wwc2025 /Cyber for Beginners

Day 2 — Defensive Security, Detection, and Response

Overview of defensive security and monitoring

What today is about

Day 2 focuses on how defenders actually operate in the real world.

Instead of starting with tools, we start with visibility:

  • How do you know what is happening?
  • How do you recognize problems early?
  • How do you respond in a structured way?

By the end of today, you will be able to:

  • Explain what “good” defensive security looks like
  • Describe how detection workflows operate
  • Understand endpoint, network, and log visibility
  • Explain SIEM concepts without relying on specific tools
  • Walk through a basic incident response process
  • Recognize advanced social engineering techniques
  • Explain cloud security basics and shared responsibility
  • Discuss how AI affects both attackers and defenders

How today will work

  • Short concept lessons
  • Scenario-based discussion
  • Hands-on labs (via the Lab Hub)
  • Reflection on how these ideas can be taught in class

Quick recap (from Day 1)

Answer these mentally before continuing:

  • What is the CIA Triad?
  • What is risk?
  • What is the difference between a threat and a vulnerability?
  • Why does visibility matter in security?

If those feel fuzzy, that’s okay — today will reinforce them.