Home

Awesome

GitHub License GitHub Issues or Pull Requests GitHub Issues or Pull Requests GitHub Repo stars GitHub watchers GitHub forks

🚀 Cybersecurity for Beginners – a curriculum

In this rapidly changing age of AI technology adoption, it is even more critical to understand how to secure IT systems. This course is designed to teach you fundamental cyber security concepts to kick-start your security learning. It is vendor agnostic and is divided into small lessons that should take around 30-60 mins to complete. Each lesson has a small quiz and links to further reading if you want to dive into the topic a bit more.

Cybersecurity for Beginners

What this course covers 📚

What this course does not cover 🙅‍♂️

Watch the video

When you have finished this course, you can move onto some of our Microsoft Learn modules. We recommend you continue your learning with Microsoft Security, Compliance, and Identity Fundamentals.

Ultimately, you could consider taking the Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals exam.

💁 If you have any feedback or suggestions on this course and any content we're missing, we'd love to hear from you!

Modules Overview 📝

Module numberModule nameConcepts taughtLearning objectives
1.1Basic security conceptsThe CIA triadLearn about confidentiality, availability and integrity. Also authenticity and also nonrepudiation and privacy.
1.2Basic security conceptsCommon cyber security threatsLearn about the common cyber security threats facing individuals and organizations.
1.3Basic security conceptsUnderstanding risk managementLearn about assessing and understanding risk – impact/likelihood and implementing controls.
1.4Basic security conceptsSecurity practices and documentationLearn about the difference between policies, procedures, standards and regulations/laws.
1.5Basic security conceptsZero trustLearn about what is zero trust and how does it affect architecture? What is defense in depth?
1.6Basic security conceptsThe shared responsibility modelWhat is the shared responsibility model and how does it affect cyber security?
1.7End of module quiz
2.1Identity & access management fundamentalsIAM key conceptsLearn about the principle of least privilege, segregation of duties, how IAM supports zero trust.
2.2Identity & access management fundamentalsIAM zero trust architectureLearn about how identity is the new perimeter for modern IT environments and the threats it mitigates.
2.3Identity & access management fundamentalsIAM capabilitiesLearn about IAM capabilities and controls to secure identities
2.4End of module quiz
3.1Network security fundamentalsNetworking key conceptsLearn about networking concepts (IP addressing, port numbers, encryption, etc.)
3.2Network security fundamentalsNetworking zero trust architectureLearn about how networking contributes to an E2E ZT architecture and the threats it mitigates.
3.3Network security fundamentalsNetwork security capabilitiesLearn about network security tooling – firewalls, WAF, DDoS protection, etc.
3.4End of module quiz
4.1Security operations fundamentalsSecOps key conceptsLearn about why security operations are important and how it differs from normal IT ops teams.
4.2Security operations fundamentalsSecOps zero trust architectureLearn about how SecOps contributes to an E2E ZT architecture and the threats it mitigates.
4.3Security operations fundamentalsSecOps capabilitiesLearn about SecOps tooling – SIEM, XDR, etc.
4.4End of module quiz
5.1Application security fundamentalsAppSec key conceptsLearn about AppSec concepts such as secure by design, input validation, etc.
5.2Application security fundamentalsAppSec capabilitiesLearn about AppSec tooling: pipeline security tools, code scanning, secret scanning, etc.
5.3End of module quiz
6.1Infrastructure security fundamentalsInfrastructure security key conceptsLearn about hardening systems, patching, security hygiene, container security.
6.2Infrastructure security fundamentalsInfrastructure security capabilitiesLearn about tooling that can assist with infrastructure security e.g. CSPM, container security, etc.
6.3End of module quiz
7.1Data security fundamentalsData security key conceptsLearn about data classification and retention and why this is important to an organization.
7.2Data security fundamentalsData security capabilitiesLearn about data security tooling – DLP, inside risk management, data governance, etc.
7.3End of module quiz
8.1AI security fundamentalsAI security key conceptsLearn about the differences and similarities between traditional security and AI security.
8.2AI security fundamentalsAI security capabilitiesLearn about AI security tooling and the controls that can be used to secure AI.
8.3AI security fundamentalsResponsible AILearn about what responsible AI is and AI specific harms that security professionals need to be aware of.
8.4End of module quiz

🎒 Other Courses

Our team produces other courses! Check out: