In the following topics, learn about some areas of information security and the things you need to know to start a career in information security.
Areas of Study
Security Governance
It’s the team that governs or plans security actions for the company. It’s a bit confused with security management, but it takes care of the plans, the projects, chooses tools, defines controls, organizes the team.
- Confidentiality, Integrity and Availability
- Definition of metrics
- Roadmap definition
- Business Requirements Survey
- Privacy
Risk Management
It assesses the risks that the company has, fraud risk, fire risk, market risk… And then, with Governance, it will implement controls to reduce or eliminate the risk.
- Risk assessment
- Definition of a mitigation plan
- Application of risk controls
Compliance
Every company has laws it must follow. For example, every company has to issue invoices. In security, some companies have security obligations, which are laid down in law. The Privacy Act and Marco Civil da Internet are good examples of such laws.
- Safety regulations
- Security Guides
- Laws applied to Security
- Audits
Data Security
Define data processes and policies. How it will be stored, how it will be controlled, how it will be backed up, how to prevent data leaks.
- Data Classification
- Integrity
- Cryptography and Confidentiality
- Digital Signature
- Digital Certificate and Public Key Infrastructure
- Backup
- Secure Data Disposal
Access Control
It manages the access of employees, customers and partners to the company’s systems and consequently to data. It defines, for example, the password policy and which authentication methods should be used.
- Access Control
- Audit and Access Federation
- Access Provisioning
- Privileged Users
Network and Telecom Security
It is responsible for assessing security risks in wired, wireless, VPN, datacenter communications, the Internet and also telephony.
- Network and Infrastructure Security
- Network Protection Features
- Technology Infrastructure Security
- Network Services
Software Security
It evaluates software developed in-house and software purchased on the market. It also manages software updates to avoid known vulnerabilities.
- Software Security
- Software Developed
- Data Security in Software and Testing
- Patch management
Endpoint Security
They are responsible for the security of user devices, desktops, laptops, cell phones, tablets and any other high-end equipment. Some take care of printers, scanners and IOT devices. Internet of Things.
- Endpoint Security
- Mobile Device Management
- Software and firmware updates
- Desktop Security
Physical Security
It manages the risks of physical environments. Fires, electrical damage, flooding, theft, break-ins, vandalism and everything associated with company information in these environments.
- Physical Security
- Datacenter security
- Physical risks
- Physical Data Security
- Physical Security Monitoring
Cloud Security
It will manage all the applications that run in the public cloud, such as Office 365, Salesforce and systems that run in clouds such as AWS, Google, Azure.
- Cloud Security
- Controlling access in Cloud Security
- Differences between Cloud Security
- Cloud Security Protections and Compliance
Security Intelligence
At this point, some people confuse artificial intelligence with security. This is not the case here. Security intelligence is the monitoring of environments and the handling of security events. This is where ethical hackers, social engineers and computer forensics work, for example.
- Intelligence and Security Operations
- Preparing for and Detecting Attacks
- Anatomy of Attacks
- Operational Security Controls
Incident response
This is the area that will take care of emergency plans in the event of a security event. For example, a fire in the datacenter. How you should handle this emergency. Everything has a plan, rehearsals, tests….
- Incident Response
- Other Response Plans
- Other Support Tools
- Safety Tests and Trials
- Recycling Plans
Professional Ethics
Well, it’s not just hackers who have to be ethical. There are certain rules in our profession that must be followed. For example, here you need to know what a Confidentiality document is, how you should treat sensitive information.
Get to know the Blue Team Academy
A complete training course with videos, tutorials, exercises and tests to take you from zero to information security professional. This training also includes mentoring and support from Fabio Sobiecki.
https://go.hotmart.com/P54074238S?dp=1
Download
In the link below, you’ll find a study roadmap to prepare yourself for the Information Security Market.