Course Curriculum

    1. Course Overview and Learning Outcomes

    1. 1.1 Understanding Cybersecurity: Importance and Scope

    2. Quiz 1.1

    3. 1.2 Cyber Threat Landscape: Types of Cyber Threats

    4. Quiz 1.2

    5. 1.3 The CIA Triad: Confidentiality, Integrity, and Availability

    6. Quiz 1.3

    7. 1.4 Security Principles: Least Privilege, Defense in Depth, Zero Trust

    8. Quiz 1.4

    9. 1.5 Cybersecurity Careers: SOC Analyst, Penetration Tester, GRC, etc.

    10. Quiz 1.5

    11. 1.6 Ethical Hacking vs. Cybercrime: Understanding Legal Boundaries

    12. Quiz 1.6

    13. Reference video

    1. 2.1 Understanding Networks: LAN, WAN, Internet

    2. Quiz 2.1

    3. 2.2 IP Addressing, Subnetting, and CIDR

    4. Quiz 2.2

    5. 2.3 TCP/IP Model vs. OSI Model

    6. Quiz 2.3

    7. 2.4 Common Network Protocols: HTTP, HTTPS, FTP, DNS, SMTP

    8. Quiz 2.4

    9. 2.5 Firewalls, IDS/IPS, and Network Security Basics

    10. Quiz 2.5

    11. 2.6 VPNs, Proxies, and TOR: Anonymity Online

    12. Quiz 2.6

    13. Self-Paced Lab 1: Understanding IP Addressing and Valid Ranges

    14. Self Paced Lab 2: Openvpn security lab (browser-based via gitpod)

    15. OPTIONAL LAB: Setting Up a VPN Connection and Testing Network Security

    16. Reference Video

    1. 3.1 Malware Types: Viruses, Trojans, Ransomware, Worms, Rootkits

    2. Quiz 3.1

    3. 3.2 Phishing, Spear Phishing, and Social Engineering

    4. Quiz 3.2

    5. 3.3 DoS and DDoS Attacks: How They Work and Prevention

    6. Quiz 3.3

    7. 3.4 Man-in-the-Middle (MITM) Attacks

    8. Quiz 3.4

    9. 3.5 Insider Threats: Detecting and Preventing Insider Attacks

    10. Quiz 3.5

    11. 3.6 Emerging Threats: AI in Cybersecurity, Deepfake Threats

    12. Quiz 3.6

    13. Case Study: The RSA Encryption Crisis – The Quantum Threat to Global Security

    14. Self-Paced Lab 3 : Malware Behavior Analysis in Browser Using Triage Sandbox

    15. Self-Paced Lab 4: Malware Behavior Analysis Lab

    16. Self-Paced Lab 5: Simulating & Detecting Phishing Attacks

    17. Self-Paced Lab 6: RSA, Shor’s Algorithm, and CRYSTALS-Kyber

    18. Optional Lab 1: Malware Analysis – Using a Sandbox to Analyze Suspicious Files

    19. Optional Lab 2: Phishing Attack Simulation – Simulating a Phishing Email & Studying Detection

    20. Optional Lab 3: Breaking RSA with Factorization (Pre-Quantum Simulation)

    21. Reference Video

    1. 4.1 Windows Security: UAC, Windows Defender, BitLocker

    2. Quiz 4.1

    3. 4.2 Linux Security: Permissions, iptables, SELinux

    4. Quiz 4.2

    5. 4.3 macOS Security: Gatekeeper, XProtect, System Integrity Protection (SIP)

    6. Quiz 4.3

    7. 4.4 Hardening Operating Systems: Patching, Least Privilege

    8. Quiz 4.4

    9. 4.5 Secure File Systems and Encryption

    10. Quiz 4.5

    11. Self-Paced Lab 7: Encryption Lab with GPG on Gitpod

    12. OPTIONAL Lab 1: Encrypting and Decrypting Files with GPG & VeraCryp

    13. OPTIONAL Lab 2: Detecting and Analyzing Security Logs Using Windows Event Viewer & Linux Logs

    14. Reference video

    1. 5.1 Symmetric vs. Asymmetric Encryption

    2. Quiz 5.1

    3. 5.2 Hashing and Digital Signatures

    4. Quiz 5.2

    5. 5.3 TLS/SSL: How HTTPS Works

    6. Quiz 5.3

    7. 5.4 PKI (Public Key Infrastructure)

    8. Quiz 5.4

    9. 5.5 Secure Email: PGP/GPG

    10. Quiz 5.5

    11. 5.6 Cryptanalysis and Breaking Encryption

    12. Quiz 5.6

    13. Lab 1: Securing Communications Against Interception

    14. Lab 2: Cracking Weak Passwords Using John the Ripper and Hashcat

    15. Reference Video

About this course

  • 177 lessons
  • 1750+ Transfer Colleges
  • ACE & NCCRS Approved
  • Globally Recognized

Answers You Didn't Know You Needed!

    General Questions

  • With UPI, you determine your own level of time commitment. You can move through coursework quickly or slow down your pace.

  • YES, there are exams—held online on our platform and are proctored. Your course grade distribution is:

    • 25% Attendance
    • 25% Quiz
    • 25% Assignments
    • 25% Final Exam
  • Content Questions

  • To ensure your UPI Study courses transfer to your university, check two things: 

    1) Is your university listed? If it's one of the 1,500 universities listed with NCCRS, you're all set. 

    OR 

    2) Check your university's credit policy. If it says they accept credits from "regionally accredited" universities, you're good to go! As long as you meet one of these criteria, your courses should transfer without a hitch.

    Check the list of colleges here.

  • Membership Questions

  • Yes, that is what differentiates UPI. With each student their advisor will guide them on how to move forward.