Network Security Essentials Curriculum

Public curriculum preview for visitors and enrolled students. Use this page to evaluate module scope, outcomes, and learning path.

Curriculum

Network Security Essentials

Structured, hands-on learning path for Network Security Essentials with detailed weekly outcomes and practical delivery.

Duration: 14 Weeks
Level: Intermediate
Study Time: 2 hours/week + labs
School: Hexadigitall Academy
14 WeeksIntermediateProject-Based

Welcome to Network Security Essentials! 🎓

This curriculum for Network Security Essentials follows a Bloom-aligned progression from core competencies to integrated professional delivery, with weekly evidence, labs, and portfolio outputs matched to intermediate expectations.

Each week advances from comprehension and application toward evaluation and creation, ensuring progressive learning and capstone readiness.

Your success is our priority. By the end, you will produce portfolio-ready artifacts and confidently explain your technical decisions. You will graduate with a professionally curated portfolio that demonstrates scope, depth, and delivery quality. You will graduate with a professionally curated portfolio that demonstrates scope, depth, and delivery quality. You will graduate with a professionally curated portfolio that demonstrates scope, depth, and delivery quality. You will graduate with a professionally curated portfolio that demonstrates scope, depth, and delivery quality.

Prerequisites

  • Hands-on experience with network protocols, operating system internals, and security control implementation
  • Practical knowledge of reading security logs, alert analysis, and threat detection workflows
  • Comfort with risk documentation, control decisions, and evidence-based compliance mapping
  • Familiarity with at least one SIEM platform, policy tool, or security scanner

Essential Resources

  • NIST Cybersecurity Framework, CIS Controls, and OWASP threat modeling guides
  • Incident simulation datasets, detection rule templates, and control efficacy checklists
  • Security architecture patterns repository and threat modeling workshop materials

Complementary Courses

Incident Response

Master triage, containment, and post-incident forensics workflows

Cloud Security

Extend identity, token, and workload protection into cloud environments

Governance & Compliance

Connect security controls to regulatory mappings and audit documentation

Learning Roadmap

  • Early Weeks: Core controls, identity hardening, and baseline security posture
  • Middle Weeks: Detection engineering, incident handling, and service resilience
  • Late Weeks: Compliance evidence, executive reporting, and capstone defense

Detailed Weekly Curriculum

Each week includes outcomes and practical lab work aligned to the curriculum structure.

Week 1

Network Security Essentials: Security Architecture Fundamentals (Sprint 1)

2 hours + labs
Learning Outcomes
  • Understand the principles of Network Security Essentials: Security Architecture Fundamentals (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Apply Network Security Essentials: Security Architecture Fundamentals (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Analyze trade-offs, risks, and decision points for Network Security Essentials: Security Architecture Fundamentals (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Network Security Essentials: Security Architecture Fundamentals (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Network Security Essentials: Security Architecture Fundamentals (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Network Security Essentials: Security Architecture Fundamentals (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Network Security Essentials: Security Architecture Fundamentals (Sprint 1) and verify closure with re-test evidence.
Week 2

Network Security Essentials: Identity and Access Governance (Sprint 1)

2 hours + labs
Learning Outcomes
  • Understand the principles of Network Security Essentials: Identity and Access Governance (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Apply Network Security Essentials: Identity and Access Governance (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Analyze trade-offs, risks, and decision points for Network Security Essentials: Identity and Access Governance (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Network Security Essentials: Identity and Access Governance (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Network Security Essentials: Identity and Access Governance (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Network Security Essentials: Identity and Access Governance (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Network Security Essentials: Identity and Access Governance (Sprint 1) and verify closure with re-test evidence.
Week 3

Network Security Essentials: Network and Endpoint Protection (Sprint 1)

2 hours + labs
Learning Outcomes
  • Understand the principles of Network Security Essentials: Network and Endpoint Protection (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Apply Network Security Essentials: Network and Endpoint Protection (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Analyze trade-offs, risks, and decision points for Network Security Essentials: Network and Endpoint Protection (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Network Security Essentials: Network and Endpoint Protection (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Network Security Essentials: Network and Endpoint Protection (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Network Security Essentials: Network and Endpoint Protection (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Network Security Essentials: Network and Endpoint Protection (Sprint 1) and verify closure with re-test evidence.
Week 4

Network Security Essentials: Application and Data Security (Sprint 1)

2 hours + labs
Learning Outcomes
  • Understand the principles of Network Security Essentials: Application and Data Security (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Apply Network Security Essentials: Application and Data Security (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Analyze trade-offs, risks, and decision points for Network Security Essentials: Application and Data Security (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Network Security Essentials: Application and Data Security (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Network Security Essentials: Application and Data Security (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Network Security Essentials: Application and Data Security (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Network Security Essentials: Application and Data Security (Sprint 1) and verify closure with re-test evidence.
Week 5

Network Security Essentials: Threat Detection and Monitoring (Sprint 1)

