Cybersecurity course

From foundations to practice

A clear route from zero to confident. No hidden prerequisites. Every module stays tied to a real decision so you can explain security, not just repeat it.
  • FocusReal systems and real habits, not theory alone.
  • ToolsIn browser labs you can reuse with a team.
  • CPDAssessments and certificates fund keeping learning free.
CPD hours
Cybersecurity
56
hours
Hours are fixed by the course design. Timed assessment time is included once on pass.

This course has three core levels plus a summary and games page. Move through them at your own pace and revisit the labs whenever you need a reset.

CPD and certificates
If you want CPD evidence and certificates, sign in before you start learning so the system can record your progress. Assessments and certificates also help keep this site free for everyone.

⏱️CPD timing

CPD timing

Time estimate (transparent)

I publish time estimates because CPD needs to be defensible. The goal is honesty, not marketing.

Guided learning

56h

Core levels, structured learning

Practice and consolidation

3h

Summary, drills, revisits

Notional range

36 to 84 hours

Quick: core concepts + one exercise per module. Standard: exercises + reflections for CPD evidence. Deep: extra drills and portfolio artefacts.

How I estimate time

I use a notional learning hours approach and I keep the assumptions visible. Where modules are content heavy, I add practice so the hours are earned, not claimed.

  • Reading: 225 words per minute, multiplied by 1.3 for note taking and checking understanding.
  • Labs and practice: about 15 minutes per guided activity, including at least one retry.
  • Reflection for CPD: about 8 minutes per module for a short defensible note and evidence link.
  • Assessments: about 1.4 minutes per question for reading, thinking, and review.

If you study faster or slower, your hours will differ. What matters is that the method is consistent and the activities are real.

🧪Assessment blueprint

Assessment and practice assessment

Cybersecurity assessment blueprint

Assessments are designed for CPD evidence and skill building. They are not endorsed by certification bodies. Where exams exist, I make the marking and expectations explicit.

Foundations

mixed

Terminology, safe habits, and correct reasoning about basic security decisions.

Questions: 50
Time: 75 minutes
Pass mark: 80%

Applied

scenario

Scenario based judgement, common failure modes, and trade-offs between controls.

Questions: 50
Time: 75 minutes
Pass mark: 80%

Practice and Strategy

mixed

Governance, risk communication, and defensible decisions with evidence.

Questions: 50
Time: 75 minutes
Pass mark: 80%
Design rules
  • Every question must map to at least one learning outcome and one standards anchor (for example NIST CSF 2.0 or ISO 27001 controls).
  • Wrong answers must represent a real misconception, not a silly trick.
  • Feedback should explain what changed if you swap one assumption, not only state the correct option.

📚Standards and certifications

Standards and certifications

The map we anchor to

I map each course to reputable standards so your learning is defensible at work. I also show common certifications and how their language differs.

Important: This content aligns with these standards and certifications for learning purposes. This is guidance, not endorsement. We are not affiliated with certification providers unless explicitly stated.

Primary anchor standards

  • NIST Cybersecurity Framework (CSF 2.0)
    NIST

    A clean way to explain outcomes and maturity across govern, identify, protect, detect, respond, and recover.

    Official reference
  • ISO/IEC 27001 and 27002
    ISO/IEC

    Audit-friendly control thinking: governance, scope, evidence, and continuous improvement.

    Official reference

Certification routes

This course is not endorsed by certification bodies. It is built to prepare you honestly, including where exams simplify reality.

  • (ISC)2 Certified in Cybersecurity (CC)
    (ISC)2
    foundation

    A sensible entry route that checks terminology, fundamentals, and basic judgement.

  • CompTIA Security+
    CompTIA
    foundation

    Common baseline for terminology and applied security concepts across industry.

  • CISSP
    (ISC)2
    leadership

    Breadth and governance framing. Useful if you want senior roles, but do not confuse it with hands-on mastery.

  • CISM and CRISC
    ISACA
    leadership

    Management and risk framing. Helpful when you are expected to defend decisions, not just fix tickets.

Organisations and resources

These are the kinds of organisations professionals reference. If you learn how to use them properly, you become harder to mislead.

  • OWASP

    What it is: A global community that publishes practical application security guidance.

    Why it matters: It gives you common failure patterns. It does not replace threat modelling or secure design.

  • CVE and CWE ecosystem (NVD and MITRE)

    What it is: Shared identifiers and taxonomies for known vulnerabilities and weakness classes.

    Why it matters: It helps teams speak the same language about issues. It is not a strategy by itself.

