Introduction to Cybersecurity

Objectives: By the end of this topic, you will be able to…

  • Define cybersecurity and its importance in the current context
  • Explain the three fundamental principles of the CIA triad
  • Recognize the difference between offensive and defensive cybersecurity
  • Understand the practical approach of this course

What is cybersecurity

Cybersecurity is the set of practices, technologies, and processes designed to protect computer systems, networks, programs, and data against attacks, unauthorized access, or damage.

In a digitized world where nearly all personal and professional activities depend on technology, cybersecurity becomes essential to guarantee three fundamental principles:

  • Confidentiality — Only authorized parties can access the information
  • Integrity — Data is not altered without authorization
  • Availability — Information and services are accessible when needed

Current importance

Companies and governments face daily attacks ranging from ransomware and phishing to large-scale data breaches, while individuals are continuously exposed to identity theft and financial fraud. The demand for cybersecurity skills has grown across every sector of the economy, driven in part by an ever-expanding attack surface: each new connected device, cloud service, and web application adds entry points that must be understood and defended.


Course approach

This course focuses on practical cybersecurity, emphasizing the techniques, tools, and approaches used by both defenders and attackers. Each topic combines theory and hands-on labs so you develop a critical, applied understanding of the field.

Throughout the semester you will work with real tools in Kali Linux, analyze vulnerable systems, execute controlled security tests, and document findings professionally.


Key concepts

TermDefinition
ConfidentialityProperty that information is only accessible to authorized entities
IntegrityProperty that information has not been modified without authorization
AvailabilityProperty that systems are accessible when required
MalwareMalicious software designed to damage or compromise systems
PentestingAuthorized security assessment that simulates real attacks

Navigation: Home | Next