Cybersecurity Articles
Cybersecurity is a framework for safeguarding computer systems and networks from a variety of threats, including hackers, malware, and data breaches. Effective risk management is at the core of cybersecurity, involving the assessment and mitigation of potential vulnerabilities to protect sensitive information. Cybersecurity analysts are essential, as they receive specialized training to identify, analyze, and counteract emerging threats, ensuring the security and integrity of digital assets. The tutorials below provide tips and tricks on how to get started with cybersecurity.- Learn about app authentication and the basics of OAuth.
Authentication and OAuth
- Cybersecurity,
- Web Development
- In this article, you’ll get an overview of three key concepts in web security: Authentication, Authorization, & Encryption.
Authentication vs Authorization vs Encryption
- Cybersecurity,
- Web Development
- Learn about attacks that target binary applications, often via memory manipulation.
Binary Application Attacks
- Cybersecurity
- Let’s explore defensive tools used by blue teams.
Blue Team Tools
- Cybersecurity
- Learn about three major data breaches, how they happened, and how the organizations responded.
Case Studies: Notable Breaches
- Cybersecurity
- Learn about the tradeoffs between cloud and on-prem assets.
Cloud-Based vs. On Prem Assets
- Cybersecurity
- Learn about attacks and techniques that bypass cryptography.
Cryptographic Attacks
- Cybersecurity
- Check out recent updates to Codecademy's Cybersecurity content!
Cybersecurity Change Log
- Cybersecurity
- In this article, you will learn how and why the growth mindset is advantageous to cybersecurity professionals.
Growth Mindset & Cybersecurity
- Cybersecurity
- In this article, you'll learn the difference between Hashing, Encryption, Encoding, and Obfuscation.
Hashing vs. Encryption vs. Encoding vs. Obfuscation
- Cybersecurity
- The basics of PowerShell commands useful for any Cybersecurity professional.
Important PowerShell Commands for Cybersecurity Analysts
- Bash/Shell,
- Cybersecurity
- Learn about good patch management, and how bad patch management can leave you vulnerable to attacks.
Improper or Weak Patch Management
- Computer Science,
- Cybersecurity
- Learn about how hybrid threats use Influence Campaigns to alter public opinion on a massive scale.
Influence Campaigns
- Cybersecurity
- A Cybersecurity Analyst is expected to effectively analyze the operating systems of an organization. In this article, we'll discuss the Linux OS.
Linux OS
- Back-End Engineer,
- Cybersecurity
- Learn about some of the more complicated or esoteric types of cyber attacks.
Other Cyber Attacks
- Cybersecurity
- In this article, you’ll learn about passive and active reconnaissance: The methods used to gather information by both pen testers and malicious threats.
Passive & Active Reconnaissance
- Computer Science,
- Cybersecurity
- In this article, you’ll learn about passwords, and how they can be an exploitable weak point for attackers.
Password Attacks
- Cybersecurity
- In this article, you’ll learn about penetration testing: What it is, how it works, and why organizations hire people to break into their own networks.
Pen Testing
- Cybersecurity
- In this article, you’ll learn about the physical side of Cybersecurity, and how physical methods can bypass digital defenses.
Physical Attacks
- Cybersecurity
- In this article, we will cover the most important aspects to include on your LinkedIn profile, and how to leverage LinkedIn to build your brand and grow your professional network.
Preparing Your LinkedIn for a Cybersecurity Career
- Cybersecurity,
- Job Essentials
- Learn about PKI: What it is, how it works, and what we use it for!
Public Key Infrastructure (PKI)
- Cybersecurity
- Let's explore offensive tools used by red teams.
Red Team Tools
- Cybersecurity,
- IT
- This article introduces practices for making systems that continue to perform under adverse conditions.
Resiliency
- Cybersecurity
- In this article, we will explore communities and organizations within the cybersecurity field.
The Cybersecurity Community
- Cybersecurity
- In this article, we will break down common domains in cybersecurity.
The Cybersecurity Industry
- Cybersecurity
- In this article, you'll explore the evolution of hacking and cybersecurity.
The Evolution of Cybersecurity
- Cybersecurity
- Learn about the OSI model.
The OSI Model
- Cybersecurity,
- Full-Stack Engineer
- In this article, you’ll look at examples of real-world threat actors, then apply your knowledge in a threat actor analysis exercise!
Threat Actor Case Studies
- Cybersecurity
- Learn about Threat Hunting: A proactive defense technique where threats are actively searched for using threat intelligence
Threat Hunting
- Cybersecurity
- This article discusses growing challenges and fields in cybersecurity.
Trending Topics in Cybersecurity (2020s)
- Cybersecurity
- In this tutorial, you will analyze network traffic to identify interesting activity.
Tutorial: Network Monitoring
- Cybersecurity
- In this article, you’ll learn about vulnerability scans: Automated scans that search for vulnerabilities and generate reports on their findings.
Vulnerability Scans
- Cybersecurity
- Learn about weak configurations and the dangers they pose to computers and networks.
Weak Configurations
- Cybersecurity
- In this article, we go over attacks against web applications.
Web Application Attacks
- Cybersecurity,
- Full-Stack Engineer
- In this article, we will introduce what web security is and what its main principles are!
Web Security: Not An Add-On
- Cybersecurity,
- Web Development
- In this article, you’ll learn about the phases of an Incident Response (IR) lifecycle and how you can create an Incident Response report.
What Is an Incident Response?
- Cybersecurity
- Learn about attacks on wireless communications, from Wi-Fi to Bluetooth.
Wireless Attacks
- Cybersecurity