Course summary

Cybersecurity

Use this page to revisit what each stage gives you and return to the exact weak point that needs another pass.

Stage 1 of 3

Cybersecurity Foundations

Friendly on-ramp for data, networks, passwords, phishing and everyday defences using in-browser practice tools.

M01

What cybersecurity is and is not

Cybersecurity is the practice of reducing risk in digital systems .

Open module
M02

Risk and security outcomes

Security is risk management.

Open module
M03

Data, encoding, and integrity

I want you to see how data turns into bits, how meaning is encoded, and why small changes can quietly break integrity.

Open module
M04

Networks, transport, and what leaks

Networks move data in pieces, not in one blob.

Open module
M05

CIA and simple attacks

CIA is a simple lens I use to explain what went wrong and what to fix first.

Open module
M06

Identity and access

Identity is where most real world attacks start because stolen access is cheaper than breaking encryption.

Open module
M07

Human factors and phishing

If we design the system so the safe action is slow and awkward, people will route around it.

Open module
M08

Privacy and everyday data protection

Privacy is not only a legal idea.

Open module
M09

Foundations capstone

This capstone turns learning into action.

Open module

Stage 2 of 3

Applied Cybersecurity

Think like attackers and defenders with threat modelling, web auth flows, common vulns, logs, and risk trade-offs.

M01

Threat modelling as design

Security improves fastest when I can answer one question clearly.

Open module
M02

Identity and access control

Authentication answers who you are.

Open module
M03

Web security in practice

Most breaches start with what is exposed, not with exotic zero days.

Open module
M04

API and service security

When you review an API, focus on these ideas.

Open module
M05

Verification and release gates

In practice, you verify three things.

Open module
M06

Logging and detection basics

Prevention is never perfect.

Open module
M07

Applied capstone

This capstone is a short design review.

Open module

Stage 3 of 3

Cybersecurity Practice and Strategy

Join up governance, secure design, DevSecOps, CVEs, incident response and business-focused risk thinking.

M01

Secure SDLC

Security becomes real when it is built into how work ships.

Open module
M02

Exposure reduction and zero trust

Zero trust is simple.

Open module
M03

Runtime and cloud security

Crypto is only useful when it is applied correctly.

Open module
M04

Supply chain security

Supply chain risk is the uncomfortable truth that you inherit other people’s security decisions.

Open module
M05

Vulnerability management

Vulnerability management is not a panic feed.

Open module
M06

Detection and incident response

Detection closes the gap between compromise and action.

Open module
M07

Privacy, ethics, and auditability

This section is the glue.

Open module
M08

System ilities

System ilities are the properties that decide whether you survive a bad day.

Open module
M09

Capstone professional practice

Pick one system you understand.

Open module