00 · Introduction¶
This module is your entry point into cybersecurity. Before tools, before techniques, before certifications — you need the mental model. That's what this module builds.
What's in This Module¶
| # | Topic | What You'll Learn |
|---|---|---|
| 1 | What is Cybersecurity | Scope of the field, why it matters, how it's structured |
| 2 | Types of Hackers | White hat, black hat, grey hat, nation-states, hacktivists |
| 3 | Attacker Mindset | How attackers think, why offense informs defense |
| 4 | Vulnerability vs Threat vs Risk | Core vocabulary, often confused — get it right from day one |
| 5 | Attack Types Overview | Active vs passive attacks, targeted vs opportunistic |
| 6 | CIA Triad | Confidentiality, Integrity, Availability — the foundation |
| 7 | Security Principles | Least privilege, fail-safe defaults, separation of duties |
| 8 | Threat Modeling | STRIDE, attack trees, how to think about threats systematically |
| 9 | Defense in Depth | Layered security, why no single control is enough |
| 10 | Zero Trust | Never trust, always verify — the modern security model |
| 11 | Security Domains Overview | Map of the entire field — where everything connects |
| 12 | How to Use This Repo | Learning paths, how content is structured, what to do next |
Learning Order¶
Follow the table above top to bottom. Each topic builds on the previous one.
Don't skip ahead — the frameworks in topics 6–10 only make sense after the vocabulary in 1–5.
Time estimate
Plan for 6–10 hours to work through this module properly.
Reading fast is not the goal. Understanding is.