Jean-Baptiste Bres

Chief Information Security Officer

Certified in Cybersecurity

๐Ÿ” Security Operations

Article


Get Certified in Cybersecurity - Part 6 of 6
๐Ÿ” Security Operations
Learn key elements of data security, including data handling, classification, logging, encryption, system hardening, configuration management, security policies, and social engineering defence through security awareness training.

Read Moreโ€ฆ

๐Ÿ” Network Security

Article

Get Certified in Cybersecurity - Part 5 of 6
๐Ÿ” Network Security
Delves into common threats and best practices for securing computer networks. It explores the array of network threats, from malware and ransomware to insider threats, and understand how network professionals mitigate these risks.

Read Moreโ€ฆ

๐Ÿ” Network Concepts

Article

Get Certified in Cybersecurity - Part 4 of 6
๐Ÿ” Network Concepts
Discover the intricate world of computer networks. This article covers topics such as network types, essential devices, IP addresses, DHCP, network ports, and key network terms. It also explores the OSI and TCP/IP models, showcasing their role in network communication. Furthermore, the article touches upon cloud computing, highlighting different service and deployment models.

Read Moreโ€ฆ

๐Ÿ” Access Management

Article

Get Certified in Cybersecurity - Part 3 of 6
๐Ÿ” Access Control
Delves into the importance of access control, covering concepts encompassing defence in depth, least privilege, segregation of duty, two-person integrity, passwords, multi-factor authentication, privileged access management, account provisioning, log management, physical access control, biometric access control, and logical access control.

Read Moreโ€ฆ

๐Ÿ” Incident Response, Business Continuity and Disaster Recovery

Article

Get Certified in Cybersecurity - Part 2 of 6
๐Ÿ” Incident Response, Business Continuity and Disaster Recovery
Explore the crucial aspects of cybersecurity incident response, business continuity, and disaster recover. We will talk about the importance of incident response plans, business impact analysis, recovery strategies, and crisis management in ensuring the resilience and continuity of organisations in the face of cyber threats and disruptive events.

Read Moreโ€ฆ

๐Ÿ” Key Security Principles

Article


Get Certified in Cybersecurity - Part 1 of 6
๐Ÿ” Key Security Principles
Discover the essentials of safeguarding sensitive data and protecting against cyber threats. From the CIA Triad to Risk Management and Privacy, this article breaks down key principles in an accessible way.

Read Moreโ€ฆ

๐Ÿ’ก Certified in CyberSecurity - Your Journey to Certification

Article

๐Ÿš€ Unlock your path to a career in cybersecurity with the ISC2 Certified in Cybersecurity (CC)!
As part of Cyber Awareness Month 2023, I'll be sharing a series of articles throughout October covering the all the knowledge needed to prepare for the ISC2 Certified in Cybersecurity (CC).
Ideal for IT professionals, career changers, executives, and recent grads, this entry-level certification offers free exam and online training for a limited time, making it more accessible than ever.
Find out more about the ISC2 CC Certification. Your cybersecurity journey starts here!

Read Moreโ€ฆ