Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add translation help section #5

Open
wants to merge 14 commits into
base: main
Choose a base branch
from
Prev Previous commit
Next Next commit
Add readme in traslations/es
  • Loading branch information
Valentina Chambilla committed Feb 23, 2024
commit b88cb21b43f0d03d03e5048208b23cb28d9df1cc
176 changes: 176 additions & 0 deletions traslations/es/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,176 @@
# Cybersecurity for Beginners – a curriculum

> View these instructions in [Spanish](/translations/es/README.md)

This course is designed to teach you fundamental cyber security concepts to kick-start your security learning. It is vendor agnostic and is divided into small lessons that should take around 30-60 mins to complete. Each lesson has a small quiz and links to further reading if you want to dive into the topic a bit more.

![Cybersecurity for Beginners](images/banner.jpg)

What this course covers:
- Basic cyber security concepts such as the CIA triad, the differences between risks, threats, etc,
- Understanding what a security control is and what forms they take.
- Understanding what zero trust is and why this is important in modern cyber security.
- Understanding key concepts and themes across identity, networking, security operations, infrastructure and data security.
- Giving some examples of tools used to implement security controls.

What this course does not cover:
- How to use specific security tools.
- How to "hack" or do red teaming/offensive security.
- Learning about specific compliance standards.

[![Watch the video](images/intro_placeholder.png)](https://learn-video.azurefd.net/vod/player?id=a0fe1cef-c064-4d59-97a9-e89e12a99b4d)

When you have finished this course, you can move onto some of our Microsoft Learn modules. We recommend you continue your learning with [Microsoft Security, Compliance, and Identity Fundamentals.](https://learn.microsoft.com/en-us/training/paths/describe-concepts-of-security-compliance-identity/?WT.mc_id=academic-96948-sayoung) Ultimately, you could consider taking the [Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals exam.](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-900/?WT.mc_id=academic-96948-sayoung)

If you have any feedback or suggestions on this course and any content we're missing, we'd love to hear from you!

