Cybersecurity Fundamentals: Network & Systems Defense Curriculum

Public curriculum preview for visitors and enrolled students. Use this page to evaluate module scope, outcomes, and learning path.

Curriculum

Cybersecurity Fundamentals: Network & Systems Defense

Structured, hands-on learning path for Cybersecurity Fundamentals: Network & Systems Defense with detailed weekly outcomes and practical delivery.

Duration: 12 Weeks
Level: Beginner
Study Time: 2 hours/week + labs
School: Hexadigitall Academy
12 WeeksBeginnerProject-Based

Welcome to Cybersecurity Fundamentals: Network & Systems Defense! 🎓

This curriculum for Cybersecurity Fundamentals: Network & Systems Defense follows a Bloom-aligned progression from core competencies to integrated professional delivery, with weekly evidence, labs, and portfolio outputs matched to beginner expectations.

Each week advances from comprehension and application toward evaluation and creation, ensuring progressive learning and capstone readiness.

Your success is our priority. By the end, you will produce portfolio-ready artifacts and confidently explain your technical decisions. You will graduate with a professionally curated portfolio that demonstrates scope, depth, and delivery quality. You will graduate with a professionally curated portfolio that demonstrates scope, depth, and delivery quality. You will graduate with a professionally curated portfolio that demonstrates scope, depth, and delivery quality. You will graduate with a professionally curated portfolio that demonstrates scope, depth, and delivery quality.

Prerequisites

  • Hands-on experience with network protocols, operating system internals, and security control implementation
  • Practical knowledge of reading security logs, alert analysis, and threat detection workflows
  • Comfort with risk documentation, control decisions, and evidence-based compliance mapping
  • Familiarity with at least one SIEM platform, policy tool, or security scanner

Essential Resources

  • NIST Cybersecurity Framework, CIS Controls, and OWASP threat modeling guides
  • Incident simulation datasets, detection rule templates, and control efficacy checklists
  • Security architecture patterns repository and threat modeling workshop materials

Complementary Courses

Incident Response

Master triage, containment, and post-incident forensics workflows

Cloud Security

Extend identity, token, and workload protection into cloud environments

Governance & Compliance

Connect security controls to regulatory mappings and audit documentation

Learning Roadmap

  • Early Weeks: Threat modeling, attack surfaces, and core defensive controls
  • Middle Weeks: Detection engineering, response workflows, and evidence handling
  • Late Weeks: Architecture hardening, governance mapping, and capstone defense readiness

Detailed Weekly Curriculum

Each week includes outcomes and practical lab work aligned to the curriculum structure.

Week 1

Cybersecurity Fundamentals: Threat Landscape and Kill Chain Analysis (Sprint 1)

2 hours + labs
Learning Outcomes
  • Identify the principles of Cybersecurity Fundamentals: Network & Systems Defense: Domain Foundations and Problem Definition (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Explain Cybersecurity Fundamentals: Network & Systems Defense: Domain Foundations and Problem Definition (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Domain Foundations and Problem Definition (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Domain Foundations and Problem Definition (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Cybersecurity Fundamentals: Threat Landscape and Kill Chain Analysis (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Cybersecurity Fundamentals: Threat Landscape and Kill Chain Analysis (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Cybersecurity Fundamentals: Threat Landscape and Kill Chain Analysis (Sprint 1) and verify closure with re-test evidence.
Week 2

Cybersecurity Fundamentals: Reconnaissance and Attack Surface Mapping (Sprint 1)

2 hours + labs
Learning Outcomes
  • Identify the principles of Cybersecurity Fundamentals: Network & Systems Defense: Stakeholder Discovery and Requirements (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Explain Cybersecurity Fundamentals: Network & Systems Defense: Stakeholder Discovery and Requirements (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Stakeholder Discovery and Requirements (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Stakeholder Discovery and Requirements (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Cybersecurity Fundamentals: Reconnaissance and Attack Surface Mapping (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Cybersecurity Fundamentals: Reconnaissance and Attack Surface Mapping (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Cybersecurity Fundamentals: Reconnaissance and Attack Surface Mapping (Sprint 1) and verify closure with re-test evidence.
Week 3

Cybersecurity Fundamentals: Vulnerability Analysis and Prioritization (Sprint 1)

2 hours + labs
Learning Outcomes
  • Identify the principles of Cybersecurity Fundamentals: Network & Systems Defense: Process Mapping and Workflow Design (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Explain Cybersecurity Fundamentals: Network & Systems Defense: Process Mapping and Workflow Design (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Process Mapping and Workflow Design (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Process Mapping and Workflow Design (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Cybersecurity Fundamentals: Vulnerability Analysis and Prioritization (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Cybersecurity Fundamentals: Vulnerability Analysis and Prioritization (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Cybersecurity Fundamentals: Vulnerability Analysis and Prioritization (Sprint 1) and verify closure with re-test evidence.
Week 4

