Hexadigitall logo
Hexadigitall Academy (Hexadigitall Technologies)
www.hexadigitall.com
Course QR Code
Scan to view the course page, enrollment options, and mentorship details.

Course Snapshot

Learn the basics of digital security, threats, and how to protect systems and data.

Intro to Cybersecurity

Intro to Cybersecurity

A professionally structured weekly curriculum aligned to the level, tooling, and delivery expectations of this course.

Duration: 12 Weeks
Level: Beginner
Study Time: 2 hours/week + labs

Welcome to Intro to Cybersecurity! 🎓

This curriculum is designed to take you from core understanding to confident delivery through weekly applied practice, measurable outcomes, and portfolio evidence.

Each week builds progressively with practical tasks, implementation checkpoints, and reflection points so you can convert knowledge into repeatable professional performance.

Your success is our priority. Stay consistent with weekly execution, document your work, and use feedback loops to continuously improve your delivery quality.

Prerequisites

  • Hands-on experience with network protocols, operating system internals, and security control implementation
  • Practical knowledge of reading security logs, alert analysis, and threat detection workflows
  • Comfort with risk documentation, control decisions, and evidence-based compliance mapping
  • Familiarity with at least one SIEM platform, policy tool, or security scanner

Learning Outcomes

  • Cybersecurity landscape and threats
  • Basic security principles (CIA triad)
  • Common attacks and defenses
  • Password security and authentication
  • Introduction to network security

Recommended Complementary Courses

  • Pair this curriculum with a related foundation or advanced specialization to strengthen adjacent skill areas.
  • Select one systems-focused and one delivery-focused course to improve both implementation depth and execution speed.
  • Use complementary study tracks to broaden portfolio evidence and improve interview and project readiness.

Essential Learning Resources

  • NIST Cybersecurity Framework, CIS Controls, and OWASP threat modeling guides
  • Incident simulation datasets, detection rule templates, and control efficacy checklists
  • Security architecture patterns repository and threat modeling workshop materials

Your Learning Roadmap

Foundation

Weeks 1-3

  • Early Weeks: Core controls, identity hardening, and baseline security posture
  • Middle Weeks: Detection engineering, incident handling, and service resilience
  • Late Weeks: Compliance evidence, executive reporting, and capstone defense

Build

Weeks 4-6

  • Network Security Basics and Safe Browsing
  • Operating System Hardening and Update Hygiene
  • Encryption, Hashing, and Data Protection

Integration

Weeks 7-9

  • Web Security Basics: HTTPS, Cookies, and Sessions
  • Endpoint Protection and Common Security Tools
  • Logging, Monitoring, and Incident Awareness

Capstone

Weeks 10-12

  • Risk Assessment and Security Policies
  • Personal and Small-Business Security Checklist
  • Capstone: Secure a Sample Digital Environment