<table>
<tr><td>No</td><td>Lesson</td><td>Learning objectives</td></tr>
<tr><td colspan="3"><strong>Module 1: Basic security concepts</strong></td></tr>
<tr><td>1.1</td><td><a href="https://github.com/microsoft/Security-101/blob/main/1.1%20The%20CIA%20triad%20and%20other%20key%20concepts.md">The CIA triad</a></td><td>Learn about confidentiality, availability and integrity. Also authenticity and also nonrepudiation and privacy.</td></tr>
<tr><td>1.2</td><td><a href="https://github.com/microsoft/Security-101/blob/main/1.2%20Common%20cybersecurity%20threats.md">Common cyber security threats</a></td><td>Learn about the common cyber security threats facing individuals and organizations.</td></tr>
<tr>
<td>1.3</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/1.3%20Understanding%20risk%20management.md">Understanding risk management</a></td>
<td>Learn about assessing and understanding risk – impact/likelihood and implementing controls.</td>
</tr>
<tr>
<td>1.4</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/1.4%20Security%20practices%20and%20documentation.md">Security practices and documentation</a></td>
<td>Learn about the difference between policies, procedures, standards, and regulations/laws.</td>
</tr>
<tr>
<td><strong>1.5</strong></td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/1.6%20Shared%20responsibility%20model.md">The shared responsibility model</a></td>
<td>What is the shared responsibility model and how does it affect cybersecurity?</td>
</tr>
<tr>
<td>1.6</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/1.5%20Zero%20trust.md">Zero trust</a></td>
<td>Learn about what is zero trust and how does it affect architecture? What is defense in depth?</td>
</tr>
<tr>
<td>1.7</td>
<td colspan="2"><a href="https://github.com/microsoft/Security-101/blob/main/1.7%20End%20of%20module%20quiz.md">End of module quiz</a></td>
</tr>
<tr><td colspan="3"><strong>Module 2: Identity & access management fundamentals</strong></td></tr>
<td>2.1</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/2.1%20IAM%20key%20concepts.md">IAM key concepts</a></td>
<td>Learn about the principle of least privilege, segregation of duties, how IAM supports zero trust.</td>
</tr>
<tr>
<td>2.1</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/2.2%20IAM%20zero%20trust%20architecture.md">IAM zero trust architecture</a></td>
<td>Learn about how identity is the new perimeter for modern IT environments and the threats it mitigates.</td>
</tr>
<tr>
<td>2.3</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/2.3%20IAM%20capabilities.md">IAM capabilities</a></td>
<td>Learn about IAM capabilities and controls to secure identities</td>
</tr>
<tr>
<td>2.4</td>
<td colspan="2"><a href="https://github.com/microsoft/Security-101/blob/main/2.4%20End%20of%20module%20quiz.md">End of module quiz</a></td>
<tr><td colspan="3"><strong>Module 3: Network security fundamentals</strong></td></tr>
<tr>
<td>3.1</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/3.1%20Networking%20key%20concepts.md">Networking key concepts</a></td>
<td>Learn about networking concepts (IP addressing, port numbers, encryption, etc.)</td>
</tr>
<tr>
<td>3.2</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/3.2%20Networking%20zero%20trust%20architecture.md">Networking zero trust architecture</a></td>
<td>Learn about how networking contributes to an E2E ZT architecture and the threats it mitigates.</td>
</tr>
<tr>
<td>3.3</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/3.3%20Network%20security%20capabilities.md">Network security capabilities</a></td>
<td>Learn about network security tooling – firewalls, WAF, DDoS protection, etc.</td>
</tr>
<tr>
<td>3.4</td>
<td colspan="2"><a href="https://github.com/microsoft/Security-101/blob/main/3.4%20End%20of%20module%20quiz.md">End of module quiz</a></td>
</tr>
<tr><td colspan="3"><strong>Module 4: Security operations fundamentals</strong></td></tr>
<tr>
<td>4.1</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/4.1%20SecOps%20key%20concepts.md">SecOps key concepts</a></td>
<td>Learn about why security operations are important and how it differs from normal IT ops teams.</td>
</tr>
<tr>
<td>4.2</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/4.2%20SecOps%20zero%20trust%20architecture.md">SecOps zero trust architecture</a></td>
<td>Learn about how SecOps contributes to an E2E ZT architecture and the threats it mitigates.</td>
</tr>
<tr>
<td>4.3</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/4.3%20SecOps%20capabilities.md">SecOps capabilities</a></td>
<td>Learn about SecOps tooling – SIEM, XDR, etc.</td>
</tr>
<tr>
<td>4.4</td>
<td colspan="2"><a href="https://github.com/microsoft/Security-101/blob/main/4.4%20End%20of%20module%20quiz.md">End of module quiz</a></td>
</tr>
<tr><td colspan="3"><strong>Module 5: Application security fundamentals</strong></td></tr>
<tr>
<td>5.1</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/5.1%20AppSec%20key%20concepts.md">AppSec key concepts</a></td>
<td>Learn about AppSec concepts such as secure by design, input validation, etc.</td>
</tr>
<tr>
<td>5.2</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/5.3%20AppSec%20key%20capabilities.md">AppSec capabilities</a></td>
<td>Learn about AppSec tooling: pipeline security tools, code scanning, secret scanning, etc.</td>
</tr>
<tr>
<td>5.3</td>
<td colspan="2"><a href="https://github.com/microsoft/Security-101/blob/main/5.4%20End%20of%20module%20quiz.md">End of module quiz</a></td>
</tr>
<tr><td colspan="3"><strong>Module 6: Infrastructure security fundamentals</strong></td></tr>
<tr>
<td>6.1</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/6.1%20Infrastructure%20security%20key%20concepts.md">Infrastructure security key concepts</a></td>
<td>Learn about hardening systems, patching, security hygiene, container security.</td>
</tr>
<tr>
<td>6.2</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/6.2%20Infrastructure%20security%20capabilities.md">Infrastructure security capabilities</a></td>
<td>Learn about tooling that can assist with infrastructure security e.g. CSPM, container security, etc.</td>
</tr>
<tr>
<td>6.3</td>
<td colspan="2"><a href="https://github.com/microsoft/Security-101/blob/main/6.3%20End%20of%20module%20quiz.md">End of module quiz</a></td>
</tr>
<tr><td colspan="3"><strong>Module 7: Data security fundamentals</strong></td></tr>
<tr>
<td>7.1</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/7.1%20Data%20security%20key%20concepts.md">Data security key concepts</a></td>
<td>Learn about data classification and retention and why this is important to an organization.</td>
</tr>
<tr>
<td>7.2</td>
<td><a href="https://github.com/microsoft/Security-101/blob/main/7.2%20Data%20security%20capabilities.md">Data security capabilities</a></td>
<td>Learn about data security tooling – DLP, inside risk management, data governance, etc.</td>
</tr>
<tr>
<td>7.3</td>
<td colspan="2"><a href="https://github.com/microsoft/Security-101/blob/main/7.3%20End%20of%20module%20quiz.md">End of module quiz</a></td>
</tr>
</table>

## 🌐 Help Wanted!

Would you like to contribute a translation? Please read our [translation guidelines](https://github.com/microsoft/Security-101).

## 🎒 Other Courses

Our team produces other courses! Check out:

- [ML for Beginners](https://aka.ms/ml-beginners?WT.mc_id=academic-96948-sayoung)
- [Data Science for Beginners](https://aka.ms/datascience-beginners?WT.mc_id=academic-96948-sayoung)
- [AI for Beginners](https://aka.ms/ai-beginners?WT.mc_id=academic-96948-sayoung)
- [Generative AI for Beginners](https://aka.ms/ai-beginners?WT.mc_id=academic-96948-sayoung)
- [Web Dev for Beginners](https://aka.ms/webdev-beginners?WT.mc_id=academic-96948-sayoung)
- [IoT for Beginners](https://aka.ms/iot-beginners?WT.mc_id=academic-96948-sayoung)
- [XR Development for Beginners](https://github.com/microsoft/xr-development-for-beginners?WT.mc_id=academic-96948-sayoung)
- [Mastering GitHub Copilot for AI Paired Programming](https://aka.ms/GitHubCopilotAI?WT.mc_id=academic-96948-sayoung)