jypi
ExploreChatWays to LearnAbout

jypi

  • About Us
  • Our Mission
  • Team
  • Careers

Resources

  • Ways to Learn
  • Blog
  • Help Center
  • Community Guidelines
  • Contributor Guide

Legal

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Content Policy

Connect

  • Twitter
  • Discord
  • Instagram
  • Contact Us
jypi

© 2026 jypi. All rights reserved.

💼 Job Skills & Career

Foundations of Cybersecurity

Launch your cybersecurity journey with a practical, career-focused foundation. This course introduces key concepts, role...

242
Views
Foundations of Cybersecurity

Sections

1. Orientation and Cybersecurity Career Pathways
0 views

Understand why cybersecurity matters, what entry-level roles do, and how professionals build successful careers.

15 topics (15 versions)
1.1Why Cybersecurity Matters
1.2Toni: My Path to Cybersecurity
1.3Veronica: My Path to Working in Cybersecurity
1.4Nikki: A Day in the Life of a Security Engineer
1.5Entry-Level Analyst Responsibilities
1.6Core Skills for Cybersecurity Professionals
1.7Career Paths and Specializations
1.8Security Mindset and Curiosity
1.9Communication and Collaboration
1.10Documentation and Reporting
1.11Continuous Learning Habits
1.12Professional Communities and Networking
1.13Certifications Landscape Overview
1.14Building Domain Knowledge Quickly
1.15Career Pitfalls to Avoid

2. Cybersecurity Fundamentals and Core Principles
0 views

Build shared language and mental models for security, risk, controls, and governance.

15 topics (15 versions)
2.1CIA Triad and Beyond
2.2Security Governance Basics
2.3Risk, Threat, Vulnerability, Impact
2.4Security Controls: Prevent, Detect, Correct
2.5Defense in Depth
2.6Zero Trust Principles
2.7Least Privilege and Segregation of Duties
2.8Security Policies and Standards
2.9Security Awareness and Culture
2.10Data Classification Basics
2.11Asset Inventory Foundations
2.12Security Metrics and KPIs
2.13Secure SDLC Overview
2.14Change and Configuration Management
2.15Third-Party and Supply Chain Risk

3. Threat Landscape: From Past Incidents to the Digital Age
0 views

Survey major historical incidents and modern threats to recognize patterns and impacts.

15 topics (15 versions)
3.1The Importance of Cybersecurity
3.2Past Cybersecurity Attacks
3.3Attacks in the Digital Age
3.4Common Attacks and Their Effectiveness
3.5Determine the Type of Attack
3.6Malware Families Overview
3.7Phishing and Social Engineering
3.8Web and API Attacks
3.9Ransomware Lifecycle
3.10DDoS and Botnets
3.11Insider Threat Scenarios
3.12Cloud-Specific Threats
3.13Mobile and IoT Threats
3.14Physical Security Threats
3.15Emerging Threat Trends

4. Understanding Attackers and Attack Methodologies
0 views

Profile adversaries, motivations, and the methods they use across the attack lifecycle.

15 topics (15 versions)
4.1Understand Attackers
4.2Threat Actors and Motivations
4.3The Cyber Kill Chain
4.4MITRE ATT&CK Basics
4.5Reconnaissance Techniques
4.6Initial Access Vectors
4.7Privilege Escalation Paths
4.8Lateral Movement Tactics
4.9Command and Control Patterns
4.10Data Exfiltration Methods
4.11Persistence Mechanisms
4.12Evasion and Anti-Forensics
4.13Social Engineering Playbooks
4.14Red Team vs Blue Team Mindsets
4.15Threat Intelligence Fundamentals

5. Security Frameworks, Controls, and Compliance
0 views

Map strategy to action with recognized frameworks, control catalogs, and regulatory obligations.

15 topics (15 versions)
5.1Introduction to Security Frameworks and Controls
5.2Controls, Frameworks, and Compliance
5.3NIST CSF Overview
5.4ISO/IEC 27001 Basics
5.5CIS Critical Security Controls
5.6SOC 2 Trust Services Criteria
5.7HIPAA Security Rule Basics
5.8PCI DSS Essentials
5.9GDPR and Privacy Principles
5.10Risk Assessment Process
5.11Control Selection and Mapping
5.12Control Testing and Assurance
5.13Policy and Procedure Development
5.14Audit Readiness and Evidence
5.15Continuous Compliance Monitoring

6. CISSP Domains: A Structured Overview
0 views

Gain a strategic view of the eight CISSP domains and how they interrelate.

15 topics (15 versions)
6.1Introduction to the Eight CISSP Security Domains, Part 1
6.2Introduction to the Eight CISSP Security Domains, Part 2
6.3Security and Risk Management
6.4Asset Security
6.5Security Architecture and Engineering
6.6Communication and Network Security
6.7Identity and Access Management
6.8Security Assessment and Testing
6.9Security Operations
6.10Software Development Security
6.11Domain Interdependencies
6.12Exam vs Practice Perspectives
6.13Foundational Concepts to Master
6.14Common Pitfalls Across Domains
6.15Building a Study Plan

7. Secure Design and Architecture
0 views

Apply secure-by-design principles to systems, networks, applications, and cloud.

