Introduction to Cybersecurity
Objectives: By the end of this topic, you will be able to…
- Define cybersecurity and its importance in the current context
- Explain the three fundamental principles of the CIA triad
- Recognize the difference between offensive and defensive cybersecurity
- Understand the practical approach of this course
What is cybersecurity
Cybersecurity is the set of practices, technologies, and processes designed to protect computer systems, networks, programs, and data against attacks, unauthorized access, or damage.
In a digitized world where nearly all personal and professional activities depend on technology, cybersecurity becomes essential to guarantee three fundamental principles:
- Confidentiality — Only authorized parties can access the information
- Integrity — Data is not altered without authorization
- Availability — Information and services are accessible when needed
Current importance
Companies and governments face daily attacks ranging from ransomware and phishing to large-scale data breaches, while individuals are continuously exposed to identity theft and financial fraud. The demand for cybersecurity skills has grown across every sector of the economy, driven in part by an ever-expanding attack surface: each new connected device, cloud service, and web application adds entry points that must be understood and defended.
Course approach
This course focuses on practical cybersecurity, emphasizing the techniques, tools, and approaches used by both defenders and attackers. Each topic combines theory and hands-on labs so you develop a critical, applied understanding of the field.
Throughout the semester you will work with real tools in Kali Linux, analyze vulnerable systems, execute controlled security tests, and document findings professionally.
Key concepts
| Term | Definition |
|---|---|
| Confidentiality | Property that information is only accessible to authorized entities |
| Integrity | Property that information has not been modified without authorization |
| Availability | Property that systems are accessible when required |
| Malware | Malicious software designed to damage or compromise systems |
| Pentesting | Authorized security assessment that simulates real attacks |