Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add translation help section #5

Open
wants to merge 14 commits into
base: main
Choose a base branch
from
29 changes: 19 additions & 10 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,27 +1,32 @@
# Cybersecurity for Beginners – a curriculum

> View these instructions in [Spanish](/translations/es/README.md)

This course is designed to teach you fundamental cyber security concepts to kick-start your security learning. It is vendor agnostic and is divided into small lessons that should take around 30-60 mins to complete. Each lesson has a small quiz and links to further reading if you want to dive into the topic a bit more.

![Cybersecurity for Beginners](images/banner.jpg)

What this course covers:
- Basic cyber security concepts such as the CIA triad, the differences between risks, threats, etc,
- Understanding what a security control is and what forms they take.
- Understanding what zero trust is and why this is important in modern cyber security.
- Understanding key concepts and themes across identity, networking, security operations, infrastructure and data security.
- Giving some examples of tools used to implement security controls.
What this course covers 📚

- 🔐 Basic cyber security concepts such as the CIA triad, the differences between risks, threats, etc,
- 🛡️ Understanding what a security control is and what forms they take.
- 🌐 Understanding what zero trust is and why this is important in modern cyber security.
- 🔑 Understanding key concepts and themes across identity, networking, security operations, infrastructure and data security.
- 🔧 Giving some examples of tools used to implement security controls.

What this course does not cover 🙅‍♂️

What this course does not cover:
- How to use specific security tools.
- How to "hack" or do red teaming/offensive security.
- Learning about specific compliance standards.
- 🚫 How to use specific security tools.
- 🚫 How to "hack" or do red teaming/offensive security.
- 🚫 Learning about specific compliance standards.

[![Watch the video](images/intro_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=a0fe1cef-c064-4d59-97a9-e89e12a99b4d)

When you have finished this course, you can move onto some of our Microsoft Learn modules. We recommend you continue your learning with [Microsoft Security, Compliance, and Identity Fundamentals.](https://learn.microsoft.com/en-us/training/paths/describe-concepts-of-security-compliance-identity/?WT.mc_id=academic-96948-sayoung) Ultimately, you could consider taking the [Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals exam.](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-900/?WT.mc_id=academic-96948-sayoung)

If you have any feedback or suggestions on this course and any content we're missing, we'd love to hear from you!

## Modules Overview 📝
| **Module number** | **Module name** | **Concepts taught** | **Learning objectives** |
|-------------------|-------------------------------------------|--------------------------------------|-----------------------------------------------------------------------------------------------------------------|
| **1.1** | Basic security concepts | [The CIA triad](https://github.com/microsoft/Security-101/blob/main/1.1%20The%20CIA%20triad%20and%20other%20key%20concepts.md) | Learn about confidentiality, availability and integrity. Also authenticity and also nonrepudiation and privacy. |
Expand Down Expand Up @@ -53,6 +58,10 @@ If you have any feedback or suggestions on this course and any content we're mis
| **7.2** | Data security fundamentals | [Data security capabilities](https://github.com/microsoft/Security-101/blob/main/7.2%20Data%20security%20capabilities.md) | Learn about data security tooling – DLP, inside risk management, data governance, etc. |
| **7.3** | [End of module quiz](https://github.com/microsoft/Security-101/blob/main/7.3%20End%20of%20module%20quiz.md) |

## 🌐 Help Wanted!

Would you like to contribute a translation? Please read our [translation guidelines](https://github.com/microsoft/Security-101).

## 🎒 Other Courses

Our team produces other courses! Check out:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# The CIA triad and other key concepts

[![Watch the video](images/1-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=d4c2f633-fa6a-4a3d-8d41-7a1d71189832)
[![Watch the video](../../images/1-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=d4c2f633-fa6a-4a3d-8d41-7a1d71189832)

## Introduction

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Common cybersecurity threats

[![Watch the video](images/1-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=12bdcffa-12b7-44ef-b44d-882602ca7a38)
[![Watch the video](../../images/1-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=12bdcffa-12b7-44ef-b44d-882602ca7a38)


## Introduction
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Understanding risk management

[![Watch the video](images/1-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=e8efc6f3-eab3-421b-aec7-dcc0244bd8f1)
[![Watch the video](../../images/1-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=e8efc6f3-eab3-421b-aec7-dcc0244bd8f1)

## Introduction

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

You may have heard the phrases “security policy”, “security standard”, etc. used before, but the reality is that many cybersecurity professionals don’t use them properly, so in this section we will explain what each of these phrases mean and why an organization would utilize these.

[![Watch the video](images/1-4_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=fb8667f3-a627-495a-9fa1-6a7aa9dcf07e)
[![Watch the video](../../images/1-4_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=fb8667f3-a627-495a-9fa1-6a7aa9dcf07e)

## Introduction

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

“Zero trust” is a phrase that is used a lot in security circles nowadays. But what does it mean, is it just a buzzword? In this lesson, we’ll dive into exactly what zero trust is.

[![Watch the video](images/1-5_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=ee1551cc-e7a5-4db6-a897-c286abe68a69)
[![Watch the video](../../images/1-5_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=ee1551cc-e7a5-4db6-a897-c286abe68a69)

## Introduction

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

Shared responsibility is a newer concept in IT that came into being with the advent of cloud computing. From a cybersecurity perspective, it is critical to understand who is providing which security controls so that there are no gaps in defense.

[![Watch the video](images/1-6_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=20bf114b-e90d-428e-ae62-81aa9e9a7175)
[![Watch the video](../../images/1-6_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=20bf114b-e90d-428e-ae62-81aa9e9a7175)

## Introduction

Expand Down
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

Have you ever logged into a computer or a website? Of course you have! That means you’ve already used identity controls in your day-to-day life. Identity and access management (IAM) is a key pillar of security, we’ll learn more about it in the next few lessons.

