-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* PUSH NOTE : Cybersecurity.md * PUSH NOTE : L2. Data Privacy.md * PUSH NOTE : L1. Introduction to Cybersecurity.md * PUSH NOTE : M1. Data and Privacy.md * PUSH NOTE : MC1. Governance, Risk, Compliance, and Data Privacy.md * PUSH NOTE : IBM SkillsBuild Cybersecurity Certificate.md * PUSH NOTE : M1. Get Started with Web Development.md * PUSH NOTE : Introduction to the Course.md * PUSH NOTE : 2. Core Internet Technologies.md * PUSH NOTE : 1.1 How The Internet Works.md * PUSH NOTE : 1. How The Web Works.md * PUSH NOTE : C1. Introduction to Front-End Development.md * PUSH NOTE : Meta Front-End Developer Professional Certificate.md * PUSH NOTE : Study Notes.md * PUSH NOTE : SOC2110.md * PUSH NOTE : REL1010.md * PUSH NOTE : PHL113.md * PUSH NOTE : ENG101.md * PUSH NOTE : what-is-feminism.md * PUSH NOTE : hr-5.md * PUSH NOTE : Persuasive Speech Prep.md * PUSH NOTE : Informative Speech Prep Rewrite.md * PUSH NOTE : Informative Speech Prep.md * PUSH NOTE : COM101.md * PUSH NOTE : BIB235.md * PUSH NOTE : W5 Audio Lectures.md * PUSH NOTE : W4-audio-lectures.md * PUSH NOTE : W3-audio-lectures.md * PUSH NOTE : one-horned-goat.md * PUSH NOTE : four-horns.md * PUSH NOTE : antiochus-epiphanes.md * PUSH NOTE : APO391.md * PUSH NOTE : _index.md * PUSH NOTE : journal.md * DELETE FILE : content/journal/Journal.md * DELETE FILE : content/study-notes/BIB235/W3-audio-lectures.md * DELETE FILE : content/study-notes/BIB235/W4-audio-lectures.md * DELETE FILE : content/study-notes/BIB235/W5 Audio Lectures.md * DELETE FILE : content/study-notes/BIB235/antiochus-epiphanes.md * DELETE FILE : content/study-notes/BIB235/four-horns.md * DELETE FILE : content/study-notes/BIB235/one-horned-goat.md * DELETE FILE : content/study-notes/COM101/informative-speech-prep-rewrite.md * DELETE FILE : content/study-notes/COM101/informative-speech-prep.md * DELETE FILE : content/study-notes/COM101/persuasive-speech-prep.md * DELETE FILE : content/study-notes/ENG101/hr-5.md * DELETE FILE : content/study-notes/ENG101/what-is-feminism.md * DELETE FILE : content/study-notes/meta-front-end-developer/course-1/module-1/1-how-the-web-works/1-how-the-internet-works.md * DELETE FILE : content/study-notes/meta-front-end-developer/course-1/module-1/introduction.md
- Loading branch information
1 parent
444582b
commit 2236cb2
Showing
34 changed files
with
721 additions
and
18 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
--- | ||
title: APO391 Introduction to Islam | ||
description: This course will introduce the student primarily to the history and theology of the religion of Islam. Special emphasis will be given to topics such as the life of Mohammad, the Qur'an and the "Golden Age of Islam" (10th-13th centuries). The course will also include introductory information on Christian apologetics to Muslims. | ||
date: 2024-10-21T11:27:49 | ||
lastmod: 2024-10-23T16:56:02 | ||
banner: https://images.unsplash.com/photo-1616422840391-fa670d4b2ae7?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=M3wzNjAwOTd8MHwxfHNlYXJjaHw3fHxpc2xhbXxlbnwwfDB8fHwxNzI5NTI3NDAyfDA&ixlib=rb-4.0.3&q=80&w=1080 | ||
categories: | ||
- course | ||
tags: | ||
- seedling | ||
- apologetics | ||
links: | ||
- title: Unsplash | ||
description: Photo by Ali Burhan on Unsplash | ||
website: https://unsplash.com/@cahiwak?utm_source=Obsidian%20Image%20Inserter%20Plugin&utm_medium=referral | ||
--- | ||
|
||
```folder-overview | ||
id: 30bb184e-3d20-4c28-95b0-f4b646c52796 | ||
folderPath: "" | ||
title: "{{folderName}} overview" | ||
showTitle: false | ||
depth: 3 | ||
includeTypes: | ||
- folder | ||
- markdown | ||
style: list | ||
disableFileTag: false | ||
sortBy: name | ||
sortByAsc: true | ||
showEmptyFolders: false | ||
onlyIncludeSubfolders: false | ||
storeFolderCondition: true | ||
showFolderNotes: false | ||
disableCollapseIcon: true | ||
``` |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
--- | ||
title: BIB235 | ||
description: | ||
date: 2024-10-23T16:56:09 | ||
lastmod: | ||
banner: | ||
categories: | ||
tags: seedling | ||
--- | ||
|
||
```folder-overview | ||
id: 794b427d-5bcc-4e1d-b8f2-529d760db01d | ||
folderPath: "" | ||
title: "{{folderName}} overview" | ||
showTitle: false | ||
depth: 3 | ||
includeTypes: | ||
- folder | ||
- markdown | ||
style: list | ||
disableFileTag: false | ||
sortBy: name | ||
sortByAsc: true | ||
showEmptyFolders: false | ||
onlyIncludeSubfolders: false | ||
