Back to Courses
BeginnerCybersecurity

Fundamentals of Security

Core security principles across networking, firewalls, and foundational defensive practices.

5 weeks
25 Lessons
5,120 Students
4.8

1. Security Principles

CIA triad, risk, threat, vulnerability, and basic security models.

30 min

2. Threats and Attack Vectors

Common attacks, social engineering, malware types, and kill chain basics.

35 min

3. Networking for Security

Ports, protocols, segmentation, and why network design matters to defense.

32 min

4. Firewalls and Access Control

Packet vs stateful vs next-gen firewalls, ACLs, and rule design.

38 min

5. Lab: Build Firewall Rules

Hands-on creating allow/deny lists, least privilege, and logging.

55 min

6. Security Architecture Basics

Defense in depth, DMZ, zoning, and secure baselines.

30 min

7. Monitoring and Logging Fundamentals

What to log, where to log, and how to monitor effectively.

28 min

8. Assignment: Secure Network Design

Design a small network with firewall rules and logging strategy.

75 min

9. Quiz: Security Foundations

Assess knowledge of core security concepts and controls.

25 min

10. Risk Management Fundamentals

Learn risk identification, risk scoring, and treatment options (accept, transfer, mitigate, avoid) using beginner-friendly case studies.

32 min

11. Asset Classification and Data Sensitivity

Classify information by business impact and map handling rules for public, internal, confidential, and restricted data.

30 min

12. Lab: Data Classification Workshop

Tag sample datasets by sensitivity level and apply correct handling controls such as encryption, retention, and access restrictions.

55 min

13. Authentication and Authorization Basics

Differentiate identity verification from permission control, and learn practical role-based access patterns for secure systems.

34 min

14. Password Policies and MFA Design

Build strong password policy requirements and understand where MFA adds security and where usability trade-offs matter.

31 min

15. Lab: Access Control Design

Create user roles, define least-privilege permissions, and test role assignments against business scenarios.

60 min

16. Security Policies and Standards

Write practical policy statements and map them to standards and procedures beginners can implement in real teams.

29 min

17. Vulnerability Management Lifecycle

Understand discovery, triage, remediation, verification, and reporting across a basic vulnerability program.

33 min

18. Lab: Basic Vulnerability Triage

Analyze mock findings, prioritize by risk, assign remediation owners, and define verification steps.

58 min

19. Secure Network Segmentation Principles

Learn why segmentation limits lateral movement and how to separate user, server, and admin zones safely.

30 min

20. Endpoint Security Essentials

Cover antivirus/EDR basics, patching posture, local hardening, and user behavior controls for endpoints.

32 min

21. Lab: Build a Security Baseline

Apply a starter baseline checklist to endpoints and servers, then document deviations and fixes.

65 min

22. Incident Response Fundamentals

Understand detection, containment, eradication, recovery, and lessons learned with beginner-focused scenarios.

35 min

23. Lab: Mini Incident Simulation

Respond to a mock malware alert by triaging evidence, isolating affected hosts, and documenting actions.

70 min

24. Governance, Compliance, and Ethics

Explore legal and ethical fundamentals, compliance obligations, and responsible security decision-making.

28 min

25. Capstone: Security Fundamentals Blueprint

Create a full beginner-friendly security blueprint combining access control, segmentation, logging, vulnerability handling, and incident response.

95 min