Detailed Weekly Curriculum

Week 1 2 hours/week + labs
Security Mindset, CIA Triad, and Attack Surface
  • Identify the principles of Security Mindset, CIA Triad, and Attack Surface and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Explain Security Mindset, CIA Triad, and Attack Surface in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Security Mindset, CIA Triad, and Attack Surface, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Security Mindset, CIA Triad, and Attack Surface with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 2 2 hours/week + labs
Password Security, MFA, and Identity Basics
  • Identify the principles of Password Security, MFA, and Identity Basics and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Explain Password Security, MFA, and Identity Basics in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Password Security, MFA, and Identity Basics, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Password Security, MFA, and Identity Basics with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 3 2 hours/week + labs
Malware, Phishing, and Social Engineering
  • Identify the principles of Malware, Phishing, and Social Engineering and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Explain Malware, Phishing, and Social Engineering in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Malware, Phishing, and Social Engineering, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Malware, Phishing, and Social Engineering with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 4 2 hours/week + labs
Network Security Basics and Safe Browsing
  • Identify the principles of Network Security Basics and Safe Browsing and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Explain Network Security Basics and Safe Browsing in a guided scenario using realistic tools, constraints, and quality gates.
  • Apply trade-offs, risks, and decision points for Network Security Basics and Safe Browsing, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Network Security Basics and Safe Browsing with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 5 2 hours/week + labs
Operating System Hardening and Update Hygiene
  • Apply the principles of Operating System Hardening and Update Hygiene and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Analyze Operating System Hardening and Update Hygiene in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Operating System Hardening and Update Hygiene, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Operating System Hardening and Update Hygiene with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 6 2 hours/week + labs
Encryption, Hashing, and Data Protection
  • Apply the principles of Encryption, Hashing, and Data Protection and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Analyze Encryption, Hashing, and Data Protection in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Encryption, Hashing, and Data Protection, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Encryption, Hashing, and Data Protection with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 7 2 hours/week + labs
Web Security Basics: HTTPS, Cookies, and Sessions
  • Apply the principles of Web Security Basics: HTTPS, Cookies, and Sessions and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Analyze Web Security Basics: HTTPS, Cookies, and Sessions in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Web Security Basics: HTTPS, Cookies, and Sessions, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Web Security Basics: HTTPS, Cookies, and Sessions with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 8 2 hours/week + labs
Endpoint Protection and Common Security Tools
  • Apply the principles of Endpoint Protection and Common Security Tools and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Analyze Endpoint Protection and Common Security Tools in a guided scenario using realistic tools, constraints, and quality gates.
  • Evaluate trade-offs, risks, and decision points for Endpoint Protection and Common Security Tools, then record rationale for stakeholder review.
  • Document a portfolio-ready control validation dossier for Endpoint Protection and Common Security Tools with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 9 2 hours/week + labs
Logging, Monitoring, and Incident Awareness
  • Analyze the principles of Logging, Monitoring, and Incident Awareness and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Evaluate Logging, Monitoring, and Incident Awareness in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Logging, Monitoring, and Incident Awareness, then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Logging, Monitoring, and Incident Awareness with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 10 2 hours/week + labs
Risk Assessment and Security Policies
  • Analyze the principles of Risk Assessment and Security Policies and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Evaluate Risk Assessment and Security Policies in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Risk Assessment and Security Policies, then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Risk Assessment and Security Policies with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 11 2 hours/week + labs
Personal and Small-Business Security Checklist
  • Analyze the principles of Personal and Small-Business Security Checklist and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Evaluate Personal and Small-Business Security Checklist in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Personal and Small-Business Security Checklist, then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Personal and Small-Business Security Checklist with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Week 12 2 hours/week + labs
Capstone: Secure a Sample Digital Environment
  • Analyze the principles of Capstone: Secure a Sample Digital Environment and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
  • Evaluate Capstone: Secure a Sample Digital Environment in a guided scenario using realistic tools, constraints, and quality gates.
  • Create trade-offs, risks, and decision points for Capstone: Secure a Sample Digital Environment, then record rationale for stakeholder review.
  • Defend a portfolio-ready control validation dossier for Capstone: Secure a Sample Digital Environment with measurable success criteria and next actions.
  • Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
  • Run a short retrospective focused on what to retain, improve, and scale into the following week.
  • Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
  • Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.

Capstone Projects

Project 1: Security Baseline Audit

Assess a workstation or small-office setup and produce a baseline hardening report covering identity, patching, and network controls.

  • Baseline security checklist with findings
  • Remediation priorities and quick wins
  • Evidence screenshots and validation notes

Project 2: Detection and Response Mini Lab

Implement logging and alerting basics, simulate suspicious activity, and document triage and response decisions.

  • Alert rules and incident timeline evidence
  • Triage notes and escalation path
  • Post-incident improvement recommendations

Project 3: Capstone: Secure Environment Defense Report

Deliver an end-to-end security assessment and remediation plan for a sample digital environment, with clear business-oriented risk communication.

  • Comprehensive risk and control report
  • Prioritized mitigation roadmap
  • Presentation-ready defense walkthrough

Study Tips

  • Reserve two weekly deep-work blocks for hands-on labs, control validation, and remediation testing against real-world attacks.
  • Maintain a control-change ledger documenting each risk decision, its measurable impact, and improvement trajectory.
  • Conduct weekly threat model reviews, comparing assumed attack paths against current detection capability and control gaps.

Study Tips for Success

  • Protect consistent weekly practice time and complete hands-on work before moving to the next topic.
  • Document implementation decisions, trade-offs, and lessons learned after each weekly deliverable.
  • Review feedback quickly and ship an improved revision within the same week to reinforce retention.
  • Track measurable progress with checklists, test evidence, and milestone outcomes.

About Intro to Cybersecurity

This curriculum is structured to build practical capability, consistent delivery discipline, and portfolio-ready outcomes in Intro to Cybersecurity. It combines conceptual understanding with applied execution so learners can perform confidently in real project environments.