Skip to Content
Ghunchas - Cybersecurity Fundamentals

Ghunchas - Cybersecurity Fundamentals

In an era where data breaches, ransomware attacks, and digital espionage are alarmingly common, understanding the basics of cybersecurity is no longer optional β€” it's essential.

Ghunchas – Cybersecurity Fundamentals is a beginner-friendly course designed to give you a solid introduction to the key principles and practices of protecting digital information.

πŸš€ What You’ll Explore

πŸ“˜ General Security Concepts

Gain a clear understanding of the CIA triad β€” Confidentiality, Integrity, and Availability β€” that form the backbone of modern cybersecurity.

⚠️ Threats & Vulnerabilities

Identify common cyber threats and system weaknesses that hackers exploit to compromise security.

πŸ›‘οΈ Mitigations

Learn practical methods to reduce risk, strengthen defenses, and prevent cyberattacks.

πŸ—οΈ Security Architecture

Discover how secure networks, systems, and applications are designed and structured.

πŸ” Security Operations

See how organizations monitor, detect, and respond to security incidents in real time.

πŸ“Š Security Program Management & Oversight

Understand how cybersecurity is governed and managed at a strategic level β€” from compliance to risk planning.

🎯 Who Is This For?

Whether you're a student, a professional exploring new skills, or someone looking to protect personal or organizational data, this course delivers practical knowledge with real-world relevance.

πŸ›‘οΈ Start your journey in digital defense with Ghunchas – and become part of the solution to today’s cybersecurity challenges.

Responsible Dr. Shehneela Mahar
Last Update 04/29/2025
Completion Time 8 hours 10 minutes
Members 1
    • What Is Cybersecurity
  • Chapter 1: General Security Concepts
    18Lessons Β· 1 hr 34 min
    • General Security Concepts
    • Overview
    • Types Of Security Controls
    • CIA Triad, Non-repudiation
    • Authentication, Authorization, and Accounting (AAA)
    • Gap Analysis
    • Zero Trust
    • Deception and Disruption
    • Physical Security
    • Change Management
    • Cryptography and PKI
    • Encryption
    • Block Ciphers vs Stream
    • Encryption Tools (TPM, HSM, Secure Enclave)
    • Obfuscation: Steganography, Tokenization, Masking
    • Hashing & Salting
    • Blockchain Technology: How Bitcoin Works
    • Quiz
      10 xp
  • Chapter 2:Threats, Vulnerabilities, and Mitigations
    22Lessons Β· 2 hr 6 min
    • Overview
    • Threat Actors
    • Attributes of Threat Actors
    • Threat Vectors
    • Supply Chain
    • Social Engineering
    • What Is Vulnerability
    • Application Vulnerabilities
    • Web-based Vulnerabilities
    • Virtualization Vulnerabilities
    • Types of Vulnerabilities (Zero-day, Cryptographic, Mobile)
    • Types Of Malware
    • Network Attacks
    • Application Attacks
    • Cryptographic Attacks
    • Password Attacks
    • Indicators Of Malicious Activity
    • Mitigation Techniques
    • Network Appliances
    • Quiz 2
      10 xp
    • Quiz 5
      10 xp
    • Ghunchas-Cyberseurity Fundamentals
  • Chapter 3: Security Architechture
    13Lessons Β· 1 hr 18 min
    • Mobile Solutions
    • Overview
    • Infrastructure Concepts
    • Firewalls
    • Methods to Secure Data
    • Resiliency and Recovery
    • Application Security
    • What Is Cloud?
    • Secure Communication -- VPN, TLS, IPsec, SASE
    • Cloud Infrastructure Concepts
    • Email Security
    • Infrastructure Considerations
    • Quiz 3
      10 xp
  • Chapter 4: Security Operations
    20Lessons Β· 1 hr 54 min
    • Baselines and Hardening
    • Network Infrastructure
    • Overview
    • Intro to IAM (Authentication, SSO, Federation)
    • Asset Management
    • Vulnerability Management (Identification)
    • Authentication Protocols (Kerberos, SAML, OpenID, OAuth, LDAP)
    • Security Alerting and Monitoring
    • Digital Forensics
    • Overview
    • Vulnerability Management (Analysis)
    • Vulnerability Management (Remediation/Mitigation)
    • Firewall Configuration
    • Multi-Factor Authentication (MFA)
    • Intro to Organizations (Structures, Roles & Responsibilities)
    • Access Control Schemes (RBAC, MAC, DAC, ABAC)
    • Business Impact Analysis (BIA)
    • Password Policies
    • Third Party Risk Assessment
    • Quiz 4
      10 xp
  • Chapter 5: Security Program Management and Oversight
    10Lessons Β· 1 hr 12 min
    • Security Compliance
    • Architecture Model Considerations
    • Security Awareness Practices
    • Data Types and Data Classification
    • Audits and Assessments
    • Policies, Procedures, Standards, Guidelines
    • What Is Risk Management ?
    • Risk Identification (Risk Management)
    • Risk Analysis
    • Risk Mitigation & Monitoring (Risk Management)