CYS401 — Fundamentals of Cybersecurity¶
This course introduces the core concepts, technologies, and practices of cybersecurity in organizational and real-world contexts. It focuses on understanding threats and attacks, applying security principles, and designing countermeasures to protect modern systems and information assets.
This section contains structured study material including topic-based notes covering core cybersecurity domains, quizzes and practice questions, and supporting examples and explanations. The goal is a clear, practical resource for understanding cybersecurity fundamentals and preparing for exams and applied discussions.
How to Use This Section¶
Depending on where you are in the course, use this section differently.
If you are following the course, start with the introduction and security foundations topics and continue in order. If you are revising, focus on the quizzes and the sections you find most conceptually dense. If you are interested in a specific domain such as cryptography, cloud security, or web security, you can jump directly to that topic.
Course Topics¶
-
Introduction to Cybersecurity
Cybersecurity concepts and terminology, objectives and goals, the CIA triad, and critical information characteristics.
-
Security Foundations & Principles
Threats, attacks, vulnerabilities, and countermeasures. Common attack types, threat modeling and STRIDE, layered defenses, and cybersecurity governance.
-
Data Security & Information Asset Protection
Information assets and classification, due care and diligence, data labeling, sanitization techniques, ownership roles, and data protection legislation.
-
Cryptography Fundamentals
Core cryptographic concepts, symmetric and asymmetric cryptography, digital signatures, data integrity, PKI, and digital certificates.
-
Principles of Security Design
Security architecture and design principles, common architecture flaws, and protection mechanisms for confidentiality, integrity, and availability.
-
Computer Architecture Security
Hardware components, protection rings, memory protection, firmware and OS hardening, input/output security, TEMPEST, and server/client security.
-
Systems Architecture Security
Database security, cloud and virtualization security, IoT security, web security and OWASP, and mobile device security.
-
ICS & SCADA System Security
ICS and SCADA security landscape, vulnerabilities and threats, security requirements and governance, compliance, and smart grid applications.
-
Managing Identity & Authentication
Access control models and attacks, identification and authentication mechanisms, identity management, and biometric standards.
Study & Revision Material¶
In addition to the topic notes, this section includes quizzes and practice questions for key topics, along with supporting explanations and examples. These are designed to support both deep understanding and efficient exam preparation.
Recommended Study Path¶
| Step | Topic |
|---|---|
| 1 | Introduction and security foundations — build core concepts first |
| 2 | Data security and cryptography — understand protection mechanisms |
| 3 | Security design and computer architecture security |
| 4 | Systems architecture security and specialized domains |
| 5 | ICS and SCADA systems |
| 6 | Identity and authentication |
| 7 | Quizzes to test understanding and identify weak areas |
About This Material
These notes are based on my own coursework and personal study. The focus is on clarity, structure, and practical understanding. Content will continue to be refined and expanded over time.