In the modern age, our lives are deeply entangled with digital technology, creating a vast web of connections that span across the globe. As we become increasingly reliant on these connections to navigate daily life, it becomes equally important to understand how exploitable these connections can be.
There’s a fascinating dynamic between those who protect networks, systems and data, and those who attempt to penetrate them, creating a unique challenge for cybersecurity professionals. Cybersecurity is a digital battleground where defenders and attackers constantly engage in a high-stakes, ever-evolving game of strategy and tactics.
Attackers and other cybercriminals often attempt to gain unauthorized access to, modify, or corrupt sensitive information, extort money from users, or disrupt normal business operations.
Defenders, on the other hand, work to secure networks, systems, information technology, and data. Cybersecurity professionals are responsible for anticipating vulnerabilities, designing robust security measures, and rapidly responding to incidents.
This ongoing struggle makes cybersecurity an especially intriguing and captivating field for individuals willing to tangle with cybersecurity threats on a regular basis.
However, cybersecurity isn’t a monolith but a multifaceted field with various domains and specializations.
So, for today, we’ll take a closer look at four key domains within cybersecurity.
Let’s get started!
Master the Bash Shell
A course for anyone interested in understanding all aspects of the bash shell. Designed for use by beginners, it assumes as little knowledge as possible but teaches you all the intricacies of bash it took me decades to learn by trial and error. The interactive nature of the course instills the knowledge in a way you will not forget!
Each aspect of cybersecurity that we’re about to go over addresses specific threats and vulnerabilities. Before we dive right into the dry technical details, here’s a quick metaphor to help illustrate the differences between the four types of cybersecurity:
Let’s say, for instance, that your software application is a building containing valuable assets you want to protect.
Before diving into domains, align on the basics you’ll see everywhere:
CIA triad: Confidentiality (only the right people see data), Integrity (data can’t be altered unnoticed), Availability (systems are up when needed). Almost every control you’ll encounter maps to one of these goals.
Risk, threat, vulnerability: Risk is the potential for loss, typically expressed as likelihood × impact. A threat is anything that can cause harm (criminals, insiders, natural events). A vulnerability is a weakness that a threat can exploit.
Attack surface: All the ways an adversary could interact with your systems—externally facing services, endpoints, identities, third-party vendors, misconfigurations.
Defense in depth: Layer controls so one failure doesn’t lead to compromise.
Threat actors: From financially motivated groups and ransomware affiliates to insiders and nation-state operators—motivations and capabilities differ, so defenses must be layered and contextual.
These anchors make the rest of this introduction to cybersecurity easier to apply in real environments.
Network security refers to the processes and practices designed to safeguard computer networks from unauthorized access, misuse, or damage. It involves implementing both hardware and software solutions to maintain the confidentiality, integrity, and availability of network infrastructure.
Network security protects data transmission across networks using firewalls, intrusion detection/prevention systems, and secure protocols like SSL/TLS. This can also involve securing DNS servers and routers to prevent cyber attacks and unauthorized access to the network.
It is the first line of defense against external threats.
Network security is crucial for protecting sensitive data, preventing unauthorized access to systems, and ensuring the smooth operation of your network.
A secure network forms the foundation for the overall cybersecurity of an organization or individual, ensuring that data and communications are safe from threats. Network security also plays a significant role in maintaining user trust and meeting regulatory and compliance requirements.
Application security refers to the process of protecting apps from external threats and vulnerabilities by identifying, fixing, and preventing security weaknesses within the software. This can also involve protecting against advanced persistent threats (APTs) that target specific applications or systems.
It encompasses the entire software development lifecycle, from design and development to deployment and maintenance.
Application security is vital because it protects sensitive data stored and processed by software applications. It helps maintain user trust and prevents the exploitation of vulnerabilities that could lead to data breaches or other cyber attacks. Furthermore, secure applications contribute to the overall security posture of an organization by minimizing the risk of unauthorized access or data leakage.
Endpoint security focuses on protecting individual devices like computers and mobile devices from potential cyber threats.
This can involve implementing antivirus software, firewalls, and intrusion detection systems, as well as keeping operating systems and applications up to date with the latest security patches. This can also involve implementing incident response plans to quickly detect and respond to potential cyber threats.
Endpoint security is essential because these devices are often the primary targets of cyber attackers. Securing endpoints ensures that sensitive data and systems are protected from unauthorized access and malware infections.
Additionally, as more employees work remotely and use personal devices to access corporate data, protecting these endpoints from potential threats becomes increasingly important.
Cloud security refers to the policies, technologies, and controls put in place to protect data, applications, and critical infrastructure in cloud computing environments.
This includes securing data stored in public, private, or hybrid cloud environments and protecting the underlying cloud infrastructure. This can also involve conducting regular risk assessments to identify potential vulnerabilities and threats in the cloud environment.
