introduction

Introduction

 

The start of your journey towards certification

Thank you for choosing us as your study resource to prepare for the Certified in Cybersecurity certification. We hope this book serves as a foundational step in your journey to understand and excel in cybersecurity, whether you are pursuing a career in the field, advancing your current job, or simply expanding your knowledge to stay secure amidst ever-growing digital threats.

As organizations undergo digital transformation and shift to cloud operation their systems, once internal and centralized, are now external and decentralized with multiple points of interconnection that are more vulnerable to cyber-attacks. In addition, this modern digital infrastructure works by orchestrating services and systems contracted to third-parties that requires ongoing cybersecurity supervision. Not only that, but vulnerabilities are not just technical, but often caused by human factors. Consider, for example, the careless handling of personal data or, for example, episodes of sabotage carried out by disgruntled employees. Clearly, cybersecurity is a cross-cutting concern and is everyone's responsibility.

ISC2

Certified in Cybersecurity Exam Overview