[![Watch the video](images/2-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=3d2a9cb5-e25a-4b25-9e5a-b3fee2360f24)
[![Watch the video](../../images/2-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=3d2a9cb5-e25a-4b25-9e5a-b3fee2360f24)

**Introduction**

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

Identity is a key part of implementing a zero trust architecture and building a perimeter for any IT environment. In this section we’ll explore why it’s important to use identity controls to implement zero trust.

[![Watch the video](images/2-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=69fb20f6-0f81-4660-b6cd-dcd75d34bd98)
[![Watch the video](../../images/2-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=69fb20f6-0f81-4660-b6cd-dcd75d34bd98)

## Introduction

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

In this section, we’ll cover more details about the core tools and capabilities that are used in identity security.

[![Watch the video](images/2-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=330158a0-95ef-434b-b308-6fc41eab4bd5)
[![Watch the video](../../images/2-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=330158a0-95ef-434b-b308-6fc41eab4bd5)

## Introduction

Expand Down
File renamed without changes.
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Networking key concepts

[![Watch the video](images/3-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=1d8606a8-8357-4dae-8b8f-0a13c3fddd7a)
[![Watch the video](../../images/3-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=1d8606a8-8357-4dae-8b8f-0a13c3fddd7a)

If you have done any work in IT, it’s likely that you’ve been exposed to networking concepts. Although we use identity as our primary perimeter control in modern environments, this doesn’t mean that network controls are redundant. Although this is a huge topic, in this lesson we will cover some key networking concepts.

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Networking zero trust architectures

[![Watch the video](images/3-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=9f425fdb-1c53-4e67-b550-68bdac35df45)
[![Watch the video](../../images/3-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=9f425fdb-1c53-4e67-b550-68bdac35df45)

The network provides a crucial layer in zero trust controls, in this lesson we will learn more about this:

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Network security capabilities

[![Watch the video](images/3-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=b2a4a548-d129-4add-ba68-eca416ec65bc)
[![Watch the video](../../images/3-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=b2a4a548-d129-4add-ba68-eca416ec65bc)

In this lesson we’ll learn about the following capabilities that can be used to secure a network:

Expand Down
File renamed without changes.
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Security operations key concepts

[![Watch the video](images/4-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=6a1cf511-89e0-493a-8ef9-91c458200266)
[![Watch the video](../../images/4-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=6a1cf511-89e0-493a-8ef9-91c458200266)

Security operations are a critical component of an organization’s overall security function. In this lesson, we’ll learn more about this:

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# SecOps zero trust architecture

[![Watch the video](images/4-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=8a2c36d9-8117-4576-ad5b-787667d13603)
[![Watch the video](../../images/4-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=8a2c36d9-8117-4576-ad5b-787667d13603)

Security operations forms two parts of zero trust architecture and in this lesson we will learn about both:

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# SecOps capabilities

[![Watch the video](images/4-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=bdbc1c7c-307b-4519-b8ad-b142434c0461)
[![Watch the video](../../images/4-3_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=bdbc1c7c-307b-4519-b8ad-b142434c0461)

In this section, we’ll cover more details about the core tools and capabilities that can be used in security operations.

Expand Down
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

Application security is a security specialization in it’s own right. In this part of the course we will look more into application security.

[![Watch the video](images/5-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=d81dc210-ee8a-445a-aee0-aaf8a2b37af2)
[![Watch the video](../../images/5-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=d81dc210-ee8a-445a-aee0-aaf8a2b37af2)

## Introduction

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ In this section, we’ll cover more details about the core tools and capabilitie

In this lesson, we’ll cover what the key capabilities and tools that are used in application security are.

[![Watch the video](images/5-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=b562daa7-ab92-4cf4-a6dd-6b6a506edfac)
[![Watch the video](../../images/5-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=b562daa7-ab92-4cf4-a6dd-6b6a506edfac)

## AppSec key capabilities and tools

Expand Down
File renamed without changes.
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Infrastructure security key concepts

[![Watch the video](images/6-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=729d969e-c8ce-4889-aaa0-e5d92658ed62)
[![Watch the video](../../images/6-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=729d969e-c8ce-4889-aaa0-e5d92658ed62)

“Infrastructure” refers to the building blocks of any IT environment which includes servers, cloud services and containers – a huge swathe of different technologies. The applications that were discussed in the prior section run on infrastructure, so it can also be targeted by attackers.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

In this section, we’ll cover more details about the core tools and capabilities that are used in infrastructure security.

[![Watch the video](images/6-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=cc87bbae-0fea-4899-9f09-868724719b96)
[![Watch the video](../../images/6-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=cc87bbae-0fea-4899-9f09-868724719b96)

**Introduction**

Expand Down
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ We’ve alluded to data security and touched on it several times in this course.

- Why is data security important for an organization?

[![Watch the video](images/7-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=ace39247-1690-45fb-8f99-985abcb8e423)
[![Watch the video](../../images/7-1_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=ace39247-1690-45fb-8f99-985abcb8e423)

## What is data security?

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

In this section, we’ll cover more details about the core tools and capabilities that are used in data security:

[![Watch the video](images/7-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=0c9fff7c-e17c-4a14-ac3b-69b5a5786f55)
[![Watch the video](../../images/7-2_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=0c9fff7c-e17c-4a14-ac3b-69b5a5786f55)

**Introduction**

Expand Down
File renamed without changes.
2 changes: 2 additions & 0 deletions translations/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
In this folder, you can find translations of this repository in their appropriately-named folders.
- [Español](https://github.com/microsoft/AI-For-Beginners/)
Loading