This repository contains notes, labs, playbooks, case studies, and certificate of completion for the
Fundamentals of Cybersecurity (upGrad) program.
It provides a strong foundation in security principles, threats, network defense, cryptography, and incident response.
- 📄
01-introduction.md– Introduction to cybersecurity - 📄
02-information-security-triad.md– CIA triad - 📄
03-threats-and-attack-vectors.md– Threats & attack vectors - 📄
04-network-basics.md– Networking fundamentals - 📄
05-cryptography-basics.md– Cryptography essentials - 📄
06-authentication-authorization.md– Authentication & authorization - 📄
07-endpoint-security.md– Endpoint protection & hardening - 📄
08-web-security.md– Web security basics - 📄
09-application-security.md– Application security - 📄
10-cloud-security-basics.md– Cloud security principles - 📄
11-incident-response.md– Incident response lifecycle - 📄
12-security-monitoring-logging.md– Monitoring & logging - 📄
13-risk-management.md– Risk management & threat modeling - 📄
14-compliance-privacy.md– Compliance & privacy - 📄
15-reporting-mitigation.md– Reporting & mitigation strategies
- 🔴
red-team-labs.md– Offensive security basics - 🔵
blue-team-defense.md– Defensive strategies - ✍️
hands-on-exercises.md– Guided exercises
- ✅
incident-response-playbook.md– Incident response workflow - ✅
phishing-response-playbook.md– Phishing containment & mitigation - ✅
ransomware-response-playbook.md– Ransomware handling
- 📑
case-studies.md– Real-world incidents (WannaCry, Equifax, Capital One) - 📚
resources.md– Tools, platforms, communities - 📆
timeline.md– Suggested 5-week learning roadmap
- 📘
index.md– Overview - 📘
syllabus.md– Course syllabus - 📘
roadmap.md– Study roadmap - 📘
references.md– References - 📘
glossary.md– Cybersecurity glossary
| Step | Screenshot |
|---|---|
| 📚 Course Dashboard | ![]() |
| 📊 Progress Tracker | ![]() |
This program was an excellent entry point into the world of cybersecurity.
The CIA triad, threat modeling, and incident response modules helped me build a structured understanding.
Hands-on labs (red vs blue) gave me insight into both offensive and defensive thinking.
I especially valued the playbooks, which simulate real-world workflows like phishing and ransomware response.
Overall, this course is highly recommended for beginners and intermediate learners who want a strong foundation.
Thành Danh – Red Team Learner & Security Researcher
- GitHub: @ngvuthdanhh
- Email: ngvu.thdanh@gmail.com
This project is licensed under the terms of the MIT License.
See LICENSE for full details.
© 2025 ngvuthdanhh. All rights reserved.

