities.md index ea9bbe1..6778a50 100644 --- a/3.3 Network security capabilities.md +++ b/modules/3-NetworkSecurityFundamentals/3.3 Network security capabilities.md @@ -1,6 +1,6 @@ # Network security capabilities -[![Watch the video](images/3-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=b2a4a548-d129-4add-ba68-eca416ec65bc) +[![Watch the video](../../images/3-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=b2a4a548-d129-4add-ba68-eca416ec65bc) In this lesson we’ll learn about the following capabilities that can be used to secure a network: diff --git a/3.4 End of module quiz.md b/modules/3-NetworkSecurityFundamentals/3.4 End of module quiz.md similarity index 100% rename from 3.4 End of module quiz.md rename to modules/3-NetworkSecurityFundamentals/3.4 End of module quiz.md diff --git a/4.1 SecOps key concepts.md b/modules/4-SecurityOperationsFundamentals/4.1 SecOps key concepts.md similarity index 96% rename from 4.1 SecOps key concepts.md rename to modules/4-SecurityOperationsFundamentals/4.1 SecOps key concepts.md index e431032..2299287 100644 --- a/4.1 SecOps key concepts.md +++ b/modules/4-SecurityOperationsFundamentals/4.1 SecOps key concepts.md @@ -1,6 +1,6 @@ # Security operations key concepts -[![Watch the video](images/4-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=6a1cf511-89e0-493a-8ef9-91c458200266) +[![Watch the video](../../images/4-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=6a1cf511-89e0-493a-8ef9-91c458200266) Security operations are a critical component of an organization’s overall security function. In this lesson, we’ll learn more about this: diff --git a/4.2 SecOps zero trust architecture.md b/modules/4-SecurityOperationsFundamentals/4.2 SecOps zero trust architecture.md similarity index 96% rename from 4.2 SecOps zero trust architecture.md rename to modules/4-SecurityOperationsFundamentals/4.2 SecOps zero trust architecture.md index dc3d8aa..606aa3d 100644 --- a/4.2 SecOps zero trust architecture.md +++ b/modules/4-SecurityOperationsFundamentals/4.2 SecOps zero trust architecture.md @@ -1,6 +1,6 @@ # SecOps zero trust architecture -[![Watch the video](images/4-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=8a2c36d9-8117-4576-ad5b-787667d13603) +[![Watch the video](../../images/4-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=8a2c36d9-8117-4576-ad5b-787667d13603) Security operations forms two parts of zero trust architecture and in this lesson we will learn about both: diff --git a/4.3 SecOps capabilities.md b/modules/4-SecurityOperationsFundamentals/4.3 SecOps capabilities.md similarity index 97% rename from 4.3 SecOps capabilities.md rename to modules/4-SecurityOperationsFundamentals/4.3 SecOps capabilities.md index 31ce5df..cb5b514 100644 --- a/4.3 SecOps capabilities.md +++ b/modules/4-SecurityOperationsFundamentals/4.3 SecOps capabilities.md @@ -1,6 +1,6 @@ # SecOps capabilities -[![Watch the video](images/4-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=bdbc1c7c-307b-4519-b8ad-b142434c0461) +[![Watch the video](../../images/4-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=bdbc1c7c-307b-4519-b8ad-b142434c0461) In this section, we’ll cover more details about the core tools and capabilities that can be used in security operations. diff --git a/4.4 End of module quiz.md b/modules/4-SecurityOperationsFundamentals/4.4 End of module quiz.md similarity index 100% rename from 4.4 End of module quiz.md rename to modules/4-SecurityOperationsFundamentals/4.4 End of module quiz.md diff --git a/5.1 AppSec key concepts.md b/modules/5-ApplicationSecurityFundamentals/5.1 AppSec key concepts.md similarity index 95% rename from 5.1 AppSec key concepts.md rename to modules/5-ApplicationSecurityFundamentals/5.1 AppSec key concepts.md index 1d0d38e..817b707 100644 --- a/5.1 AppSec key concepts.md +++ b/modules/5-ApplicationSecurityFundamentals/5.1 AppSec key concepts.md @@ -2,7 +2,7 @@ Application security is a security specialization in it’s own right. In this part of the course we will look more into application security. -[![Watch the video](images/5-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=d81dc210-ee8a-445a-aee0-aaf8a2b37af2) +[![Watch the video](../../images/5-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=d81dc210-ee8a-445a-aee0-aaf8a2b37af2) ## Introduction diff --git a/5.2 AppSec key capabilities.md b/modules/5-ApplicationSecurityFundamentals/5.2 AppSec key capabilities.md similarity index 96% rename from 5.2 AppSec key capabilities.md rename to modules/5-ApplicationSecurityFundamentals/5.2 AppSec key capabilities.md index 1b2752f..ab0f530 100644 --- a/5.2 AppSec key capabilities.md +++ b/modules/5-ApplicationSecurityFundamentals/5.2 AppSec key capabilities.md @@ -4,7 +4,7 @@ In this section, we’ll cover more details about the core tools and capabilitie In this lesson, we’ll cover what the key capabilities and tools that are used in application security are. -[![Watch the video](images/5-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=b562daa7-ab92-4cf4-a6dd-6b6a506edfac) +[![Watch the video](../../images/5-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=b562daa7-ab92-4cf4-a6dd-6b6a506edfac) ## AppSec key capabilities and tools diff --git a/5.3 End of module quiz.md b/modules/5-ApplicationSecurityFundamentals/5.3 End of module quiz.md similarity index 100% rename from 5.3 End of module quiz.md rename to modules/5-ApplicationSecurityFundamentals/5.3 End of module quiz.md diff --git a/6.1 Infrastructure security key concepts.md b/modules/6-InfrastructureSecurityFundamentals/6.1 Infrastructure security key concepts.md similarity index 98% rename from 6.1 Infrastructure security key concepts.md rename to modules/6-InfrastructureSecurityFundamentals/6.1 Infrastructure security key concepts.md index 4b276f9..617fa3d 100644 --- a/6.1 Infrastructure security key concepts.md +++ b/modules/6-InfrastructureSecurityFundamentals/6.1 Infrastructure security key concepts.md @@ -1,6 +1,6 @@ # Infrastructure security key concepts -[![Watch the video](images/6-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=729d969e-c8ce-4889-aaa0-e5d92658ed62) +[![Watch the video](../../images/6-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=729d969e-c8ce-4889-aaa0-e5d92658ed62) “Infrastructure” refers to the building blocks of any IT environment which includes servers, cloud services and containers – a huge swathe of different technologies. The applications that were discussed in the prior section run on infrastructure, so it can also be targeted by attackers. diff --git a/6.2 Infrastructure security capabilities.md b/modules/6-InfrastructureSecurityFundamentals/6.2 Infrastructure security capabilities.md similarity index 97% rename from 6.2 Infrastructure security capabilities.md rename to modules/6-InfrastructureSecurityFundamentals/6.2 Infrastructure security capabilities.md index a4e12c3..1abd778 100644 --- a/6.2 Infrastructure security capabilities.md +++ b/modules/6-InfrastructureSecurityFundamentals/6.2 Infrastructure security capabilities.md @@ -2,7 +2,7 @@ In this section, we’ll cover more details about the core tools and capabilities that are used in infrastructure security. -[![Watch the video](images/6-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=cc87bbae-0fea-4899-9f09-868724719b96) +[![Watch the video](../../images/6-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=cc87bbae-0fea-4899-9f09-868724719b96) **Introduction** diff --git a/6.3 End of module quiz.md b/modules/6-InfrastructureSecurityFundamentals/6.3 End of module quiz.md similarity index 100% rename from 6.3 End of module quiz.md rename to modules/6-InfrastructureSecurityFundamentals/6.3 End of module quiz.md diff --git a/7.1 Data security key concepts.md b/modules/7-DataSecurityFundamentals/7.1 