Fundamentals
🛡️
Security 101
Bring it all together — threats, cryptography, SIEM, incident response, NAC, compliance, and SOC operations for real-world cybersecurity defense.
📖 18 Modules
⏱ ~30 Hours
🎓 Certificate of Completion
This course is under development
High-quality content is being crafted. Get notified when enrollment opens.
Notify Me When Available →Syllabus
Course Content
01
Introduction to Cybersecurity
⏱ ~1.5 hours
The cybersecurity landscape
CIA triad and security principles
Attack surfaces and threat actors
Cybersecurity career paths
02
Threats & Attack Vectors
⏱ ~2 hours
Malware types: viruses, worms, ransomware
Social engineering and phishing
Network attacks: DDoS, MitM, DNS poisoning
Web application attacks: SQLi, XSS, CSRF
03
Cryptography Fundamentals
⏱ ~2 hours
Symmetric vs asymmetric encryption
Hashing algorithms: MD5, SHA
PKI and digital certificates
TLS/SSL handshake process
04
Identity & Access Management
⏱ ~1.5 hours
Authentication factors and MFA
RBAC, ABAC, and least privilege
SSO and federation
PAM and privileged access
05
Network Security
⏱ ~2 hours
Firewalls: stateful, NGFW, WAF
IDS/IPS deployment
VPN technologies: IPSec, SSL
Network segmentation and microsegmentation
06
Endpoint Security
⏱ ~1.5 hours
Antivirus vs EDR vs XDR
Host-based firewalls and HIPS
Application whitelisting
Mobile device management (MDM)
07
Network Access Control (NAC)
⏱ ~2 hours
NAC architecture and components
802.1X authentication
Posture assessment and remediation
NAC deployment strategies
08
Vulnerability Management
⏱ ~1.5 hours
Vulnerability scanning tools
CVSS scoring and prioritization
Patch management lifecycle
Penetration testing overview
09
Security Information & Event Management
⏱ ~2 hours
SIEM architecture and log collection
Correlation rules and alerts
Use cases and detection engineering
ELK Stack and Splunk overview
10
Incident Response
⏱ ~2 hours
IR lifecycle: preparation to lessons learned
Evidence collection and chain of custody
Containment and eradication strategies
Post-incident reporting
11
Digital Forensics Introduction
⏱ ~1.5 hours
Forensic imaging and preservation
File system analysis
Memory forensics with Volatility
Network forensics basics
12
Security Operations Center (SOC)
⏱ ~1.5 hours
SOC roles and responsibilities
Tier 1, 2, 3 analyst workflow
Playbooks and runbooks
SOC metrics and KPIs
13
Cloud Security
⏱ ~1.5 hours
Shared responsibility model
Cloud security posture management
Identity federation in cloud
CASB and CSPM tools
14
Risk Management
⏱ ~1.5 hours
Risk assessment methodologies
Qualitative vs quantitative analysis
Risk treatment options
Risk registers and reporting
15
Compliance & Governance
⏱ ~1.5 hours
ISO 27001 and NIST frameworks
PCI-DSS, HIPAA, GDPR overview
Security policies and procedures
Audit preparation and evidence
16
Email & Web Security
⏱ ~1 hour
Email security gateways
SPF, DKIM, DMARC
Web proxy and URL filtering
DLP for email and web
17
Security Awareness & Culture
⏱ ~1 hour
Building a security-aware culture
Phishing simulation programs
Security training best practices
Measuring awareness effectiveness
18
Capstone Lab — SOC Simulation
⏱ ~2.5 hours
Investigate a simulated security incident
Analyze logs in a SIEM environment
Perform basic forensic analysis
Write an incident response report
What You'll Learn
Learning Outcomes
🛡️
Threat Defense
Identify, analyze, and respond to cybersecurity threats.
🔍
SOC Operations
Work as a security analyst using SIEM and IR processes.
📋
Compliance
Understand frameworks like ISO 27001 and NIST.
🔐
Security Architecture
Design layered defenses with NAC, NGFW, and EDR.
Prerequisites
Before You Start
✅IT 101 and Network 101 recommended
💻A computer capable of running virtual machines
🧠Understanding of operating systems and networking
Lab Environment
What You'll Use
🖥️VMware Workstation / ESXi
🐧Ubuntu / Kali Linux
🪟Windows Server with AD
📦ELK Stack / Splunk Free