You learned the foundations of network security.
CIA Triad: Confidentiality keeps data secret. Integrity prevents unauthorized changes. Availability ensures access when needed.
Threats: Malware, phishing, DoS, MITM, spoofing. Attackers follow the kill chain.
Defense in depth: Layer controls. Segment networks. Use security zones. Apply least privilege.
Risk: Assess threats, vulnerabilities, impact. Mitigate, transfer, accept, or avoid.
Governance: Policies define rules. Baselines set standards.
Incident response: Prepare, detect, contain, eradicate, recover, learn.