Ghunchas - Cybersecurity Fundamentals
In an era where data breaches, ransomware attacks, and digital espionage are alarmingly common, understanding the basics of cybersecurity is no longer optional β it's essential.
Ghunchas β Cybersecurity Fundamentals is a beginner-friendly course designed to give you a solid introduction to the key principles and practices of protecting digital information.
π What Youβll Explore
π General Security Concepts
Gain a clear understanding of the CIA triad β Confidentiality, Integrity, and Availability β that form the backbone of modern cybersecurity.
β οΈ Threats & Vulnerabilities
Identify common cyber threats and system weaknesses that hackers exploit to compromise security.
π‘οΈ Mitigations
Learn practical methods to reduce risk, strengthen defenses, and prevent cyberattacks.
ποΈ Security Architecture
Discover how secure networks, systems, and applications are designed and structured.
π Security Operations
See how organizations monitor, detect, and respond to security incidents in real time.
π Security Program Management & Oversight
Understand how cybersecurity is governed and managed at a strategic level β from compliance to risk planning.
π― Who Is This For?
Whether you're a student, a professional exploring new skills, or someone looking to protect personal or organizational data, this course delivers practical knowledge with real-world relevance.
π‘οΈ Start your journey in digital defense with Ghunchas β and become part of the solution to todayβs cybersecurity challenges.
Responsible | Dr. Shehneela Mahar |
---|---|
Last Update | 04/29/2025 |
Completion Time | 8 hours 10 minutes |
Members | 1 |
-
-
What Is Cybersecurity
-
-
Chapter 1: General Security Concepts18Lessons Β· 1 hr 34 min
-
General Security Concepts
-
Overview
-
Types Of Security Controls
-
CIA Triad, Non-repudiation
-
Authentication, Authorization, and Accounting (AAA)
-
Gap Analysis
-
Zero Trust
-
Deception and Disruption
-
Physical Security
-
Change Management
-
Cryptography and PKI
-
Encryption
-
Block Ciphers vs Stream
-
Encryption Tools (TPM, HSM, Secure Enclave)
-
Obfuscation: Steganography, Tokenization, Masking
-
Hashing & Salting
-
Blockchain Technology: How Bitcoin Works
-
Quiz10 xp
-
-
Chapter 2:Threats, Vulnerabilities, and Mitigations22Lessons Β· 2 hr 6 min
-
Overview
-
Threat Actors
-
Attributes of Threat Actors
-
Threat Vectors
-
Supply Chain
-
Social Engineering
-
What Is Vulnerability
-
Application Vulnerabilities
-
Web-based Vulnerabilities
-
Virtualization Vulnerabilities
-
Types of Vulnerabilities (Zero-day, Cryptographic, Mobile)
-
Types Of Malware
-
Network Attacks
-
Application Attacks
-
Cryptographic Attacks
-
Password Attacks
-
Indicators Of Malicious Activity
-
Mitigation Techniques
-
Network Appliances
-
Quiz 210 xp
-
Quiz 510 xp
-
Ghunchas-Cyberseurity Fundamentals
-
-
Chapter 3: Security Architechture13Lessons Β· 1 hr 18 min
-
Mobile Solutions
-
Overview
-
Infrastructure Concepts
-
Firewalls
-
Methods to Secure Data
-
Resiliency and Recovery
-
Application Security
-
What Is Cloud?
-
Secure Communication -- VPN, TLS, IPsec, SASE
-
Cloud Infrastructure Concepts
-
Email Security
-
Infrastructure Considerations
-
Quiz 310 xp
-
-
Chapter 4: Security Operations20Lessons Β· 1 hr 54 min
-
Baselines and Hardening
-
Network Infrastructure
-
Overview
-
Intro to IAM (Authentication, SSO, Federation)
-
Asset Management
-
Vulnerability Management (Identification)
-
Authentication Protocols (Kerberos, SAML, OpenID, OAuth, LDAP)
-
Security Alerting and Monitoring
-
Digital Forensics
-
Overview
-
Vulnerability Management (Analysis)
-
Vulnerability Management (Remediation/Mitigation)
-
Firewall Configuration
-
Multi-Factor Authentication (MFA)
-
Intro to Organizations (Structures, Roles & Responsibilities)
-
Access Control Schemes (RBAC, MAC, DAC, ABAC)
-
Business Impact Analysis (BIA)
-
Password Policies
-
Third Party Risk Assessment
-
Quiz 410 xp
-
-
Chapter 5: Security Program Management and Oversight10Lessons Β· 1 hr 12 min
-
Security Compliance
-
Architecture Model Considerations
-
Security Awareness Practices
-
Data Types and Data Classification
-
Audits and Assessments
-
Policies, Procedures, Standards, Guidelines
-
What Is Risk Management ?
-
Risk Identification (Risk Management)
-
Risk Analysis
-
Risk Mitigation & Monitoring (Risk Management)
-