  • MITRE ATT and CK

    What it is: A knowledge base of attacker tactics and techniques.

    Why it matters: It helps you move from generic controls to threat-informed defence and realistic detection.

  • CISA

    What it is: US Cybersecurity and Infrastructure Security Agency guidance and alerts.

    Why it matters: Often useful for real-world prioritisation and common exploited vulnerabilities.

🧾Terminology translation

Terminology translation

Incident triage and response

If you want to be calm under pressure, you need shared words. This is where teams usually talk past each other.

Event, alert, incident, breach

Plain English

An event is something that happened. An alert is a tool shouting. An incident is when it matters. A breach is a specific kind of incident with confirmed loss of confidentiality, integrity, or availability, often with reporting implications.

How standards use it

  • NIST CSF 2.0

    Pushes governance and outcomes. Classification thresholds belong in the govern function, then they drive detect and respond behaviour.

  • Incident response guidance (NIST SP 800-61 style)

    Treats event versus incident as a practical decision boundary so the team can prioritise properly.

  • ISO/IEC 27001 and incident management practice

    Focuses on managed process, evidence, and continual improvement, including post incident learning.

Common mistake

Calling everything an incident, then burning out the team and missing the real fire.

My take

Treat incident as a decision, not a feeling. Define the promotion criteria and train them. If you cannot explain why it is an incident, it is still an event.

Quick check

You see a suspicious process. What two facts would you require before you call it an incident?

Signal versus noise

Plain English

Signal is evidence that changes what you do. Noise is everything else.

How standards use it

  • NIST CSF 2.0

    Detection is about outcomes, not alert counts. The goal is decision quality.

Common mistake

Buying a tool and assuming it creates signal automatically.

My take

If your system produces 10,000 alerts and no decisions, you have built an expensive anxiety machine.

Quick check

Name one signal you would trust and one type of noise you would suppress first.

Containment, eradication, recovery

Plain English

Stop the bleeding, remove the cause, restore normal service.

How standards use it

  • Incident response playbooks

    A common lifecycle used to keep response orderly and evidence-friendly.

Common mistake

Jumping to eradication before containment and accidentally deleting evidence.

My take

Evidence first, panic never. You can be fast without being chaotic.

Quick check

Why can eradication too early make the incident worse?

🛡️Core path

📦What you will build

You will produce three small artefacts that you can reuse at work. They are designed to be defensible, practical, and easy to explain.

Personal Security Baseline
Foundations output
A simple plan for accounts and devices that you can actually sustain, plus evidence that you applied it.
Feature Security Review Pack
Applied output
A compact review pack for one feature: risks, controls, verification, and what evidence you would keep.
Operational Security Pack
Practice and Strategy output
A system-level pack you can defend: scope, top risks, control coverage, runbooks, and evidence quality.

🧩Module coverage matrix

Coverage matrix

Module-level coverage

This matrix makes the course defensible: each module is tied to an outcome focus, the anchor standards, and the evidence you can produce.

