Cyber Security Fundamentals 2020: A Comprehensive Study Guide
So you're prepping for a cybersecurity fundamentals assessment. Practically speaking, maybe it's a certification exam, maybe it's a course requirement, maybe your employer dropped this in your lap and said "good luck. " Either way, you're here because you want to understand the core concepts — not just memorize answers, but actually get what cybersecurity is all about Simple, but easy to overlook..
That's the right instinct. The best test-takers aren't the ones who've seen every question before. They're the ones who understand the why behind the answers No workaround needed..
This guide covers the fundamental concepts you'll encounter on most cybersecurity fundamentals assessments. We'll break down the domains, explain the terminology in plain English, and walk through the kind of thinking that gets questions right. Think of it as a study companion, not a shortcut. Because honestly? The shortcut usually fails when the question gets slightly different.
What Is Cybersecurity Fundamentals?
Cybersecurity fundamentals is the foundation of protecting digital systems, networks, and data from unauthorized access, damage, or theft. It's not one thing — it's a collection of concepts, practices, and technologies that work together to keep information secure That's the part that actually makes a difference..
Here's the thing most people miss at first: cybersecurity isn't just about computers. It's about risk management. Every decision in cybersecurity comes down to one question: "What's the likelihood of something going wrong, and how bad would it be if it did?
That framework shows up in everything from choosing a password to deciding whether a company should spend millions on a security system. Understanding this mental model will help you answer questions that don't have obvious "right" answers Which is the point..
The Core Pillars
Most cybersecurity fundamentals courses organize their content around these key areas:
- Confidentiality — making sure sensitive information stays private
- Integrity — ensuring data hasn't been altered or tampered with
- Availability — making sure systems and data are accessible when needed
These three concepts (the CIA triad, no, not that CIA) show up everywhere. You'll see questions built around them directly, and you'll see them as the underlying logic in more complex scenarios It's one of those things that adds up..
Why It Matters (And Why Your Test Cares)
Here's the reality: cybersecurity isn't optional anymore. Every employee is a potential entry point for an attacker. On the flip side, every company is a technology company, even if they make physical products. The person sitting next to you might be the reason your company's data ends up on the dark web — not because they're malicious, but because they clicked a link they shouldn't have Small thing, real impact. Surprisingly effective..
This is why assessments exist. So not to torture you, but because the stakes are real. When you understand cybersecurity fundamentals, you're not just passing a test — you're developing a mindset that protects organizations, customers, and yourself It's one of those things that adds up..
The 2020 context matters too. Security teams were scrambling to secure home networks, personal devices, and video conferencing tools that had never been enterprise staples. The pandemic forced millions of companies into remote work almost overnight. Many of the threats and concepts you'll see on your test were shaped by that shift Small thing, real impact..
Honestly, this part trips people up more than it should.
How It Works: Key Domains Explained
Let's break down the major areas you'll need to know. This is where the real depth lives And that's really what it comes down to. And it works..
1. Threats, Attacks, and Vulnerabilities
This is often the largest section on fundamentals assessments. You need to know what you're defending against.
Malware is any malicious software — viruses, worms, trojans, ransomware, spyware, and more. The key differences:
- Virus — needs to attach to something to spread
- Worm — spreads on its own, no attachment needed
- Trojan — disguises itself as something legitimate
- Ransomware — locks your data and demands payment
- Spyware — watches what you do, often silently
Phishing is still the most common attack vector. It works because it exploits human psychology, not software vulnerabilities. Spear phishing targets specific people (like executives), while whaling goes after big targets. Smishing uses SMS, vishing uses voice calls That's the part that actually makes a difference..
Social engineering is the broader category — manipulating people into giving up information or access. Pretexting, baiting, tailgating — these are all variations.
DDoS attacks overwhelm systems with traffic. Man-in-the-middle attacks intercept communications. SQL injection exploits database vulnerabilities. Zero-day exploits target vulnerabilities that aren't publicly known yet (the "zero day" is the day the vulnerability is discovered — before there's a patch) And that's really what it comes down to..
The question you're likely to face isn't just "what is X?" It's "given this scenario, which attack type is most likely, and what's the best mitigation?"
2. Technologies and Tools
This section covers the tools cybersecurity professionals use.
Firewalls monitor and control incoming and outgoing network traffic. You need to know the difference between hardware and software firewalls, and the main types: packet-filtering, stateful inspection, and proxy.
Antivirus/anti-malware software detects and removes malicious programs. Modern versions use signature-based detection (matching known bad patterns) and heuristic analysis (looking for suspicious behavior).
Encryption protects data by making it unreadable without the correct key. Symmetric encryption uses the same key to encrypt and decrypt (fast, good for large amounts of data). Asymmetric uses a public key to encrypt and a private key to decrypt (slower, but enables secure communication between parties who've never met).
VPNs create secure, encrypted tunnels for network traffic. Important concept: a VPN protects your data in transit, but it doesn't make you invincible. It doesn't protect against malware, and you're still trusting the VPN provider with your data.
Multi-factor authentication (MFA) requires two or more verification methods. Something you know (password), something you have (token or phone), something you are (fingerprint or face). The strongest MFA combines all three.
3. Identity and Access Management
Who gets access to what? This is both a technical and a policy question.
