Fundamentals 4.9
🛡️

Security 101

Bring it all together — threats, cryptography, SIEM, incident response, NAC, compliance, and SOC operations for real-world cybersecurity defense.

📖 18 Modules
⏱ ~30 Hours
🎓 Certificate of Completion
💰 Free
Security 101

This course is under development

High-quality content is being crafted. Get notified when enrollment opens.

Notify Me When Available →

Course Content

01 Introduction to Cybersecurity ⏱ ~1.5 hours
The cybersecurity landscape
CIA triad and security principles
Attack surfaces and threat actors
Cybersecurity career paths
02 Threats & Attack Vectors ⏱ ~2 hours
Malware types: viruses, worms, ransomware
Social engineering and phishing
Network attacks: DDoS, MitM, DNS poisoning
Web application attacks: SQLi, XSS, CSRF
03 Cryptography Fundamentals ⏱ ~2 hours
Symmetric vs asymmetric encryption
Hashing algorithms: MD5, SHA
PKI and digital certificates
TLS/SSL handshake process
04 Identity & Access Management ⏱ ~1.5 hours
Authentication factors and MFA
RBAC, ABAC, and least privilege
SSO and federation
PAM and privileged access
05 Network Security ⏱ ~2 hours
Firewalls: stateful, NGFW, WAF
IDS/IPS deployment
VPN technologies: IPSec, SSL
Network segmentation and microsegmentation
06 Endpoint Security ⏱ ~1.5 hours
Antivirus vs EDR vs XDR
Host-based firewalls and HIPS
Application whitelisting
Mobile device management (MDM)
07 Network Access Control (NAC) ⏱ ~2 hours
NAC architecture and components
802.1X authentication
Posture assessment and remediation
NAC deployment strategies
08 Vulnerability Management ⏱ ~1.5 hours
Vulnerability scanning tools
CVSS scoring and prioritization
Patch management lifecycle
Penetration testing overview
09 Security Information & Event Management ⏱ ~2 hours
SIEM architecture and log collection
Correlation rules and alerts
Use cases and detection engineering
ELK Stack and Splunk overview
10 Incident Response ⏱ ~2 hours
IR lifecycle: preparation to lessons learned
Evidence collection and chain of custody
Containment and eradication strategies
Post-incident reporting
11 Digital Forensics Introduction ⏱ ~1.5 hours
Forensic imaging and preservation
File system analysis
Memory forensics with Volatility
Network forensics basics
12 Security Operations Center (SOC) ⏱ ~1.5 hours
SOC roles and responsibilities
Tier 1, 2, 3 analyst workflow
Playbooks and runbooks
SOC metrics and KPIs
13 Cloud Security ⏱ ~1.5 hours
Shared responsibility model
Cloud security posture management
Identity federation in cloud
CASB and CSPM tools
14 Risk Management ⏱ ~1.5 hours
Risk assessment methodologies
Qualitative vs quantitative analysis
Risk treatment options
Risk registers and reporting
15 Compliance & Governance ⏱ ~1.5 hours
ISO 27001 and NIST frameworks
PCI-DSS, HIPAA, GDPR overview
Security policies and procedures
Audit preparation and evidence
16 Email & Web Security ⏱ ~1 hour
Email security gateways
SPF, DKIM, DMARC
Web proxy and URL filtering
DLP for email and web
17 Security Awareness & Culture ⏱ ~1 hour
Building a security-aware culture
Phishing simulation programs
Security training best practices
Measuring awareness effectiveness
18 Capstone Lab — SOC Simulation ⏱ ~2.5 hours
Investigate a simulated security incident
Analyze logs in a SIEM environment
Perform basic forensic analysis
Write an incident response report

Learning Outcomes

🛡️

Threat Defense

Identify, analyze, and respond to cybersecurity threats.

🔍

SOC Operations

Work as a security analyst using SIEM and IR processes.

📋

Compliance

Understand frameworks like ISO 27001 and NIST.

🔐

Security Architecture

Design layered defenses with NAC, NGFW, and EDR.

Before You Start

IT 101 and Network 101 recommended
💻A computer capable of running virtual machines
🧠Understanding of operating systems and networking

What You'll Use

🖥️VMware Workstation / ESXi
🐧Ubuntu / Kali Linux
🪟Windows Server with AD
📦ELK Stack / Splunk Free