The key learning outcomes:

✅ Understand and define basic terms, topics, and concepts of cybersecurity

✅ Identify the key threat actors, their motivations, and common threats

✅ Acquire an introductory understanding of incident response cybersecurity frameworks and standards

This module is composed of the following steps:

  1. Complete the self-paced e-learning course including quizzes on the atingi e-learning platform
  2. Upload the certificate of completion on ITU Academy in the dedicated section
  3. Optional: Contribute to the discussion forum for this module if you wish to discuss the content

Click below to start the self-paced course Cybersecurity Fundamentals.


Cybersecurity Fundamentals - Module 1

Cybersecurity involves safeguarding computer systems, networks, and data from digital attacks and unauthorized access. It integrates technologies, processes, and best practices to protect sensitive information and users from cyber threats and attacks.

Cybersecurity refers to the measures and activities necessary to safeguard information systemsnetworks, and data from cyber threats that could compromise their confidentialityintegrity, or availability. It involves protecting not just information and the systems that rely on it, ensuring they can withstand attacks and function securely, but also protecting users of such systems and other persons from cyber threats.

Cybersecurity measures are essential for maintaining trust in digital systems, preventing disruptions, and protecting individualsorganizations, and society from evolving cyber risks.

The ultimate goal of cybersecurity is to secure digital environments from threats that could compromise security and stability, as well as protect their users and society at large.

Governments and organizations play a crucial role in managing these risks through incident response and risk management strategiesIT security incidents, such as data breachessystem failures, and cyber attacks, can have wide-ranging consequences, from disrupting business operations to endangering personal safety. A strong cybersecurity framework helps mitigate these threats and ensure resilience against evolving cyber risks.

To effectively address these risks, cybersecurity professionals rely on the CIA Triad, a foundational model that ensures the Confidentiality, Integrity, and Availability of digital information systems.

<aside>

C is for "Confidentiality": This principle ensures that sensitive information is accessed only by authorized individuals.

</aside>

<aside>

I is for "Integrity": Integrity refers to the accuracy and reliability of data, for example, that data remains unchanged during storage and transmission.

</aside>

<aside>

A is for "Availability": Availability ensures that information and resources are accessible to authorized users whenever needed.

</aside>