storeFolderCondition: true | ||
showFolderNotes: false | ||
disableCollapseIcon: true | ||
``` |
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
--- | ||
title: COM101 Speech Communication | ||
description: | ||
date: 2024-10-16T14:54:55 | ||
lastmod: 2024-10-23T17:07:37 | ||
banner: https://images.unsplash.com/photo-1530811761207-8d9d22f0a141?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=M3wzNjAwOTd8MHwxfHNlYXJjaHw5fHxzcGVlY2h8ZW58MHwwfHx8MTcyOTU0Nzg2MXww&ixlib=rb-4.0.3&q=80&w=1080 | ||
categories: | ||
- course | ||
tags: | ||
- tree | ||
- speech | ||
links: | ||
- title: Jason Leung (@ninjason) | Unsplash Photo Community | ||
description: Photo by Jason Leung on Unsplash | ||
website: https://unsplash.com/@ninjason?utm_source=Obsidian%20Image%20Inserter%20Plugin&utm_medium=referral | ||
--- | ||
This course introduces learners to the art of public speaking. Throughout the course, learners will write, organize, and develop the skills to deliver meaningful speeches, and grow in their ability to communicate effectively. | ||
|
||
```folder-overview | ||
id: 6943c4ee-ebdf-4f52-93da-3c39a14a49d5 | ||
folderPath: "" | ||
title: "{{folderName}} overview" | ||
showTitle: false | ||
depth: 3 | ||
includeTypes: | ||
- folder | ||
- markdown | ||
style: list | ||
disableFileTag: false | ||
sortBy: name | ||
sortByAsc: true | ||
showEmptyFolders: false | ||
onlyIncludeSubfolders: false | ||
storeFolderCondition: true | ||
showFolderNotes: false | ||
disableCollapseIcon: true | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
--- | ||
title: ENG101 English | ||
description: | ||
date: 2024-10-18T18:59:29 | ||
lastmod: 2024-10-20T22:54:00 | ||
banner: | ||
categories: | ||
- course | ||
tags: | ||
- tree | ||
--- | ||
|
||
```folder-overview | ||
id: 32fed52d-a42e-40b5-b6d5-657836454821 | ||
folderPath: "" | ||
title: "{{folderName}} overview" | ||
showTitle: false | ||
depth: 3 | ||
includeTypes: | ||
- folder | ||
- markdown | ||
style: list | ||
disableFileTag: false | ||
sortBy: name | ||
sortByAsc: true | ||
showEmptyFolders: false | ||
onlyIncludeSubfolders: false | ||
storeFolderCondition: true | ||
showFolderNotes: false | ||
disableCollapseIcon: true | ||
``` |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -9,6 +9,7 @@ categories: | |
tags: | ||
- branch | ||
- feminism | ||
- MeToo | ||
--- | ||
## INTRODUCTION | ||
|
||
|
42 changes: 42 additions & 0 deletions
42
content/Study Notes/IBM SkillsBuild Cybersecurity Certificate/Cybersecurity.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,42 @@ | ||
--- | ||
description: What is cybersecurity? | ||
date: 2024-10-23T17:36:10 | ||
lastmod: 2024-10-23T17:56:36 | ||
banner: | ||
categories: | ||
- lesson | ||
- branch | ||
tags: | ||
- branch | ||
--- | ||
Secrecy, or [confidentiality](confidentiality.md), means that only authorized people should be able to access or read specific computer systems and data. | ||
|
||
[Integrity](Integrity.md) means that only authorized people should be able to use or modify systems and data. | ||
|
||
Cybersecurity helps minimize crime and harm in the virtual world. It’s a set of techniques used to protect the secrecy, integrity, and availability of computer systems and data against threats. | ||
|
||
[Authentication](Authentication.md) is the process by which a computer understands who it is interacting with. There are 3 types: what you know, what you have, and what you are. | ||
|
||
Permissions, or [Access Control Lists](Access%20Control%20Lists.md) (ACLS) describe the access each user has to view or modify any file, or program, on a computer. | ||
|
||
[Malicious software](Malicious%20software.md) (malware) can make a program or computing system vulnerable to attacks that copy user data and allow hackers to disguise as the user. | ||
|
||
Some hack for amusement and curiosity, others for monetary gain ([cybercriminals](cybercriminals.md)), and others hack to provide a social or political goal ([hacktivists](hacktivists.md)). | ||
|
||
[Black Hat hackers](Black%20Hat%20hackers.md) steal, exploit, and sell computer vulnerabilities and data. [White Hat hackers](White%20Hat%20hackers.md) are hired by companies and governments to perform security evaluations, hunt for bugs, and try to close security holes. | ||
|
||
Attackers use bugs in a system to gain access to computer systems to overwrite data, steal user data, crash systems, or hijack the whole system. | ||
|
