Cybersecurity

titlefrontend

About this learning track

This 16-week cybersecurity program takes you from the fundamentals of digital security to hands-on experience with real-world attack and defense techniques. You’ll learn core principles like the CIA triad, explore ethical practices, and gain practical skills in Linux, networking, vulnerability assessment, and exploitation.

With a strong focus on web application security through the OWASP Top 10, guided labs, and capture-the-flag challenges, the curriculum blends theory with practice to prepare you for roles such as cybersecurity analyst, penetration tester, or ethical hacker.

What you will learn

  • A Strong Foundation – grasp the core principles of cybersecurity, understand today’s biggest threats, and discover why security is at the heart of every digital system.
  • Practical, Job-Ready Skills – learn Linux, networking, and powerful tools like Nmap through real-world exercises that security professionals use every day.
  • Hands-On Experience – not just theory. You’ll scan, exploit, and defend in guided labs, capture the flag challenges, and simulated attack scenarios.
  • Web Security Expertise – explore the OWASP Top 10 vulnerabilities, practice spotting them, and master how to secure applications against real attack methods.
  • Career & Ethical Readiness – understand the ethics of hacking, learn to document your findings like a pro, and prepare for entry-level roles in cybersecurity.

Requirements

  • A working laptop
  • Steady internet access
  • A working mobile phone
  • A learning attitude

Curriculum

Master cybersecurity essentials, from foundations and ethics to threat analysis, Linux, and network scanning, building the skills needed to defend and secure digital systems.

Week 1 - Cybersecurity Foundations

In this lesson, you will learn the basics of cybersecurity, including why it matters, the CIA triad (Confidentiality, Integrity, Availability), key domains, and common terminology. You will also explore who cyber threat actors are and why they pose risks. By the end of this lesson, you should be able to explain the importance of cybersecurity, define core concepts, and recognize different types of threat actors.

Week 2 - Cyberethics & Careers

In this lesson, you will learn about digital ethics, privacy, ownership, and the consequences of online actions, as well as ethical dilemmas like whistleblowing and trolling. You will also explore cybersecurity career paths, roles, and the concept of ethical hacking. By the end of this lesson, you should be able to apply ethical principles in digital spaces and identify possible career paths in cybersecurity.

Week 3 - Cyber Threats

In this lesson, you will learn about the different types of cyber threats including phishing, social engineering, malware (viruses, worms, trojans), zero-day exploits, DDoS attacks, insider threats, and human errors. By the end of this lesson, you should be able to classify common threats and explain how they target vulnerabilities.

Week 4 - Linux for Security

In this lesson, you will learn why Linux is widely used in cybersecurity, how to navigate its file system, use terminal commands, manage users and processes, and perform basic scripting. By the end of this lesson, you should be able to operate confidently in a Linux environment and apply security-related tasks.

Week 5 - Network Scanning

In this lesson, you will learn the fundamentals of IP addressing, subnetting, and network scanning using Nmap, including advanced techniques and scripting. You will also explore enumeration and scan documentation. By the end of this lesson, you should be able to perform scans, interpret results, and document findings effectively.

Cybersecurity rewards the relentless.

Onuchi

Onuchi

Path Lead