This document provides an introduction to cyber security. It defines cyber security as protecting computer systems and networks from threats. It discusses how Alice's personal and payment details stored on an online shopping website were compromised when she clicked a phishing link and entered her login credentials. The document outlines security goals like authentication, authorization, confidentiality and techniques to protect against threats such as firewalls, strong passwords, antivirus software and two-factor authentication. It also defines networking devices, addressing schemes, DNS, VPNs, viruses, and types of hackers and their roles. Finally, it mentions some job profiles in cyber security.