#### Why is cloud security important? Cloud security is important because it ensures the confidentiality, integrity, and availability of data and services hosted in the cloud. As more organizations and individuals adopt cloud-based solutions, it's crucial to have robust security measures in place to protect against potential threats, meet compliance requirements, and maintain user trust.Modern breaches often start with compromised credentials, so identity is a first-class control plane:
Strong authentication: Prefer phishing-resistant MFA methods. Enforce secure password policies and periodic credential hygiene (key rotation, secret scanning).
Authorization & least privilege: Grant the minimal access required; review entitlements regularly; segment admin accounts; use just-in-time elevation for sensitive tasks.
Single sign-on (SSO) and federation: Centralize authentication to improve visibility and revocation.
Privileged access management (PAM): Vault and broker secrets; record sessions; require approvals for high-risk actions.
Zero trust mindset: “Never trust, always verify.” Continuously evaluate user, device, and context before granting access. Combine posture checks, network micro-segmentation, and application-level controls.
Weaving identity controls through networks, apps, endpoints, and cloud strengthens every layer of this introduction to cybersecurity.
Here are some additional types of cybersecurity that you may encounter:
If you’re new to the world of cybersecurity, it can be overwhelming to navigate all the different best practices and guidelines. One resource that can help is the National Institute of Standards and Technology (NIST) Cybersecurity Framework<sup>[1]</sup>.
This framework provides a set of guidelines and best practices for managing and reducing cybersecurity risks and is widely adopted by organizations of all sizes and types.
Despite robust technical security measures, social engineering attacks can bypass the most advanced security systems by targeting the weakest link in the security chain: people. Cybercriminals use social engineering to bypass security controls, gain access to critical data or systems, or deliver malware and viruses to targeted individuals or organizations.
Social engineering is a critical aspect of cybersecurity, as it involves exploiting human behavior to gain unauthorized access to systems, data, or sensitive information.
Social engineering techniques can include phishing emails, pretexting, baiting, and other methods that aim to manipulate individuals into divulging confidential information or taking actions that can compromise security. Cybercriminals often use phishing scams to try and trick people into providing their credit card information because it’s lucrative and relatively easy to obtain.
Even with strong prevention, detection and response determine blast radius:
Prepare: Run tabletop exercises, define playbooks, inventory assets, and ensure logging/telemetry coverage.
Detect & analyze: Triage alerts, correlate signals (e.g., unusual logins, anomalous data egress), confirm scope and entry vector.
Contain: Isolate affected endpoints/accounts, apply network blocks, snapshot evidence. Choose short-term vs. long-term containment to balance business continuity.
Eradicate & recover: Remove malware, rotate credentials/keys, patch root-cause vulnerabilities, restore from clean backups, validate integrity before going live.
Lessons learned: Update controls and runbooks, close gaps in monitoring, and share findings. Measure mean time to detect (MTTD) and mean time to respond (MTTR) to track progress.
This operational lens complements a conceptual introduction to cybersecurity with concrete muscle memory.
Vulnerability management: Start with an asset inventory (you can’t secure what you don’t know), run authenticated scans, prioritize using exploitability and business impact (not just CVSS score), and track remediation SLAs. Pair patching with compensating controls when downtime is constrained.
Crypto in practice:
Encryption in transit: Use TLS everywhere between clients, services, and databases.
Encryption at rest: Enable managed encryption for disks, S3-style object stores, and databases.
Hashing: Store passwords with slow, salted hashes.
Key management: Centralize keys; rotate and restrict access; avoid embedding secrets in code.
30-day plan to operationalize this introduction to cybersecurity:
Week 1: Build a glossary (terms above), diagram a simple home or lab network, and enable MFA on all critical services.
Week 2: Stand up a small lab (VMs or containers) with a web app behind a reverse proxy; capture logs; practice basic hardening (firewall rules, least privilege).
Week 3: Run a vulnerability scan against the lab, remediate findings, and write a short incident response playbook for a mock phishing incident.
Week 4: Add identity controls (SSO if possible, otherwise role-based auth), enable backups, and conduct a tabletop exercise using the five-step IR flow.
Completing this plan turns an introduction to cybersecurity into actionable skills you can demonstrate in interviews or on the job.
To pursue a career in cybersecurity, it’s important to have a strong foundation in computer science, information technology, or a related field. Many cybersecurity jobs also require industry certifications, such as the Certified Information Systems Security Professional (CISSP) or the Certified Ethical Hacker (CEH) certification.
So, what’s next?
An indispensable tool for cybersecurity that you can learn to use today is the Command Line Interface (CLI). It’s important to become comfortable using the command line because it’s fundamental for interacting with computer systems, managing files, and accessing network information.
To get started with mastering the CLI, consider checking out our Master the Bash Shell course. This comprehensive resource will help you unlock the full potential of the command line, and pave the way for you to become an effective cybersecurity expert.