Welcome To

Cybersecurity Foundations (Track 1 – 12 Weeks)

v

Free

FREE

Course Information:

iT’S FREE

Build the bedrock skills that every cybersecurity professional needs.

This foundational track walks learners—whether absolute beginners or early-career professionals—through the key knowledge domains and tools used across the cybersecurity industry.


🧱 Course Syllabus

Master Full-Stack JavaScript (React, Node.js, MongoDB, DevOps) in 32 weeks! Includes hands-on projects, internships, certifications, and career prep. Join a supportive community and build a job-ready portfolio.

15 Hands-On Projects

15 Hands-On Projects

2 Free Internships

Free Certifications

Duration:


Weeks

Lessons

Quizzes
Your Pathway to Success

🧠 Key Benefits!

Join us to take advantage of free training and certifications.

Free Certifications

Boost your resume with free credentials.

Hands-On Training

Learn by doing with engaging projects.

Career Discovery

Find your ideal career match with ease.


🧠 What You’ll Learn

By the end, you’ll be ready to:
✅ Analyze logs and suspicious behavior
✅ Use security tools to scan for vulnerabilities
✅ Understand cloud security and IAM
✅ Sit for certifications like CompTIA ITF+, Google IT Support, or Cisco Intro to Cybersecurity

🧠 What You’ll Learn

  • How the internet works—from packets to protocols
  • Key concepts like CIA Triad, firewalls, and access control
  • Linux and Windows CLI skills that every analyst uses daily
  • Tools like Wireshark, Nmap, Metasploit, and Splunk
  • Ethical hacking principles and cloud security basics

Practical Skill Development through Experience

  • How the internet works—from packets to protocols
  • Key concepts like CIA Triad, firewalls, and access control
  • Linux and Windows CLI skills that every analyst uses daily
  • Tools like Wireshark, Nmap, Metasploit, and Splunk
  • Ethical hacking principles and cloud security basics

Explore New and Emerging Career Paths

Find your ideal career match with ease.

🚀 Track Structure

ChapterLessons
1.1 – Introduction to CybersecurityLesson 1.1.1 – The CIA Triad (Confidentiality, Integrity, Availability)
Lesson 1.1.2 – Threat Actors & Attack Vectors
Lesson 1.1.3 – Risk Basics & Terminology
Lesson 1.1.4 – Case Studies of Real Breaches (Equifax, Colonial Pipeline)
1.2 – Networking & Operating Systems FundamentalsLesson 1.2.1 – OSI vs TCP/IP Models
Lesson 1.2.2 – OSI vs TCP/IP Models
Lesson 1.2.3 – Linux Security Basics (users, permissions, processes)
Lesson 1.2.4 – Windows Security Basics (Active Directory, file permissions)
1.3 – Command Line & Scripting for SecurityLesson 1.3.1 – Bash Basics for Security Analysts
Lesson 1.3.2 – PowerShell Basics for Windows Security
Lesson 1.3.3 – Intro to Python for Security Automation
Lesson 1.3.4 – Hands‑On: Build a Simple Log Parser in Python
1.4 – Core Security ToolsLesson 1.4.1 – Wireshark: Packet Capture & Analysis
Lesson 1.4.2 – Nmap: Network Scanning & Discovery
Lesson 1.4.3 – Metasploit: Exploitation Basics
Lesson 1.4.4 – Hands‑On: Capture and Analyze Suspicious Traffic
1.5 – Security Operations BasicsLesson 1.5.1 – Introduction to Security Operations Centers (SOC)
Lesson 1.5.2 – SIEM Overview (Splunk, ELK)
Lesson 1.5.3 – Log Analysis Mini‑Lab
Lesson 1.5.4 – Hands‑On: Detect Brute Force Attempts in Logs
1.6 – Cloud Security Fundamentals (EXPANDED)Lesson 1.6.1 – Shared Responsibility Model (AWS, Azure, GCP)
Lesson 1.6.2 – IAM Basics (AWS IAM, Azure AD)
Lesson 1.6.3 – Cloud Storage Security (S3, Blob, Buckets)
Lesson 1.6.4 – Hands‑On: Misconfigured S3 Bucket Exploitation & Remediation
1.7 – Compliance & Governance Basics (NEW)Lesson 1.7.1 – NIST Cybersecurity Framework Overview
Lesson 1.7.2 – CIS Controls Introduction
Lesson 1.7.3 – ISO 27001 & SOC 2 Basics
Lesson 1.7.4 – Hands‑On: Map a Small Business Network to CIS Controls
1.8 – Ethical Hacking BasicsLesson 1.8.1 – Reconnaissance & Scanning
Lesson 1.8.2 – Vulnerability Identification
Lesson 1.8.3 – Simple Exploitation Techniques
Lesson 1.8.4 – OWASP Top 10 Introduction
Lesson 1.8.5 – Hands‑On: SQL Injection Demo in a Sandbox
1.9 – Career Readiness & CapstoneLesson 1.9.1 – Resume Clinic & LinkedIn Profile Building
Lesson 1.9.2 – Mock Interviews & SOC Role‑Play Scenarios
Lesson 1.9.3 – Mini‑Project: Secure a Small Business Network
Lesson 1.9.4 – Capstone Project: Basic Attack Chain Analysis in a Virtual Lab
Lesson 1.9.5 – Deliverable: Written Incident Report + Mitigation Recommendations
Lesson 1.9.6 – Wrap‑Up & Career Milestone
CapstoneBasic Attack Chain Analysis in a Virtual Lab

🎓 Certifications Aligned

  • CompTIA ITF+
  • CompTIA Security+
  • Google IT Support
  • Cisco Introduction to Cybersecurity

🛠️ Program Features Built In

  • Hands‑On Labs: Virtual machines, sandboxed environments
  • Community Support: Peer forums, project reviews
  • Career Prep: Resume templates, mock interviews, LinkedIn workshops
  • Capstone Project: Portfolio‑ready deliverable


Free

FREE