Cybersecurity Fundamentals: Exploitation Workflows and Containment Strategy (Sprint 1)

2 hours + labs
Learning Outcomes
  • Identify the principles of Cybersecurity Fundamentals: Network & Systems Defense: Decision Frameworks and Trade-offs (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Explain Cybersecurity Fundamentals: Network & Systems Defense: Decision Frameworks and Trade-offs (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Decision Frameworks and Trade-offs (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Decision Frameworks and Trade-offs (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Cybersecurity Fundamentals: Exploitation Workflows and Containment Strategy (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Cybersecurity Fundamentals: Exploitation Workflows and Containment Strategy (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Cybersecurity Fundamentals: Exploitation Workflows and Containment Strategy (Sprint 1) and verify closure with re-test evidence.
Week 5

Cybersecurity Fundamentals: Network Defense and Segmentation Hardening (Sprint 1)

2 hours + labs
Learning Outcomes
  • Apply the principles of Cybersecurity Fundamentals: Network & Systems Defense: Reporting and Communication Excellence (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Analyze Cybersecurity Fundamentals: Network & Systems Defense: Reporting and Communication Excellence (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Reporting and Communication Excellence (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Reporting and Communication Excellence (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Cybersecurity Fundamentals: Network Defense and Segmentation Hardening (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Cybersecurity Fundamentals: Network Defense and Segmentation Hardening (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Cybersecurity Fundamentals: Network Defense and Segmentation Hardening (Sprint 1) and verify closure with re-test evidence.
Week 6

Cybersecurity Fundamentals: Incident Response and Forensic Triage (Sprint 1)

2 hours + labs
Learning Outcomes
  • Apply the principles of Cybersecurity Fundamentals: Network & Systems Defense: Risk and Governance Controls (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Analyze Cybersecurity Fundamentals: Network & Systems Defense: Risk and Governance Controls (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Risk and Governance Controls (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Risk and Governance Controls (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Instrument Cybersecurity Fundamentals: Incident Response and Forensic Triage (Sprint 1) with metrics, logs, and tracing hooks aligned to service objectives.
  • Create actionable alerts for Cybersecurity Fundamentals: Incident Response and Forensic Triage (Sprint 1) and test escalation paths using simulated incidents.
  • Perform root-cause analysis for a Cybersecurity Fundamentals: Incident Response and Forensic Triage (Sprint 1) failure scenario and document corrective actions.
Week 7

Cybersecurity Fundamentals: Identity Security and Privilege Controls (Sprint 1)

2 hours + labs
Learning Outcomes
  • Apply the principles of Cybersecurity Fundamentals: Network & Systems Defense: Program Execution and Cadence (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Analyze Cybersecurity Fundamentals: Network & Systems Defense: Program Execution and Cadence (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Program Execution and Cadence (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Program Execution and Cadence (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Cybersecurity Fundamentals: Identity Security and Privilege Controls (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Cybersecurity Fundamentals: Identity Security and Privilege Controls (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Cybersecurity Fundamentals: Identity Security and Privilege Controls (Sprint 1) and verify closure with re-test evidence.
Week 8

Cybersecurity Fundamentals: Security Architecture and Zero Trust Review (Sprint 1)

2 hours + labs
Learning Outcomes
  • Apply the principles of Cybersecurity Fundamentals: Network & Systems Defense: Continuous Improvement and Scale (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Analyze Cybersecurity Fundamentals: Network & Systems Defense: Continuous Improvement and Scale (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Continuous Improvement and Scale (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Continuous Improvement and Scale (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Cybersecurity Fundamentals: Security Architecture and Zero Trust Review (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Cybersecurity Fundamentals: Security Architecture and Zero Trust Review (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Cybersecurity Fundamentals: Security Architecture and Zero Trust Review (Sprint 1) and verify closure with re-test evidence.
Week 9

Cybersecurity Fundamentals: Threat Landscape and Kill Chain Analysis (Sprint 2)

2 hours + labs
Learning Outcomes
  • Analyze the principles of Cybersecurity Fundamentals: Network & Systems Defense: Domain Foundations and Problem Definition (Sprint 2) and link them to course outcomes through structured core competency milestones.
  • Evaluate Cybersecurity Fundamentals: Network & Systems Defense: Domain Foundations and Problem Definition (Sprint 2) in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Domain Foundations and Problem Definition (Sprint 2), then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Domain Foundations and Problem Definition (Sprint 2) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Cybersecurity Fundamentals: Threat Landscape and Kill Chain Analysis (Sprint 2), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Cybersecurity Fundamentals: Threat Landscape and Kill Chain Analysis (Sprint 2) and triage findings by severity.
  • Implement remediation steps for Cybersecurity Fundamentals: Threat Landscape and Kill Chain Analysis (Sprint 2) and verify closure with re-test evidence.
Week 10