2 hours + labs
Learning Outcomes
  • Understand the principles of Network Security Essentials: Threat Detection and Monitoring (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Apply Network Security Essentials: Threat Detection and Monitoring (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Analyze trade-offs, risks, and decision points for Network Security Essentials: Threat Detection and Monitoring (Sprint 1), then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Network Security Essentials: Threat Detection and Monitoring (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Instrument Network Security Essentials: Threat Detection and Monitoring (Sprint 1) with metrics, logs, and tracing hooks aligned to service objectives.
  • Create actionable alerts for Network Security Essentials: Threat Detection and Monitoring (Sprint 1) and test escalation paths using simulated incidents.
  • Perform root-cause analysis for a Network Security Essentials: Threat Detection and Monitoring (Sprint 1) failure scenario and document corrective actions.
Week 6

Network Security Essentials: Incident Response and Recovery (Sprint 1)

2 hours + labs
Learning Outcomes
  • Apply the principles of Network Security Essentials: Incident Response and Recovery (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Analyze Network Security Essentials: Incident Response and Recovery (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Network Security Essentials: Incident Response and Recovery (Sprint 1), then record rationale for stakeholder review.
  • Justify a portfolio-ready control validation dossier for Network Security Essentials: Incident Response and Recovery (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Instrument Network Security Essentials: Incident Response and Recovery (Sprint 1) with metrics, logs, and tracing hooks aligned to service objectives.
  • Create actionable alerts for Network Security Essentials: Incident Response and Recovery (Sprint 1) and test escalation paths using simulated incidents.
  • Perform root-cause analysis for a Network Security Essentials: Incident Response and Recovery (Sprint 1) failure scenario and document corrective actions.
Week 7

Network Security Essentials: Compliance and Audit Readiness (Sprint 1)

2 hours + labs
Learning Outcomes
  • Apply the principles of Network Security Essentials: Compliance and Audit Readiness (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Analyze Network Security Essentials: Compliance and Audit Readiness (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Network Security Essentials: Compliance and Audit Readiness (Sprint 1), then record rationale for stakeholder review.
  • Justify a portfolio-ready control validation dossier for Network Security Essentials: Compliance and Audit Readiness (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Network Security Essentials: Compliance and Audit Readiness (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Network Security Essentials: Compliance and Audit Readiness (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Network Security Essentials: Compliance and Audit Readiness (Sprint 1) and verify closure with re-test evidence.
Week 8

Network Security Essentials: Security Program Optimization (Sprint 1)

2 hours + labs
Learning Outcomes
  • Apply the principles of Network Security Essentials: Security Program Optimization (Sprint 1) and link them to course outcomes through structured core competency milestones.
  • Analyze Network Security Essentials: Security Program Optimization (Sprint 1) in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Network Security Essentials: Security Program Optimization (Sprint 1), then record rationale for stakeholder review.
  • Justify a portfolio-ready control validation dossier for Network Security Essentials: Security Program Optimization (Sprint 1) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Network Security Essentials: Security Program Optimization (Sprint 1), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Network Security Essentials: Security Program Optimization (Sprint 1) and triage findings by severity.
  • Implement remediation steps for Network Security Essentials: Security Program Optimization (Sprint 1) and verify closure with re-test evidence.
Week 9

Network Security Essentials: Security Architecture Fundamentals (Sprint 2)

2 hours + labs
Learning Outcomes
  • Apply the principles of Network Security Essentials: Security Architecture Fundamentals (Sprint 2) and link them to course outcomes through structured core competency milestones.
  • Analyze Network Security Essentials: Security Architecture Fundamentals (Sprint 2) in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Network Security Essentials: Security Architecture Fundamentals (Sprint 2), then record rationale for stakeholder review.
  • Justify a portfolio-ready control validation dossier for Network Security Essentials: Security Architecture Fundamentals (Sprint 2) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Network Security Essentials: Security Architecture Fundamentals (Sprint 2), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Network Security Essentials: Security Architecture Fundamentals (Sprint 2) and triage findings by severity.
  • Implement remediation steps for Network Security Essentials: Security Architecture Fundamentals (Sprint 2) and verify closure with re-test evidence.
Week 10

Network Security Essentials: Identity and Access Governance (Sprint 2)

2 hours + labs
Learning Outcomes
  • Analyze the principles of Network Security Essentials: Identity and Access Governance (Sprint 2) and link them to course outcomes through structured core competency milestones.
  • Evaluate Network Security Essentials: Identity and Access Governance (Sprint 2) in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Network Security Essentials: Identity and Access Governance (Sprint 2), then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Network Security Essentials: Identity and Access Governance (Sprint 2) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Network Security Essentials: Identity and Access Governance (Sprint 2), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Network Security Essentials: Identity and Access Governance (Sprint 2) and triage findings by severity.
  • Implement remediation steps for Network Security Essentials: Identity and Access Governance (Sprint 2) and verify closure with re-test evidence.
Week 11

Network Security Essentials: Network and Endpoint Protection (Sprint 2)