Artefact templates
LevelModuleOutcome focusDomainsAlignmentAssessmentEvidence
Foundations
Security Is
foundations-f0-what-security-is
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Explain security as risk management (not fear), and define what you are protecting.basicsNIST CSF 2.0: GovernPractice + timedTemplate + rubric
Foundations
And Outcomes
foundations-f1-risk-and-outcomes
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Describe risk using likelihood and impact, and connect controls to outcomes.basics, governanceNIST CSF 2.0: Govern · NIST CSF 2.0: IdentifyPractice + timedTemplate + rubric
Foundations
And Integrity
foundations-f2-data-and-integrity
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Reason about data handling, integrity, and common tampering/validation failure modes.basics, webNIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Foundations
And Transport
foundations-f3-networks-and-transport
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Explain how network assumptions affect security decisions (transport, exposure, trust boundaries).networkNIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Foundations
And Simple Attacks
foundations-f4-cia-and-simple-attacks
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Apply CIA triad to real decisions and spot basic attack patterns and misconceptions.basicsNIST CSF 2.0: Identify · NIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Foundations
And Access
foundations-f5-identity-and-access
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Make defensible identity and access decisions (MFA, least privilege, authn vs authz).identityNIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Foundations
Factors And Phishing
foundations-f6-human-factors-and-phishing
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Reduce human-factor risk with practical habits and anti-phishing controls.phishingNIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Foundations
And Everyday Data Protection
foundations-f7-privacy-and-everyday-data-protection
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Protect personal data with clear handling rules and realistic privacy trade-offs.privacyNIST CSF 2.0: Govern · NIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Foundations
Capstone
foundations-f8-foundations-capstone
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Produce a simple, sustainable personal security baseline and evidence that you applied it.basics, governanceNIST CSF 2.0: Govern · NIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Applied
Modelling As Design
applied-a1-threat-modelling-as-design
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Use threat modelling to improve design decisions and prioritise realistic mitigations.threat-modelsNIST CSF 2.0: Identify · NIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Applied
And Access Control
applied-a2-identity-and-access-control
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Apply authorisation patterns and access controls to real systems and failure modes.identity, webNIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Applied
App Security
applied-a3-web-app-security
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Recognise and prevent common web app failures (IDOR, injection classes, session risks).webNIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Applied
And Service Security
applied-a4-api-and-service-security
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Secure services and APIs with correct boundaries, authz, and verification discipline.web, identityNIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Applied
And Release Gates
applied-a5-verification-and-release-gates
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Build verification and release gates that catch failures before production.governanceNIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Applied
And Detection Basics
applied-a6-logging-and-detection-basics
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Design logging that creates detection signal without leaking secrets, and know what good looks like.detectionNIST CSF 2.0: DetectPractice + timedTemplate + rubric
Applied
Capstone
applied-a7-applied-capstone
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Produce a feature security review pack: risks, controls, verification, and evidence choices.threat-models, governanceNIST CSF 2.0: Govern · NIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Practice
Sdlc
practice-p1-secure-sdlc
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Run security as part of delivery: roles, SDLC, and evidence-based quality gates.governanceNIST CSF 2.0: Govern · NIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Practice
And Cloud Security
practice-p3-runtime-and-cloud-security
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Reason about runtime and cloud risks and choose controls you can evidence.cloud, governanceNIST CSF 2.0: Protect · NIST CSF 2.0: DetectPractice + timedTemplate + rubric
Practice
Reduction Zero Trust
practice-p2-exposure-reduction-zero-trust
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Reduce exposure using segmentation, least privilege, and zero-trust-style thinking.network, identityNIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Practice
Management
practice-p5-vulnerability-management
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Prioritise and remediate vulnerabilities using exploitability, exposure, and business impact.vuln-mgmtNIST CSF 2.0: Identify · NIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Practice
And Incident Response
practice-p6-detection-and-incident-response
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Contain, investigate, and recover with evidence-first incident response discipline.response, detectionNIST CSF 2.0: Detect · NIST CSF 2.0: Respond · NIST CSF 2.0: RecoverPractice + timedTemplate + rubric
Practice
Chain Security
practice-p4-supply-chain-security
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Manage supply chain risk with practical controls and verification.supply-chainNIST CSF 2.0: Identify · NIST CSF 2.0: ProtectPractice + timedTemplate + rubric
Practice
Ethics Auditability
practice-p7-privacy-ethics-auditability
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Make privacy and ethics decisions with audit-friendly evidence and retention discipline.privacy, governanceNIST CSF 2.0: GovernPractice + timedTemplate + rubric
Practice
Ilities
practice-p8-system-ilities
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Design for resilience and operational safety: you assume failure and plan accordingly.reliabilityNIST CSF 2.0: Protect · NIST CSF 2.0: RecoverPractice + timedTemplate + rubric
Practice
Professional Practice
practice-p9-capstone-professional-practice
Anchors: NIST Cybersecurity Framework (CSF 2.0), ISO/IEC 27001 and 27002
Produce an operational security pack you can defend: scope, risks, controls, runbooks, evidence.governance, responseNIST CSF 2.0: Govern · NIST CSF 2.0: RespondPractice + timedTemplate + rubric

📚How to use this course

  1. Move through Foundations, Applied, and Practice in order for the cleanest progress.
  2. Use the labs when a concept feels fuzzy. The goal is judgement, not memorisation.
  3. Record a few minutes when you practise so your CPD record stays honest and useful.
  4. Come back later and redo the capstones on a new system. That is where depth builds.

🏁Certification assessment

Each level has a timed assessment with detailed feedback after submission. You need an account and credits to start. Certificates help your career and help keep this site free.

Practice before the timed attempt
Use the labs, the summary scenarios, and the CPD prep pack to practise first. Then start the timed attempt when you are ready.
CPD prep pack
CPD candidates will get practice flows and targeted revision prompts designed to help you pass. Access is for one year from purchase and subject to availability.

🛠️Quick practice

Checkpoint

Why keep the course plain and structured

How many core levels does the course have

Quick feedback

Optional. This helps improve accuracy and usefulness. No accounts required.