Cybersecurity Fundamentals: Reconnaissance and Attack Surface Mapping (Sprint 2)

2 hours + labs
Learning Outcomes
  • Analyze the principles of Cybersecurity Fundamentals: Network & Systems Defense: Stakeholder Discovery and Requirements (Sprint 2) and link them to course outcomes through structured core competency milestones.
  • Evaluate Cybersecurity Fundamentals: Network & Systems Defense: Stakeholder Discovery and Requirements (Sprint 2) in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Stakeholder Discovery and Requirements (Sprint 2), then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Stakeholder Discovery and Requirements (Sprint 2) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Cybersecurity Fundamentals: Reconnaissance and Attack Surface Mapping (Sprint 2), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Cybersecurity Fundamentals: Reconnaissance and Attack Surface Mapping (Sprint 2) and triage findings by severity.
  • Implement remediation steps for Cybersecurity Fundamentals: Reconnaissance and Attack Surface Mapping (Sprint 2) and verify closure with re-test evidence.
Week 11

Cybersecurity Fundamentals: Vulnerability Analysis and Prioritization (Sprint 2)

2 hours + labs
Learning Outcomes
  • Analyze the principles of Cybersecurity Fundamentals: Network & Systems Defense: Process Mapping and Workflow Design (Sprint 2) and link them to course outcomes through structured core competency milestones.
  • Evaluate Cybersecurity Fundamentals: Network & Systems Defense: Process Mapping and Workflow Design (Sprint 2) in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Process Mapping and Workflow Design (Sprint 2), then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Process Mapping and Workflow Design (Sprint 2) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Cybersecurity Fundamentals: Vulnerability Analysis and Prioritization (Sprint 2), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Cybersecurity Fundamentals: Vulnerability Analysis and Prioritization (Sprint 2) and triage findings by severity.
  • Implement remediation steps for Cybersecurity Fundamentals: Vulnerability Analysis and Prioritization (Sprint 2) and verify closure with re-test evidence.
Week 12

Cybersecurity Fundamentals: Exploitation Workflows and Containment Strategy (Sprint 2)

2 hours + labs
Learning Outcomes
  • Analyze the principles of Cybersecurity Fundamentals: Network & Systems Defense: Decision Frameworks and Trade-offs (Sprint 2) and link them to course outcomes through structured core competency milestones.
  • Evaluate Cybersecurity Fundamentals: Network & Systems Defense: Decision Frameworks and Trade-offs (Sprint 2) in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Cybersecurity Fundamentals: Network & Systems Defense: Decision Frameworks and Trade-offs (Sprint 2), then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Cybersecurity Fundamentals: Network & Systems Defense: Decision Frameworks and Trade-offs (Sprint 2) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Cybersecurity Fundamentals: Exploitation Workflows and Containment Strategy (Sprint 2), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Cybersecurity Fundamentals: Exploitation Workflows and Containment Strategy (Sprint 2) and triage findings by severity.
  • Implement remediation steps for Cybersecurity Fundamentals: Exploitation Workflows and Containment Strategy (Sprint 2) and verify closure with re-test evidence.

Capstone Projects

Project 1: Cybersecurity Fundamentals: Network & Systems Defense Foundation Build

Deliver a concrete foundation implementation covering the first phase of the curriculum.

  • Implement and validate Cybersecurity Fundamentals: Threat Landscape and Kill Chain Analysis (Sprint 1).
  • Integrate Cybersecurity Fundamentals: Reconnaissance and Attack Surface Mapping (Sprint 1) with reusable workflow standards.
  • Publish evidence for Cybersecurity Fundamentals: Vulnerability Analysis and Prioritization (Sprint 1) with test and quality artifacts.

Project 2: Cybersecurity Fundamentals: Network & Systems Defense Integrated Systems Build

Combine mid-program competencies into a production-style integrated workflow.

  • Build an end-to-end flow around Cybersecurity Fundamentals: Network Defense and Segmentation Hardening (Sprint 1) and Cybersecurity Fundamentals: Incident Response and Forensic Triage (Sprint 1).
  • Add controls, observability, and rollback paths for reliability.
  • Document architecture decisions and trade-offs tied to Cybersecurity Fundamentals: Identity Security and Privilege Controls (Sprint 1).

Project 3: Cybersecurity Fundamentals: Network & Systems Defense Capstone Delivery

Ship a portfolio-ready capstone with measurable outcomes and stakeholder-ready presentation.

  • Deliver a complete implementation centered on Cybersecurity Fundamentals: Threat Landscape and Kill Chain Analysis (Sprint 2).
  • Validate readiness for Cybersecurity Fundamentals: Reconnaissance and Attack Surface Mapping (Sprint 2) using objective acceptance checks.
  • Present final defense and roadmap based on Cybersecurity Fundamentals: Vulnerability Analysis and Prioritization (Sprint 2) outcomes.