Welcome To
Cybersecurity Foundations (Track 1 – 12 Weeks)
Before you dive into advanced security operations, malware analysis, or pentesting labs, you need a solid command of networking, operating systems, and core cybersecurity principles. That’s where Track 1 comes in.
v
iT’S FREE
Build the bedrock skills that every cybersecurity professional needs.
This foundational track walks learners—whether absolute beginners or early-career professionals—through the key knowledge domains and tools used across the cybersecurity industry.
🧱 Course Syllabus
Master Full-Stack JavaScript (React, Node.js, MongoDB, DevOps) in 32 weeks! Includes hands-on projects, internships, certifications, and career prep. Join a supportive community and build a job-ready portfolio.
Your Pathway to Success
🧠 Key Benefits!
Join us to take advantage of free training and certifications.
Free Certifications
Boost your resume with free credentials.
Hands-On Training
Learn by doing with engaging projects.
Career Discovery
Find your ideal career match with ease.
🧠 What You’ll Learn
By the end, you’ll be ready to:
✅ Analyze logs and suspicious behavior
✅ Use security tools to scan for vulnerabilities
✅ Understand cloud security and IAM
✅ Sit for certifications like CompTIA ITF+, Google IT Support, or Cisco Intro to Cybersecurity
🧠 What You’ll Learn
- How the internet works—from packets to protocols
- Key concepts like CIA Triad, firewalls, and access control
- Linux and Windows CLI skills that every analyst uses daily
- Tools like Wireshark, Nmap, Metasploit, and Splunk
- Ethical hacking principles and cloud security basics
Practical Skill Development through Experience
- How the internet works—from packets to protocols
- Key concepts like CIA Triad, firewalls, and access control
- Linux and Windows CLI skills that every analyst uses daily
- Tools like Wireshark, Nmap, Metasploit, and Splunk
- Ethical hacking principles and cloud security basics
Explore New and Emerging Career Paths
Find your ideal career match with ease.
🚀 Track Structure
| Chapter | Lessons |
|---|---|
| 1.1 – Introduction to Cybersecurity | Lesson 1.1.1 – The CIA Triad (Confidentiality, Integrity, Availability) Lesson 1.1.2 – Threat Actors & Attack Vectors Lesson 1.1.3 – Risk Basics & Terminology Lesson 1.1.4 – Case Studies of Real Breaches (Equifax, Colonial Pipeline) |
| 1.2 – Networking & Operating Systems Fundamentals | Lesson 1.2.1 – OSI vs TCP/IP Models Lesson 1.2.2 – OSI vs TCP/IP Models Lesson 1.2.3 – Linux Security Basics (users, permissions, processes) Lesson 1.2.4 – Windows Security Basics (Active Directory, file permissions) |
| 1.3 – Command Line & Scripting for Security | Lesson 1.3.1 – Bash Basics for Security Analysts Lesson 1.3.2 – PowerShell Basics for Windows Security Lesson 1.3.3 – Intro to Python for Security Automation Lesson 1.3.4 – Hands‑On: Build a Simple Log Parser in Python |
| 1.4 – Core Security Tools | Lesson 1.4.1 – Wireshark: Packet Capture & Analysis Lesson 1.4.2 – Nmap: Network Scanning & Discovery Lesson 1.4.3 – Metasploit: Exploitation Basics Lesson 1.4.4 – Hands‑On: Capture and Analyze Suspicious Traffic |
| 1.5 – Security Operations Basics | Lesson 1.5.1 – Introduction to Security Operations Centers (SOC) Lesson 1.5.2 – SIEM Overview (Splunk, ELK) Lesson 1.5.3 – Log Analysis Mini‑Lab Lesson 1.5.4 – Hands‑On: Detect Brute Force Attempts in Logs |
| 1.6 – Cloud Security Fundamentals (EXPANDED) | Lesson 1.6.1 – Shared Responsibility Model (AWS, Azure, GCP) Lesson 1.6.2 – IAM Basics (AWS IAM, Azure AD) Lesson 1.6.3 – Cloud Storage Security (S3, Blob, Buckets) Lesson 1.6.4 – Hands‑On: Misconfigured S3 Bucket Exploitation & Remediation |
| 1.7 – Compliance & Governance Basics (NEW) | Lesson 1.7.1 – NIST Cybersecurity Framework Overview Lesson 1.7.2 – CIS Controls Introduction Lesson 1.7.3 – ISO 27001 & SOC 2 Basics Lesson 1.7.4 – Hands‑On: Map a Small Business Network to CIS Controls |
| 1.8 – Ethical Hacking Basics | Lesson 1.8.1 – Reconnaissance & Scanning Lesson 1.8.2 – Vulnerability Identification Lesson 1.8.3 – Simple Exploitation Techniques Lesson 1.8.4 – OWASP Top 10 Introduction Lesson 1.8.5 – Hands‑On: SQL Injection Demo in a Sandbox |
| 1.9 – Career Readiness & Capstone | Lesson 1.9.1 – Resume Clinic & LinkedIn Profile Building Lesson 1.9.2 – Mock Interviews & SOC Role‑Play Scenarios Lesson 1.9.3 – Mini‑Project: Secure a Small Business Network Lesson 1.9.4 – Capstone Project: Basic Attack Chain Analysis in a Virtual Lab Lesson 1.9.5 – Deliverable: Written Incident Report + Mitigation Recommendations Lesson 1.9.6 – Wrap‑Up & Career Milestone |
| Capstone | Basic Attack Chain Analysis in a Virtual Lab |
🎓 Certifications Aligned
- CompTIA ITF+
- CompTIA Security+
- Google IT Support
- Cisco Introduction to Cybersecurity
🛠️ Program Features Built In
- Hands‑On Labs: Virtual machines, sandboxed environments
- Community Support: Peer forums, project reviews
- Career Prep: Resume templates, mock interviews, LinkedIn workshops
- Capstone Project: Portfolio‑ready deliverable


