Intro to Cybersecurity Curriculum

Public curriculum preview for visitors and enrolled students. Use this page to evaluate module scope, outcomes, and learning path.

Curriculum

Intro to Cybersecurity

Learn the basics of digital security, threats, and how to protect systems and data.

Duration: 12 Weeks
Level: Beginner
Study Time: 2 hours/week + labs
School: Hexadigitall Academy

Welcome to Intro to Cybersecurity! 🎓

This curriculum is designed to take you from core understanding to confident delivery through weekly applied practice, measurable outcomes, and portfolio evidence.

Each week builds progressively with practical tasks, implementation checkpoints, and reflection points so you can convert knowledge into repeatable professional performance.

Your success is our priority. Stay consistent with weekly execution, document your work, and use feedback loops to continuously improve your delivery quality.

Essential Resources

  • NIST Cybersecurity Framework, CIS Controls, and OWASP threat modeling guides
  • Incident simulation datasets, detection rule templates, and control efficacy checklists
  • Security architecture patterns repository and threat modeling workshop materials

Learning Roadmap

  • Early Weeks: Core controls, identity hardening, and baseline security posture
  • Middle Weeks: Detection engineering, incident handling, and service resilience
  • Late Weeks: Compliance evidence, executive reporting, and capstone defense
  • Network Security Basics and Safe Browsing
  • Operating System Hardening and Update Hygiene
  • Encryption, Hashing, and Data Protection
  • Web Security Basics: HTTPS, Cookies, and Sessions
  • Endpoint Protection and Common Security Tools
  • Logging, Monitoring, and Incident Awareness
  • Risk Assessment and Security Policies
  • Personal and Small-Business Security Checklist
  • Capstone: Secure a Sample Digital Environment

Detailed Weekly Curriculum

Each week includes outcomes and practical lab work aligned to the curriculum structure.

Week 1

Security Mindset, CIA Triad, and Attack Surface

2 hours/week + labs
Learning Outcomes
  • Identify the principles of Security Mindset, CIA Triad, and Attack Surface and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Explain Security Mindset, CIA Triad, and Attack Surface in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Security Mindset, CIA Triad, and Attack Surface, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Security Mindset, CIA Triad, and Attack Surface with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 2

Password Security, MFA, and Identity Basics

2 hours/week + labs
Learning Outcomes
  • Identify the principles of Password Security, MFA, and Identity Basics and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Explain Password Security, MFA, and Identity Basics in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Password Security, MFA, and Identity Basics, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Password Security, MFA, and Identity Basics with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 3

Malware, Phishing, and Social Engineering

2 hours/week + labs
Learning Outcomes
  • Identify the principles of Malware, Phishing, and Social Engineering and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Explain Malware, Phishing, and Social Engineering in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Malware, Phishing, and Social Engineering, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Malware, Phishing, and Social Engineering with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 4

Network Security Basics and Safe Browsing

2 hours/week + labs
Learning Outcomes
  • Identify the principles of Network Security Basics and Safe Browsing and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Explain Network Security Basics and Safe Browsing in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Network Security Basics and Safe Browsing, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Network Security Basics and Safe Browsing with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 5

Operating System Hardening and Update Hygiene

2 hours/week + labs
Learning Outcomes
  • Apply the principles of Operating System Hardening and Update Hygiene and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Analyze Operating System Hardening and Update Hygiene in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Operating System Hardening and Update Hygiene, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Operating System Hardening and Update Hygiene with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 6

Encryption, Hashing, and Data Protection

2 hours/week + labs
Learning Outcomes
  • Apply the principles of Encryption, Hashing, and Data Protection and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Analyze Encryption, Hashing, and Data Protection in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Encryption, Hashing, and Data Protection, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Encryption, Hashing, and Data Protection with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 7

Web Security Basics: HTTPS, Cookies, and Sessions

2 hours/week + labs
Learning Outcomes
  • Apply the principles of Web Security Basics: HTTPS, Cookies, and Sessions and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Analyze Web Security Basics: HTTPS, Cookies, and Sessions in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Web Security Basics: HTTPS, Cookies, and Sessions, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Web Security Basics: HTTPS, Cookies, and Sessions with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 8

Endpoint Protection and Common Security Tools

2 hours/week + labs
Learning Outcomes
  • Apply the principles of Endpoint Protection and Common Security Tools and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Analyze Endpoint Protection and Common Security Tools in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Endpoint Protection and Common Security Tools, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Endpoint Protection and Common Security Tools with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 9

Logging, Monitoring, and Incident Awareness

2 hours/week + labs
Learning Outcomes
  • Analyze the principles of Logging, Monitoring, and Incident Awareness and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Evaluate Logging, Monitoring, and Incident Awareness in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Logging, Monitoring, and Incident Awareness, then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Logging, Monitoring, and Incident Awareness with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 10

Risk Assessment and Security Policies

2 hours/week + labs
Learning Outcomes
  • Analyze the principles of Risk Assessment and Security Policies and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Evaluate Risk Assessment and Security Policies in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Risk Assessment and Security Policies, then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Risk Assessment and Security Policies with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 11

Personal and Small-Business Security Checklist

2 hours/week + labs
Learning Outcomes
  • Analyze the principles of Personal and Small-Business Security Checklist and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Evaluate Personal and Small-Business Security Checklist in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Personal and Small-Business Security Checklist, then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Personal and Small-Business Security Checklist with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 12

Capstone: Secure a Sample Digital Environment

2 hours/week + labs
Learning Outcomes
  • Analyze the principles of Capstone: Secure a Sample Digital Environment and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Evaluate Capstone: Secure a Sample Digital Environment in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Capstone: Secure a Sample Digital Environment, then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Capstone: Secure a Sample Digital Environment with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.

Capstone Projects

Project 1: Security Baseline Audit

Assess a workstation or small-office setup and produce a baseline hardening report covering identity, patching, and network controls.

  • Baseline security checklist with findings
  • Remediation priorities and quick wins
  • Evidence screenshots and validation notes

Project 2: Detection and Response Mini Lab

Implement logging and alerting basics, simulate suspicious activity, and document triage and response decisions.

  • Alert rules and incident timeline evidence
  • Triage notes and escalation path
  • Post-incident improvement recommendations

Project 3: Capstone: Secure Environment Defense Report

Deliver an end-to-end security assessment and remediation plan for a sample digital environment, with clear business-oriented risk communication.

  • Comprehensive risk and control report
  • Prioritized mitigation roadmap
  • Presentation-ready defense walkthrough