2 hours + labs
Learning Outcomes
  • Analyze the principles of Network Security Essentials: Network and Endpoint Protection (Sprint 2) and link them to course outcomes through structured core competency milestones.
  • Evaluate Network Security Essentials: Network and Endpoint Protection (Sprint 2) in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Network Security Essentials: Network and Endpoint Protection (Sprint 2), then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Network Security Essentials: Network and Endpoint Protection (Sprint 2) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Network Security Essentials: Network and Endpoint Protection (Sprint 2), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Network Security Essentials: Network and Endpoint Protection (Sprint 2) and triage findings by severity.
  • Implement remediation steps for Network Security Essentials: Network and Endpoint Protection (Sprint 2) and verify closure with re-test evidence.
Week 12

Network Security Essentials: Application and Data Security (Sprint 2)

2 hours + labs
Learning Outcomes
  • Analyze the principles of Network Security Essentials: Application and Data Security (Sprint 2) and link them to course outcomes through structured core competency milestones.
  • Evaluate Network Security Essentials: Application and Data Security (Sprint 2) in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Network Security Essentials: Application and Data Security (Sprint 2), then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Network Security Essentials: Application and Data Security (Sprint 2) with measurable success criteria and next actions.
Lab Exercise
  • Apply security controls for Network Security Essentials: Application and Data Security (Sprint 2), including access boundaries and data protection baselines.
  • Run vulnerability or control validation for Network Security Essentials: Application and Data Security (Sprint 2) and triage findings by severity.
  • Implement remediation steps for Network Security Essentials: Application and Data Security (Sprint 2) and verify closure with re-test evidence.
Week 13

Network Security Essentials: Threat Detection and Monitoring (Sprint 2)

2 hours + labs
Learning Outcomes
  • Analyze the principles of Network Security Essentials: Threat Detection and Monitoring (Sprint 2) and link them to course outcomes through structured core competency milestones.
  • Evaluate Network Security Essentials: Threat Detection and Monitoring (Sprint 2) in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Network Security Essentials: Threat Detection and Monitoring (Sprint 2), then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Network Security Essentials: Threat Detection and Monitoring (Sprint 2) with measurable success criteria and next actions.
Lab Exercise
  • Instrument Network Security Essentials: Threat Detection and Monitoring (Sprint 2) with metrics, logs, and tracing hooks aligned to service objectives.
  • Create actionable alerts for Network Security Essentials: Threat Detection and Monitoring (Sprint 2) and test escalation paths using simulated incidents.
  • Perform root-cause analysis for a Network Security Essentials: Threat Detection and Monitoring (Sprint 2) failure scenario and document corrective actions.
Week 14

Network Security Essentials: Incident Response and Recovery (Sprint 2)

2 hours + labs
Learning Outcomes
  • Analyze the principles of Network Security Essentials: Incident Response and Recovery (Sprint 2) and link them to course outcomes through structured core competency milestones.
  • Evaluate Network Security Essentials: Incident Response and Recovery (Sprint 2) in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Network Security Essentials: Incident Response and Recovery (Sprint 2), then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Network Security Essentials: Incident Response and Recovery (Sprint 2) with measurable success criteria and next actions.
Lab Exercise
  • Instrument Network Security Essentials: Incident Response and Recovery (Sprint 2) with metrics, logs, and tracing hooks aligned to service objectives.
  • Create actionable alerts for Network Security Essentials: Incident Response and Recovery (Sprint 2) and test escalation paths using simulated incidents.
  • Perform root-cause analysis for a Network Security Essentials: Incident Response and Recovery (Sprint 2) failure scenario and document corrective actions.

Capstone Projects

Project 1: Network Security Essentials Foundation Build

Deliver a concrete foundation implementation covering the first phase of the curriculum.

  • Implement and validate Network Security Essentials: Security Architecture Fundamentals (Sprint 1).
  • Integrate Network Security Essentials: Identity and Access Governance (Sprint 1) with reusable workflow standards.
  • Publish evidence for Network Security Essentials: Network and Endpoint Protection (Sprint 1) with test and quality artifacts.

Project 2: Network Security Essentials Integrated Systems Build

Combine mid-program competencies into a production-style integrated workflow.

  • Build an end-to-end flow around Network Security Essentials: Threat Detection and Monitoring (Sprint 1) and Network Security Essentials: Incident Response and Recovery (Sprint 1).
  • Add controls, observability, and rollback paths for reliability.
  • Document architecture decisions and trade-offs tied to Network Security Essentials: Compliance and Audit Readiness (Sprint 1).

Project 3: Network Security Essentials Capstone Delivery

Ship a portfolio-ready capstone with measurable outcomes and stakeholder-ready presentation.

  • Deliver a complete implementation centered on Network Security Essentials: Network and Endpoint Protection (Sprint 2).
  • Validate readiness for Network Security Essentials: Application and Data Security (Sprint 2) using objective acceptance checks.
  • Present final defense and roadmap based on Network Security Essentials: Threat Detection and Monitoring (Sprint 2) outcomes.