||
Unresolved bugs on enough systems opens up the possibility of “[worms](worms.md),” programs that automatically jump from computer to computer. | ||
|
||
[Cryptography](Cryptography.md) includes the most common forms of computer security. System architects employ them to make info secret and frustrate attackers. | ||
|
||
A [cipher](cipher.md) is an algorithm that converts plain text into ciphertext that can’t be read unless you have a key to undo the cipher. *Think encryption and decryption.* | ||
|
||
[Cryptographic techniques](Cryptographic%20techniques.md) rely on keys known by both sender and recipient. | ||
|
||
[Key exchange](Key%20exchange.md) uses an algorithm that lets 2 computers agree on a key without sending one, using one-way functions (math operations) that are easy to do in one direction, but hard to reverse. *Think paint mixtures.* | ||
|
||
[Symmetric keys](Symmetric%20keys.md) are the same on both sides and are used by the sender and receiver to encrypt and decrypt. | ||
|
||
[Asymmetric encryption](Asymmetric%20encryption.md) uses two different keys (1 public, 1 private). Senders use the public key, recipient uses their own private key. |
24 changes: 24 additions & 0 deletions
24
...nce, and Data Privacy/M1. Data and Privacy/L1. Introduction to Cybersecurity.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
--- | ||
description: | ||
date: 2024-10-23T17:58:34 | ||
lastmod: 2024-10-23T18:12:47 | ||
banner: | ||
categories: | ||
- lesson | ||
- branch | ||
tags: | ||
- seedling | ||
--- | ||
[Cybersecurity](../../Cybersecurity.md) is the practice of protecting and recovering data, networks, devices, and programs from malicious cyberattacks. | ||
|
||
Anything that can lead to harmful events for your network, system, or data is called a [threat](threat.md). While a [vulnerability](vulnerability.md) is a weakness in hardware, firmware, or software that hackers can exploit. | ||
|
||
Someone who tries to bypass system or network security to access data would be known as a [hacker](hacker.md). But an unauthorized hacker who acts with malicious purposes is a [cyberattacker](cyberattacker.md). | ||
|
||
[Malware](Malware.md) is software or firmware intended to conduct unauthorized actions that negatively affect system security. One example of this is a [trojan](trojan.md), an innocent-looking program that secretly gives an attacker access to your device. | ||
|
||
Key elements of cybersecurity: | ||
|
||
- **People** involves cybersecurity knowledge and habits of individuals, including their choices regarding network security. | ||
- **Processes** refer to the relevant processes that you're expected to follow wherever you use your device(s). | ||
- **Technology** includes to the infrastructure and tools for protecting it. |
16 changes: 16 additions & 0 deletions
16
...ce, Risk, Compliance, and Data Privacy/M1. Data and Privacy/L2. Data Privacy.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
--- | ||
description: | ||
date: 2024-10-23T18:13:08 | ||
lastmod: 2024-10-23T18:14:20 | ||
banner: | ||
categories: | ||
tags: seedling | ||
--- | ||
Types of data: | ||
- Public | ||
- Confidential | ||
- Proprietary | ||
- Private | ||
- personally identifiable info | ||
- Protected health info | ||
|
39 changes: 39 additions & 0 deletions
39
.... Governance, Risk, Compliance, and Data Privacy/M1. Data and Privacy/_index.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
--- | ||
description: In this module, you’ll explore cybersecurity, including its key elements and the threats it addresses. You’ll learn about data privacy, including the different types of sensitive data and the consequences that organizations face when data breaches occur. Then, you’ll discover how organizations evaluate data security using the CIA triad, an industry-standard information security model. You’ll also learn about data security controls used to combat cybersecurity threats. You’ll explore two of these controls in depth, encryption and backups, and you’ll even practice developing a data backup plan. | ||
date: 2024-10-23T17:18:07 | ||
lastmod: 2024-10-23T17:19:03 | ||
banner: | ||
categories: | ||
- module | ||
tags: | ||
- seedling | ||
title: M1. Data and Privacy | ||
--- | ||
## Learning Objectives | ||
|
||
- Determine ways in which the three key elements of cybersecurity apply to common tasks | ||
- Categorize the various types of sensitive data that organizations must protect | ||
