Cisco’s Networking Academy: My Cybersecurity Journey Begins

January 28, 2024
1 min read

TLDR: In this article, the author provides a summary of their first week in Cisco’s Networking Academy, where they are studying introductory cybersecurity. The key points discussed in the article include:

  • Day 1: Learning about vulnerabilities like Meltdown & Spectre and understanding race conditions, buffer overflow, non-validated input, and access control problems.
  • Day 2: Exploring device and network protection, including installing antivirus software, using firewalls, and setting up passwords. Learning about SSIDs and KRACKs.
  • Day 3: Understanding data ownership and rights as a user, enabling two-factor authentication, using VPNs, managing privacy settings, and creating strong passwords.
  • Day 4: Exploring cybersecurity tools like routers, firewalls, intrusion detection systems, antimalware/antivirus software, and VPNs.
  • Day 5: Learning about the behavior-based approach to cybersecurity, including honeypots and Cisco’s Threat Defense Solution Architecture.
  • Day 6: Discovering the process of penetration testing and the importance of analysis, reporting, and risk assessment.
  • Day 7: Completing an exam on cybersecurity.

The author also discusses Cisco’s approach to cybersecurity as an organization, including their CSIRT and collaboration with various security organizations. They reflect on the ongoing emergence of attackers and threats in the cybersecurity field despite the availability of tools and measures to secure networks and data.

Latest from Blog

Top 3 Cybersecurity Stocks for May 2024 Buy Now

TLDR: Key Points: Cybersecurity stocks are using AI to enhance their platforms Top cybersecurity stocks to buy now include Crowdstrike, Fortinet, and Palo Alto Networks Article Summary: The cybersecurity market is booming

Get Secure: Know the Basics of Cloud Security Fundamentals Now

TLDR: Cloud security fundamentals are essential for data protection, regulatory compliance, and access management in a cloud environment. Key fundamentals include identifying assets, implementing security controls, conducting risk assessments, managing user access