Welcome to Intro to Cybersecurity! 🎓
This curriculum is designed to take you from core understanding to confident delivery through weekly applied practice, measurable outcomes, and portfolio evidence.
Each week builds progressively with practical tasks, implementation checkpoints, and reflection points so you can convert knowledge into repeatable professional performance.
Your success is our priority. Stay consistent with weekly execution, document your work, and use feedback loops to continuously improve your delivery quality.
Detailed Weekly Curriculum
Security Mindset, CIA Triad, and Attack Surface
- Identify the principles of Security Mindset, CIA Triad, and Attack Surface and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Explain Security Mindset, CIA Triad, and Attack Surface in a guided scenario using realistic tools, constraints, and quality gates.
- Apply trade-offs, risks, and decision points for Security Mindset, CIA Triad, and Attack Surface, then record rationale for stakeholder review.
- Document a portfolio-ready control validation dossier for Security Mindset, CIA Triad, and Attack Surface with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Password Security, MFA, and Identity Basics
- Identify the principles of Password Security, MFA, and Identity Basics and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Explain Password Security, MFA, and Identity Basics in a guided scenario using realistic tools, constraints, and quality gates.
- Apply trade-offs, risks, and decision points for Password Security, MFA, and Identity Basics, then record rationale for stakeholder review.
- Document a portfolio-ready control validation dossier for Password Security, MFA, and Identity Basics with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Malware, Phishing, and Social Engineering
- Identify the principles of Malware, Phishing, and Social Engineering and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Explain Malware, Phishing, and Social Engineering in a guided scenario using realistic tools, constraints, and quality gates.
- Apply trade-offs, risks, and decision points for Malware, Phishing, and Social Engineering, then record rationale for stakeholder review.
- Document a portfolio-ready control validation dossier for Malware, Phishing, and Social Engineering with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Network Security Basics and Safe Browsing
- Identify the principles of Network Security Basics and Safe Browsing and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Explain Network Security Basics and Safe Browsing in a guided scenario using realistic tools, constraints, and quality gates.
- Apply trade-offs, risks, and decision points for Network Security Basics and Safe Browsing, then record rationale for stakeholder review.
- Document a portfolio-ready control validation dossier for Network Security Basics and Safe Browsing with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Operating System Hardening and Update Hygiene
- Apply the principles of Operating System Hardening and Update Hygiene and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Analyze Operating System Hardening and Update Hygiene in a guided scenario using realistic tools, constraints, and quality gates.
- Evaluate trade-offs, risks, and decision points for Operating System Hardening and Update Hygiene, then record rationale for stakeholder review.
- Document a portfolio-ready control validation dossier for Operating System Hardening and Update Hygiene with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Encryption, Hashing, and Data Protection
- Apply the principles of Encryption, Hashing, and Data Protection and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Analyze Encryption, Hashing, and Data Protection in a guided scenario using realistic tools, constraints, and quality gates.
- Evaluate trade-offs, risks, and decision points for Encryption, Hashing, and Data Protection, then record rationale for stakeholder review.
- Document a portfolio-ready control validation dossier for Encryption, Hashing, and Data Protection with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Web Security Basics: HTTPS, Cookies, and Sessions
- Apply the principles of Web Security Basics: HTTPS, Cookies, and Sessions and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Analyze Web Security Basics: HTTPS, Cookies, and Sessions in a guided scenario using realistic tools, constraints, and quality gates.
- Evaluate trade-offs, risks, and decision points for Web Security Basics: HTTPS, Cookies, and Sessions, then record rationale for stakeholder review.
- Document a portfolio-ready control validation dossier for Web Security Basics: HTTPS, Cookies, and Sessions with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Endpoint Protection and Common Security Tools
- Apply the principles of Endpoint Protection and Common Security Tools and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Analyze Endpoint Protection and Common Security Tools in a guided scenario using realistic tools, constraints, and quality gates.
- Evaluate trade-offs, risks, and decision points for Endpoint Protection and Common Security Tools, then record rationale for stakeholder review.
- Document a portfolio-ready control validation dossier for Endpoint Protection and Common Security Tools with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Logging, Monitoring, and Incident Awareness
- Analyze the principles of Logging, Monitoring, and Incident Awareness and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Evaluate Logging, Monitoring, and Incident Awareness in a guided scenario using realistic tools, constraints, and quality gates.
- Create trade-offs, risks, and decision points for Logging, Monitoring, and Incident Awareness, then record rationale for stakeholder review.
- Defend a portfolio-ready control validation dossier for Logging, Monitoring, and Incident Awareness with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Risk Assessment and Security Policies
- Analyze the principles of Risk Assessment and Security Policies and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Evaluate Risk Assessment and Security Policies in a guided scenario using realistic tools, constraints, and quality gates.
- Create trade-offs, risks, and decision points for Risk Assessment and Security Policies, then record rationale for stakeholder review.
- Defend a portfolio-ready control validation dossier for Risk Assessment and Security Policies with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Personal and Small-Business Security Checklist
- Analyze the principles of Personal and Small-Business Security Checklist and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Evaluate Personal and Small-Business Security Checklist in a guided scenario using realistic tools, constraints, and quality gates.
- Create trade-offs, risks, and decision points for Personal and Small-Business Security Checklist, then record rationale for stakeholder review.
- Defend a portfolio-ready control validation dossier for Personal and Small-Business Security Checklist with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Capstone: Secure a Sample Digital Environment
- Analyze the principles of Capstone: Secure a Sample Digital Environment and link them to course outcomes with scaffolded guidance and beginner-safe checkpoints.
- Evaluate Capstone: Secure a Sample Digital Environment in a guided scenario using realistic tools, constraints, and quality gates.
- Create trade-offs, risks, and decision points for Capstone: Secure a Sample Digital Environment, then record rationale for stakeholder review.
- Defend a portfolio-ready control validation dossier for Capstone: Secure a Sample Digital Environment with measurable success criteria and next actions.
- Track measurable progress using rubric scores, defect/risk trends, and evidence completeness each week.
- Run a short retrospective focused on what to retain, improve, and scale into the following week.
- Incorporate peer or mentor feedback and revise the week deliverable to professional publication quality.
- Publish the week output into your cumulative portfolio with concise outcome narrative and proof artifacts.
Capstone Projects
Project 1: Security Baseline Audit
Assess a workstation or small-office setup and produce a baseline hardening report covering identity, patching, and network controls.
- Baseline security checklist with findings
- Remediation priorities and quick wins
- Evidence screenshots and validation notes
Project 2: Detection and Response Mini Lab
Implement logging and alerting basics, simulate suspicious activity, and document triage and response decisions.
- Alert rules and incident timeline evidence
- Triage notes and escalation path
- Post-incident improvement recommendations
Project 3: Capstone: Secure Environment Defense Report
Deliver an end-to-end security assessment and remediation plan for a sample digital environment, with clear business-oriented risk communication.
- Comprehensive risk and control report
- Prioritized mitigation roadmap
- Presentation-ready defense walkthrough