top of page

Finals Lessons

This section covers the final period lessons which include various aspects of cybersecurity like bot mitigation, encryption software, network security, software monitoring tools, and password managers.

botnet_blog.jpg

Bot Mitigation

Botnets are networks of compromised computers controlled by botmasters for cyberattacks, utilizing infected emails and malicious websites.

Topologies of botnets include centralized (connected to a command and control server) and decentralized (interconnected bots).

Bot mitigation techniques involve packet inspection, DNS-based approaches, honeypots, spam record analysis, and sinkholing. Examples of bot mitigation software are CAPTCHA, reCAPTCHA, and Web Application Firewall (WAF).

Encryption Software

Encryption software uses cryptography to secure information, ensuring confidentiality, data protection, and privacy.
There are two types of encryption: symmetric (using the same key for encryption and decryption) and asymmetric (using different keys).
The top 3 encryption software options are AxCrypt Premium, NordLocker, and CryptoForge.

encryption security infosec illustration getty.jpg

Network Security

Network security involves implementing rules and technologies to protect the integrity, confidentiality, and accessibility of computer networks and data.

Examples of network security measures include Virtual Private Networks (VPNs) for secure connections, firewalls as a barrier between networks, and Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) to monitor and block unauthorized network access.

The top platforms for network security are OpenVPN, Windows Defender Firewall, providing two-way network traffic filtering, and Snort.

sOFTWARE mONITORING tOOLS

Monitoring software observes and tracks the operations and activities of users, applications and network services on a computer or enterprise systems.

Software or platforms used as monitoring tools in computer security track, examine, and report on various activities and events taking place within a computer system or network. 

The top 3 software monitoring tools are Zabbix, Nagios, and Prometheus​

51206130-illustration.jpg

Password managers

Password managers are technology tools that improve password usability and security by creating, storing, and managing passwords for online services.

Benefits of password managers include convenience, autofill capabilities, minimizing password reuse, generating stronger passwords, increasing security, password mobility, and compliance with best practices.

Top password manager software options include Bitwarden, Dashlane, Zoho Vault, NordPass, and 1Password.

bottom of page