Skip to content

🔒 CYS401 — Fundamentals of Cybersecurity

This course introduces the core concepts, technologies, and practices of cybersecurity in organizational and real-world contexts. It focuses on understanding threats and attacks, applying security principles, and designing countermeasures to protect modern systems and information assets.

This section contains structured study material including topic-based notes covering core cybersecurity domains, quizzes and practice questions, and supporting examples and explanations. The goal is a clear, practical resource for understanding cybersecurity fundamentals and preparing for exams and applied discussions.


🧭 How to Use This Section

Depending on where you are in the course, use this section differently.

If you are following the course, start with the introduction and security foundations topics and continue in order. If you are revising, focus on the quizzes and the sections you find most conceptually dense. If you are interested in a specific domain such as cryptography, cloud security, or web security, you can jump directly to that topic.


🗂 Course Topics

  • 🔍 Introduction to Cybersecurity


    Cybersecurity concepts and terminology, objectives and goals, the CIA triad, and critical information characteristics.

  • 🛡 Security Foundations & Principles


    Threats, attacks, vulnerabilities, and countermeasures. Common attack types, threat modeling and STRIDE, layered defenses, and cybersecurity governance.

  • 🗄 Data Security & Information Asset Protection


    Information assets and classification, due care and diligence, data labeling, sanitization techniques, ownership roles, and data protection legislation.

  • 🔑 Cryptography Fundamentals


    Core cryptographic concepts, symmetric and asymmetric cryptography, digital signatures, data integrity, PKI, and digital certificates.

  • 📐 Principles of Security Design


    Security architecture and design principles, common architecture flaws, and protection mechanisms for confidentiality, integrity, and availability.

  • 🖥 Computer Architecture Security


    Hardware components, protection rings, memory protection, firmware and OS hardening, input/output security, TEMPEST, and server/client security.

  • ☁ Systems Architecture Security


    Database security, cloud and virtualization security, IoT security, web security and OWASP, and mobile device security.

  • 🏭 ICS & SCADA System Security


    ICS and SCADA security landscape, vulnerabilities and threats, security requirements and governance, compliance, and smart grid applications.

  • 👤 Managing Identity & Authentication


    Access control models and attacks, identification and authentication mechanisms, identity management, and biometric standards.


🗒 Study & Revision Material

In addition to the topic notes, this section includes quizzes and practice questions for key topics, along with supporting explanations and examples. These are designed to support both deep understanding and efficient exam preparation.


Step Topic
1 Introduction and security foundations — build core concepts first
2 Data security and cryptography — understand protection mechanisms
3 Security design and computer architecture security
4 Systems architecture security and specialized domains
5 ICS and SCADA systems
6 Identity and authentication
7 Quizzes to test understanding and identify weak areas

About This Material

These notes are based on my own coursework and personal study. The focus is on clarity, structure, and practical understanding. Content will continue to be refined and expanded over time.