Course overview

Cybersecurity Course

Three levels mapped against common security frameworks. Friendly, opinionated, and hands-on with browser-first labs.

This is not an exam cram. It is a CPD oriented structure that teaches judgement first, then tools. Use the levels in order or drop into the labs when you need a refresher.

Levels

Cybersecurity Foundations

Cybersecurity Foundations

My three level cybersecurity course that takes learners from basic online safety to professional risk and security practice, using interactive tools and everyday examples.

Learning outcomes
  • Explain what data, bits, bytes and encodings are and why small changes in data matter for security.
  • Describe the CIA triad of confidentiality, integrity and availability in simple language with everyday examples.
  • Recognise in plain terms how information moves between devices and across networks at a high level.
  • Explain what a trust boundary and attack surface are, with simple examples from home and work life.
  • Use the hashing and encoding tools to see how small changes in input create large changes in output and relate this to integrity.
  • Use the password and URL tools to judge the strength of passwords and the safety of basic links or emails.
  • Describe preventive, detective and corrective controls and give examples of each.
  • Record simple risks and controls in a risk matrix and justify chosen likelihood and impact in plain terms.
Applied Cybersecurity

Applied Cybersecurity

My three level cybersecurity course that takes learners from basic online safety to professional risk and security practice, using interactive tools and everyday examples.

Learning outcomes
  • Apply basic threat modelling to simple systems, identifying assets, actors, entry points and likely threats.
  • Explain the role of operating systems, networks and services in security and relate them to the OSI and TCP IP models.
  • Describe common classes of vulnerabilities such as injection, broken authentication and insecure configuration.
  • Explain how authentication, authorisation, sessions and cookies work together in a web application.
  • Interpret simple logs and alerts, linking them back to potential misuse or attacks.
  • Use risk matrices and control catalogues to justify security trade offs in realistic scenarios.
Cybersecurity Practice and Strategy

Cybersecurity Practice and Strategy

My three level cybersecurity course that takes learners from basic online safety to professional risk and security practice, using interactive tools and everyday examples.

Learning outcomes
  • Relate enterprise security decisions to formal frameworks such as CISSP domains and NIST CSF 2.0 functions.
  • Explain how Cyber Essentials Plus style controls map onto layered technical and organisational defences.
  • Design high level secure architectures for small web or cloud based systems, including identity, logging and monitoring.
  • Use vulnerability information such as CVEs to prioritise remediation work in a structured way.
  • Outline a simple incident response approach from detection to recovery and lessons learned.
  • Communicate key security risks and mitigations to non technical stakeholders in clear, concise language.

How to use this course

  • Start with Foundations to get the shared language for data, networks, attackers, and controls.
  • Use the labs directly in your browser where possible and only enter safe, non sensitive example data.
  • Use Applied to practise threat modelling and logging. Use Practice and Strategy to join architecture, operations, and governance thinking.
  • Remember: this is designed to be compatible with recognised frameworks, but it is not endorsed by any certification body.

Quick feedback

Optional. This helps improve accuracy and usefulness. No accounts required.