Authentication verifies identity. Authorization determines what an authenticated user can do. Accounting (or auditing) tracks what users actually did.
Least privilege is a core principle: give users the minimum access they need to do their job, and nothing more. Separation of duties means no single person has complete control over a critical process.
RBAC (role-based access control) assigns permissions based on job function. ABAC (attribute-based access control) is more granular, considering multiple attributes like department, time of day, or device type Not complicated — just consistent. Turns out it matters..
4. Risk Management and Compliance
This is where the business side of cybersecurity lives.
Risk = likelihood × impact. You need to understand how to assess and prioritize risks. A high-likelihood, high-impact risk needs immediate attention. A low-likelihood, low-impact risk might be accepted Most people skip this — try not to. That alone is useful..
Compliance means following rules — laws, regulations, and standards. GDPR protects EU citizens' data. HIPAA protects health information. PCI-DSS protects credit card data. SOC 2 assesses service organizations' security controls Most people skip this — try not to..
Incident response is what happens when something goes wrong anyway. The typical phases: preparation, identification, containment, eradication, recovery, lessons learned. Knowing this process shows up on tests frequently.
5. Network Security
Understanding how networks work is essential to securing them.
TCP/IP is the foundational protocol suite. You should know the difference between TCP (connection-oriented, reliable) and UDP (connectionless, faster but less reliable) That's the whole idea..
Ports are logical endpoints for network communication. Common ones: 80 (HTTP), 443 (HTTPS), 22 (SSH), 21 (FTP). Understanding which ports services use helps you configure firewalls and identify suspicious activity.
DNS translates domain names to IP addresses. It's also a common attack target — DNS poisoning redirects users to malicious sites.
Subnets divide networks into smaller segments. Segmentation limits the blast radius if something gets compromised.
IDS vs. IPS: Intrusion Detection Systems alert you to potential threats. Intrusion Prevention Systems actively block them.
Common Mistakes (What Most People Get Wrong)
A few things trip up test-takers consistently:
Confusing similar terms. Authentication vs. authorization. Symmetric vs. asymmetric encryption. Virus vs. worm. These distinctions matter, and test writers love to use the wrong one in answer choices to see if you're paying attention Simple as that..
Memorizing without understanding. You can memorize that ransomware encrypts files, but if a question gives you a scenario and asks which step to take first, you need to actually understand the incident response process.
Overlooking the human element. People focus on technical controls and forget that social engineering, phishing, and weak passwords are behind most breaches. Any question about "what's the biggest risk?" likely has a human answer Surprisingly effective..
Ignoring the context. A control that's appropriate for a small business might be overkill for an enterprise, and vice versa. Test questions often ask "what's the best solution in this situation," not "what's the theoretically best solution."
Practical Study Tips
Here's what actually works:
Use practice questions — but don't just memorize answers. When you get one wrong, understand why the right answer is right. Same for questions you guess right but aren't sure about.
Know your acronyms. CIA (confidentiality, integrity, availability), MFA, VPN, IDS/IPS, RBAC — the list is long, and you'll see these constantly.
Think like a security professional. When you read a scenario, ask yourself: What's the threat? What's the vulnerability? What's the impact? What's the control?
Don't skip the "soft" topics. Policy, compliance, and incident response often get less attention than flashy hacking topics, but they show up on tests — and they're often where test-takers lose points Small thing, real impact. No workaround needed..
Understand encryption basics. You don't need to be a cryptographer, but you should know when to use symmetric vs. asymmetric, what SSL/TLS does, and why hashing is different from encryption Simple as that..
FAQ
What's the best way to prepare for a cybersecurity fundamentals test?
Start with the exam objectives if they're available. That said, work through each domain systematically, using a combination of reading, hands-on practice, and practice questions. Don't just read — configure things, break things, fix things. The concepts stick better when you've applied them Took long enough..
Is programming knowledge required for cybersecurity fundamentals?
For the fundamentals level, not usually. Also, basic scripting knowledge can help, but most entry-level assessments focus on concepts, not coding. As you advance, programming becomes more relevant No workaround needed..
How long does it take to prepare?
It depends on your background. Someone with IT experience might need a few weeks of focused study. Someone starting from scratch might need a couple of months. Don't rush — the concepts build on each other.
Are the 2020 materials still relevant?
Absolutely. Think about it: threats evolve, but the core principles — risk management, defense in depth, least privilege — remain the same. The fundamentals haven't changed. If you're using 2020 study materials, you're getting solid content.
What's the difference between cybersecurity and information security?
Cybersecurity is a subset that focuses specifically on digital systems and threats. Information security (InfoSec) is broader — it includes any information, regardless of format. In practice, the terms are often used interchangeably at the fundamentals level The details matter here..
The Bottom Line
Here's the truth: you can't memorize your way to cybersecurity knowledge. The field changes too fast, and the best test questions are designed to check your understanding, not your flash cards Which is the point..
What you can do is build a solid mental model. Even so, know the difference between threats, vulnerabilities, and risks. Understand why certain controls exist. Remember that humans are both the biggest attack surface and the first line of defense.
If you grasp the concepts in this guide — not just the definitions, but how they connect — you'll do fine on your assessment. And more importantly, you'll actually be prepared for what comes next Nothing fancy..
Go study. You've got this.