Home / Cyber Security / Define Data Security and Cyber Security Basics

Define Data Security and Cyber Security Basics

What is Cyber Security?

Cyber ​​security investigates the main techniques you need to protect threats and your network.

When there is a security breach, consider only a few of the consequences. Your private information is fully accessible, you pay for large fines paid due to security vulnerabilities – the time it takes to cover errors and the amount of budget you lose, the dissemination of news about your company’s security breach, and the loss of references. Cyber ​​Security Fundamentals are absolutely necessary for those who will receive a more detailed and comprehensive understanding of the best-designed practices.


This Cyber ​​Security division will gain a global perspective to the person who will encounter how to design and design a secure system in accordance with all necessary rules of cyber roles to provide a consistent security solution. Together with the training, lab and practical discussion groups, you will learn all about Internet, organization, security and their impact on today’s threat trends. Review the standard cybersecurity terminology and compliance requirements, review samples and gain practical experience that will minimize deficits and controls. It will work with live viruses such as botnets, worms and Trojan horses.


In addition to the technical cybersecurity components; With cyber security you discover the necessary non-technical aspects like risk management, identifying threats, disaster recovery, security policy management and business continuity planning to reduce risk and expose threats. This CyberSecurity training also includes; CISSP provides the perfect foundation for CEH, CISA or CISM training.

READ  Top 9 Best Open Source Big Data Tools

Cyber ​​Security Foundations are the main ones in network issues. Let us briefly talk about these titles;

OSI (Open Systems Interconnection) model is divided into 7 layers.

  1. Physical (Hardware Layer)
  2. Data (Data Layer)
  3. Network (Network Layer)
  4. Trasnport (Transport Layer)
  5. Session (Session Layer)
  6. Presentation Layer
  7. Application (Application Layer)


It is a two-layer communication protocol. The Top Layer TCP (Transmission Control Protocol) allows the data to be packaged prior to transmission, and on the other side to reassemble these packets properly. Sub-Layer IP (Internet Protocol) controls the forwarding of transmitted packets to the desired network address. It was originally developed as an alternative to OSI-based systems by the US Department of Defense (DoD) in the 80s. The fact that DoD is the main determinant in the American market has led to the adoption of this protocol as standard in American software. ARPANet, the father of the Internet, was born with TCP / IP. With the rapid increase in Internet usage, TCP / IP has established a superiority over the OSI.




TCP-Ip – Osi Models

These are the layers that form the basis of the Network. It is difficult to understand the logic of Cyber ​​Security without fully learning these layers. Those who know these layers will understand the Cyber ​​Security logic much more comfortably.


Who should take this Cyber ​​Security Training first?

Cybersecurity professionals can participate in training including security analysts, Intel analysts, management analysts, security operations personnel, network administrators, system integrators, VARS and security consultants.

About bigdtadmin

Leave a Reply

Your email address will not be published. Required fields are marked *