Sections C4 to E2 β Cyber Shenanigans Continue!
Another week, another deep dive into the world of cybersecurity. From policy loopholes to phishing fails, hereβs what we tackled in Week 3 of CPSA training:
π C4: Security Policy and Standards
We looked at how policies are the backbone of any secure organisation (yes, even if no one actually reads them). Think of these as the rules that keep everyone from turning the network into digital chaos.
π΅οΈββοΈ C5: Vulnerability Management
Imagine playing whack-a-mole, but the moles are security holes. We explored how vulnerabilities are identified, prioritised, and patched β and why ignoring them is like leaving your front door open with a sign that says “Hack me.”
π D1: Incident Response Process
When things go wrong (and they will), a solid incident response plan stops panic in its tracks. We walked through what to do when the fire alarm goes off in your digital world β from detection to containment and recovery.
π¦ D2: Asset Management
It’s hard to protect what you donβt know you own. We covered why knowing your assets β from dusty laptops to critical servers β is essential, and how to keep track of them all without losing your mind.
π§© E1: Security Architecture Fundamentals
A crash course in building strong, layered security from the ground up. Think of this as LEGO for grown-ups β stacking security blocks in the right order so it doesnβt all fall apart.
πΈοΈ E2: Security Models
Finally, we dipped our toes into the world of security models β Bell-LaPadula, Biba, and all their theoretical glory. Ideal if you like logic puzzlesβ¦ and headaches.