- Apply the CIA triad to real-world situations | ||
- Apply file and drive encryption | ||
- Develop a plan for backup | ||
|
||
```folder-overview | ||
id: 3bd25c73-70c8-4d85-a45b-9110c8ae7f3e | ||
folderPath: "" | ||
title: "{{folderName}} overview" | ||
showTitle: false | ||
depth: 3 | ||
includeTypes: | ||
- folder | ||
- markdown | ||
style: list | ||
disableFileTag: false | ||
sortBy: name | ||
sortByAsc: true | ||
showEmptyFolders: false | ||
onlyIncludeSubfolders: false | ||
storeFolderCondition: true | ||
showFolderNotes: false | ||
disableCollapseIcon: true | ||
``` |
32 changes: 32 additions & 0 deletions
32
...urity Certificate/MC1. Governance, Risk, Compliance, and Data Privacy/_index.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
--- | ||
description: | ||
date: 2024-10-23T17:16:39 | ||
lastmod: 2024-10-23T17:17:23 | ||
banner: | ||
categories: | ||
- microcredential | ||
tags: | ||
- tree | ||
title: MC1. Governance, Risk, Compliance, and Data Privacy | ||
--- | ||
|
||
```folder-overview | ||
id: 6649ab82-d349-46a2-be55-14c9a9084b61 | ||
folderPath: "" | ||
title: "{{folderName}} overview" | ||
showTitle: false | ||
depth: 3 | ||
includeTypes: | ||
- folder | ||
- markdown | ||
style: list | ||
disableFileTag: false | ||
sortBy: name | ||
sortByAsc: true | ||
showEmptyFolders: false | ||
onlyIncludeSubfolders: false | ||
storeFolderCondition: true | ||
showFolderNotes: false | ||
disableCollapseIcon: true | ||
``` |
45 changes: 45 additions & 0 deletions
45
content/Study Notes/IBM SkillsBuild Cybersecurity Certificate/_index.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
--- | ||
description: As technology advances, ensuring the security of digital assets and protecting the online presence of individuals and organizations have emerged as critical priorities. Every industry now finds itself in need of skilled cybersecurity professionals. Whether you are a beginner exploring the field or an experienced professional seeking to expand your knowledge, this course will provide you with a solid foundation in cybersecurity. You will delve into key concepts, terminology, and essential principles, and engage in activities with tools, frameworks, and scenarios to help you apply and practice what you’ve learned. | ||
date: 2024-10-23T17:10:09 | ||
lastmod: 2024-10-23T17:43:50 | ||
banner: https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=M3wzNjAwOTd8MHwxfHNlYXJjaHwxfHxjeWJlcnNlY3VyaXR5fGVufDB8MHx8fDE3Mjk3MTk3MzJ8MA&ixlib=rb-4.0.3&q=80&w=1080 | ||
categories: | ||
- certificate | ||
tags: | ||
- tree | ||
links: | ||
- title: Adi Goldstein (@adigold1) | Unsplash Photo Community | ||
description: Photo is by Adi Goldstein on Unsplash | ||
website: https://unsplash.com/@adigold1?utm_source=Obsidian%20Image%20Inserter%20Plugin&utm_medium=referral | ||
title: IBM SkillsBuild Cybersecurity Certificate | ||
--- | ||
As technology advances, ensuring the security of digital assets and protecting the online presence of individuals and organizations have emerged as critical priorities. Every industry now finds itself in need of skilled cybersecurity professionals. Whether you are a beginner exploring the field or an experienced professional seeking to expand your knowledge, this course will provide you with a solid foundation in cybersecurity. You will delve into key concepts, terminology, and essential principles, and engage in activities with tools, frameworks, and scenarios to help you apply and practice what you’ve learned. | ||
|
||
## Learning Outcomes | ||
|
||
- Evaluate an organization’s data security posture | ||
- Perform an impact analysis to address vulnerabilities | ||
- Design a secure network that includes systems and security devices | ||
- Ensure the protection of cloud systems, data, applications, and infrastructure | ||
- Assemble the components required for security operations and monitoring | ||
- Investigate incident reports through digital forensics | ||
```folder-overview | ||
id: daff71b2-bf58-4485-ac27-1eaa7a67ade2 | ||
folderPath: "" | ||
title: "{{folderName}} overview" | ||
showTitle: false | ||
depth: 3 | ||
includeTypes: | ||
- folder | ||
- markdown | ||
style: list | ||
disableFileTag: false | ||
sortBy: name | ||
sortByAsc: true | ||
showEmptyFolders: false | ||
onlyIncludeSubfolders: false | ||
storeFolderCondition: true | ||
showFolderNotes: false | ||
disableCollapseIcon: true | ||
``` |
Oops, something went wrong.