Data security key concepts.md similarity index 97% rename from 7.1 Data security key concepts.md rename to modules/7-DataSecurityFundamentals/7.1 Data security key concepts.md index ff0719a..4d8a4db 100644 --- a/7.1 Data security key concepts.md +++ b/modules/7-DataSecurityFundamentals/7.1 Data security key concepts.md @@ -12,7 +12,7 @@ We’ve alluded to data security and touched on it several times in this course. - Why is data security important for an organization? -[![Watch the video](images/7-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=ace39247-1690-45fb-8f99-985abcb8e423) +[![Watch the video](../../images/7-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=ace39247-1690-45fb-8f99-985abcb8e423) ## What is data security? diff --git a/7.2 Data security capabilities.md b/modules/7-DataSecurityFundamentals/7.2 Data security capabilities.md similarity index 95% rename from 7.2 Data security capabilities.md rename to modules/7-DataSecurityFundamentals/7.2 Data security capabilities.md index 31a541b..bb3a4c9 100644 --- a/7.2 Data security capabilities.md +++ b/modules/7-DataSecurityFundamentals/7.2 Data security capabilities.md @@ -2,7 +2,7 @@ In this section, we’ll cover more details about the core tools and capabilities that are used in data security: -[![Watch the video](images/7-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=0c9fff7c-e17c-4a14-ac3b-69b5a5786f55) +[![Watch the video](../../images/7-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=0c9fff7c-e17c-4a14-ac3b-69b5a5786f55) **Introduction** diff --git a/7.3 End of module quiz.md b/modules/7-DataSecurityFundamentals/7.3 End of module quiz.md similarity index 100% rename from 7.3 End of module quiz.md rename to modules/7-DataSecurityFundamentals/7.3 End of module quiz.md diff --git a/translations/README.md b/translations/README.md new file mode 100644 index 0000000..4b446f9 --- /dev/null +++ b/translations/README.md @@ -0,0 +1,2 @@ +In this folder, you can find translations of this repository in their appropriately-named folders. +- [Español](https://github.com/microsoft/AI-For-Beginners/) \ No newline at end of file diff --git a/translations/es/README.md b/translations/es/README.md new file mode 100644 index 0000000..795b8f0 --- /dev/null +++ b/translations/es/README.md @@ -0,0 +1,176 @@ +# Ciberseguridad para Principiantes - Plan de Estudios + +> Puede consultar las instrucciones en [Ingles](../../README.md) + +Este curso está diseñado para enseñarle conceptos fundamentales de ciberseguridad para poner en marcha su aprendizaje de seguridad. Es un curso elaborado de forma independiente al proveedor y está dividido en pequeñas lecciones que te llevarán entre 30 y 60 minutos. Cada lección incluye un pequeño cuestionario y enlaces a lecturas adicionales por si quieres profundizar un poco más en el tema. + +![Ciberseguridad para Principiantes](../../images/banner.jpg) + +El curso abarca los siguientes temas: +- Conceptos básicos de ciberseguridad, como la CIA triad, las diferencias entre risks, threats, etc, +- Comprensión de qué es un control de seguridad y qué formas adoptan. +- Comprensión de qué es la confianza cero (zero trust) y por qué es importante en la ciberseguridad moderna. +- Comprensión de los conceptos y temas clave en materia de identidad (across identity), redes, operaciones de seguridad, infraestructura y seguridad de los datos. +- Dar algunos ejemplos de herramientas utilizadas para aplicar controles de seguridad. + +El presente curso no abarca: +- Como hacer uso de herramientas especificas de seguridad +- Cómo "hackear" o hacer red teaming/offensive security. +- Conocer los estandares especificos de cumplimiento (specific compliance standards). + +[![Mira el video](../../images/intro_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=a0fe1cef-c064-4d59-97a9-e89e12a99b4d) + +Cuando hayas terminado este curso, podrás