Skip to the content.

Cyber Security Extra Credit

Continue with Classes, Queues, performing Sorts and BigO analysis on your algorithm(s).

Real-World Threats

  • Internal Threats (be curious about unusual internal behavior)
  • Phishing (Individual Level)
  • Intellectual Property Loss (Company Level)
  • Backdoors/0-days
  • Ransomware (All levels)

Cybersecurity Careers

  • Defensive Roles
  • White Hat Hackers (Ethical hackers who test systems for vulnerabilities)
  • Threat Detection:

Best Practices to Remember

  • Keep Learning: Cyber threats evolve, and so should your knowledge.
  • Be Skeptical: Speak up about anything suspicious
  • Follow basic practices like strong passwords, updates, and two-factor authentication.

Personal Notes for CSA Project

  • Hide your webhooks and tokens—never commit them directly into files.
  • Explore safety certifications like A+ and C+ to boost your foundational knowledge.
![Image](https://github.com/user-attachments/assets/899c56c8-336b-492a-8849-c30b06c9543d)