15 topics (15 versions)
7.1Secure Design Principles
7.2Secure by Default and by Design
7.3Threat Modeling Basics
7.4Heather: Protect Sensitive Data and Information
7.5Architectural Patterns for Security
7.6Network Segmentation Strategies
7.7Encryption in Transit and at Rest
7.8Key Management Fundamentals
7.9Authentication and Authorization Patterns
7.10Secrets Management
7.11Hardening Baselines
7.12Logging and Telemetry Design
7.13Resilience and Fault Tolerance
7.14Security in DevOps and DevSecOps
7.15Secure Cloud Architecture Basics

8. Security Operations and Incident Response
0 views

Operate, monitor, and respond effectively to security events and breaches.

15 topics (15 versions)
8.1Security Operations Center Fundamentals
8.2Tier 1 Analyst Workflow
8.3Sean: Keep Your Cool During a Data Breach
8.4Incident Response Lifecycle
8.5Playbooks and Runbooks
8.6Alert Triage and Prioritization
8.7Indicators of Compromise
8.8Digital Forensics Basics
8.9Evidence Handling and Chain of Custody
8.10Containment, Eradication, Recovery
8.11Post-Incident Review
8.12Metrics for Detection and Response
8.13Threat Hunting Basics
8.14Endpoint Detection and Response
8.15Case Management and Ticketing

9. Tools of the Trade
0 views

Get familiar with common security tooling across detection, prevention, and assessment.

15 topics (15 versions)
9.1Common Cybersecurity Tools
9.2SIEM Fundamentals
9.3EDR and XDR Tools
9.4IDS and IPS Overview
9.5Vulnerability Scanners
9.6Web Application Scanners
9.7Packet Analysis with Wireshark
9.8Log Aggregation and Parsing
9.9Threat Intelligence Platforms
9.10Sandboxing and Malware Analysis
9.11Password Cracking and Audit Tools
9.12Network Mapping and Discovery
9.13Email Security Tooling
9.14Cloud Security Posture Management
9.15SAST and DAST Tools

10. Linux, SQL, and Python Foundations for Analysts
0 views

Develop practical fluency with OS, database, and scripting basics for security work.

15 topics (15 versions)
10.1Introduction to Linux, SQL, and Python
10.2Navigating the Linux Shell
10.3File Permissions and Ownership
10.4Processes and Services
10.5Networking Commands
10.6Log Files and Parsing
10.7Bash Scripting Basics
10.8SQL for Analysts
10.9Writing Secure SQL Queries
10.10Data Extraction and Reporting
10.11Python Syntax Essentials
10.12Working with APIs in Python
10.13Data Analysis with pandas Basics
10.14Automation and Scripting for SOC
10.15Virtual Environments and Packages

11. Protecting Business Operations
0 views

Translate security into resilient operations that safeguard critical business processes.

15 topics (15 versions)
11.1Tools for Protecting Business Operations
11.2Use Tools to Protect Business Operations
11.3Business Impact Analysis Basics
11.4Critical Assets and Processes
11.5Backup and Recovery Strategies
11.6High Availability and DR
11.7Access Control for Business Systems
11.8Email and Collaboration Security
11.9Endpoint Hardening at Scale
11.10Patch and Vulnerability Management
11.11Secure Remote Work
11.12Cloud SaaS Security Controls
11.13Third-Party Risk in Operations
11.14Security Awareness for Workforce
11.15Metrics for Operational Risk

12. Ethics, Law, and Professional Conduct
0 views

Ground your practice in ethics, privacy, and legal responsibilities.

15 topics (15 versions)
12.1Ethics in Cybersecurity
12.2Holly: The Importance of Ethics as a Cybersecurity Professional
12.3Ethical Concepts That Guide Cybersecurity Decisions
12.4Professional Codes of Conduct
12.5Responsible Disclosure
12.6Privacy by Design
12.7Legal Basics: CFAA and Analogues
12.8Regulatory Reporting Obligations
12.9Handling Sensitive Data
12.10Conflict of Interest Scenarios
12.11Working with Law Enforcement
12.12Red Team Ethics and Boundaries
12.13Bias and Fairness in Security Tools
12.14Ethics in AI and Automation
12.15Building Ethical Decision-Making Habits

13. Professional Development and Portfolio Building
0 views

Package your skills and experiences into a compelling, job-ready portfolio.

15 topics (15 versions)
13.1Create a Cybersecurity Portfolio
13.2Portfolio Activity Exemplar: Draft a Professional Statement
13.3Writing an Effective Professional Summary
13.4Showcasing Labs and Projects
13.5Documenting Incident Response Practice
13.6Reporting and Executive Summaries
13.7Open-Source Contributions
13.8Hackathon and CTF Participation
13.9Building a Home Lab
13.10Leveraging GitHub for Employers
13.11Resume Tailoring for Security Roles
13.12Interview Preparation and STAR
13.13Networking and Mentorship
13.14Personal Branding and Online Presence
13.15Career Growth Roadmap
Earn your certificate

Sign in to track your progress

When you’re signed in, we’ll remember which sections you’ve viewed. Finish all sections and you’ll unlock a downloadable certificate to keep or share.