The evolution of cybersecurity

You will explore how cybersecurity threats have appeared and evolved alongside the adoption of computers. You will also understand how past and present cyber attacks have influenced the development of the security field. In addition, you’ll get an overview of the eight security domains.

Learning Objectives

  • Identify the most common types of attacks, past and present
  • Identify how security attacks impact business operations
  • Recognize how past and present attacks on business operations have led to the development of the security field
  • Identify the CISSP eight security domains

The history of cybersecurity

The eight CISSP security domains

Review : The evolution of CyberSecurity