pasar a alguno de nuestros módulos de Microsoft Learn. Le recomendamos que continúe su aprendizaje con [Microsoft Security, Compliance, and Identity Fundamentals.](https://learn.microsoft.com/en-us/training/paths/describe-concepts-of-security-compliance-identity/?WT.mc_id=academic-96948-sayoung) Finalmente, podría considerar la posibilidad de tomar el [Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals exam.](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-900/?WT.mc_id=academic-96948-sayoung) + +Si tienes cualquier sugerencia o feedback acerca del curso o consideras algun contenido faltante, ¡Estaremos encantados de escucharte! + +
No | Lección | Objetivos de Aprendizaje |
Module 1: Conceptos básicos de seguridad | ||
1.1 | The CIA triad | Learn about confidentiality, availability and integrity. Also authenticity and also nonrepudiation and privacy. |
1.2 | Common cyber security threats | Learn about the common cyber security threats facing individuals and organizations. |
1.3 | +Understanding risk management | +Learn about assessing and understanding risk – impact/likelihood and implementing controls. | +
1.4 | +Security practices and documentation | +Learn about the difference between policies, procedures, standards, and regulations/laws. | +
1.5 | +The shared responsibility model | +What is the shared responsibility model and how does it affect cybersecurity? | +
1.6 | +Zero trust | +Learn about what is zero trust and how does it affect architecture? What is defense in depth? | +
1.7 | +End of module quiz | +|
Module 2: Identity & access management fundamentals | 2.1 | +IAM key concepts | +Learn about the principle of least privilege, segregation of duties, how IAM supports zero trust. | + +
2.1 | +IAM zero trust architecture | +Learn about how identity is the new perimeter for modern IT environments and the threats it mitigates. | +
2.3 | +IAM capabilities | +Learn about IAM capabilities and controls to secure identities | +
2.4 | +End of module quiz | +|
Module 3: Network security fundamentals | ||
3.1 | +Networking key concepts | +Learn about networking concepts (IP addressing, port numbers, encryption, etc.) | +
3.2 | +Networking zero trust architecture | +Learn about how networking contributes to an E2E ZT architecture and the threats it mitigates. | +
3.3 | +Network security capabilities | +Learn about network security tooling – firewalls, WAF, DDoS protection, etc. | +
3.4 | +End of module quiz | +|
Module 4: Security operations fundamentals | ||
4.1 | +SecOps key concepts | +Learn about why security operations are important and how it differs from normal IT ops teams. | +
4.2 | +SecOps zero trust architecture | +Learn about how SecOps contributes to an E2E ZT architecture and the threats it mitigates. | +
4.3 | +SecOps capabilities | +Learn about SecOps tooling – SIEM, XDR, etc. | +
4.4 | +End of module quiz | +|
Module 5: Application security fundamentals | ||
5.1 | +AppSec key concepts | +Learn about AppSec concepts such as secure by design, input validation, etc. | +
5.2 | +AppSec capabilities | +Learn about AppSec tooling: pipeline security tools, code scanning, secret scanning, etc. | +
5.3 | +End of module quiz | +|
Module 6: Infrastructure security fundamentals | ||
6.1 | +Infrastructure security key concepts | +Learn about hardening systems, patching, security hygiene, container security. | +
6.2 | +Infrastructure security capabilities | +Learn about tooling that can assist with infrastructure security e.g. CSPM, container security, etc. | +
6.3 | +End of module quiz | +|
Module 7: Data security fundamentals | ||
7.1 | +Data security key concepts | +Learn about data classification and retention and why this is important to an organization. | +
7.2 | +Data security capabilities | +Learn about data security tooling – DLP, inside risk management, data governance, etc. | +
7.3 | +End of module quiz | +