Course Curriculum

    1. Course Overview and Learning Outcomes

    1. 1.1 Understanding Cybersecurity: Importance and Scope

    2. Quiz 1.1

    3. 1.2 Cyber Threat Landscape: Types of Cyber Threats

    4. Quiz 1.2

    5. 1.3 The CIA Triad: Confidentiality, Integrity, and Availability

    6. Quiz 1.3

    7. 1.4 Security Principles: Least Privilege, Defense in Depth, Zero Trust

    8. Quiz 1.4

    9. 1.5 Cybersecurity Careers: SOC Analyst, Penetration Tester, GRC, etc.

    10. Quiz 1.5

    11. 1.6 Ethical Hacking vs. Cybercrime: Understanding Legal Boundaries

    12. Quiz 1.6

    13. Reference video

    1. 2.1 Understanding Networks: LAN, WAN, Internet

    2. Quiz 2.1

    3. 2.2 IP Addressing, Subnetting, and CIDR

    4. Quiz 2.2

    5. 2.3 TCP/IP Model vs. OSI Model

    6. Quiz 2.3

    7. 2.4 Common Network Protocols: HTTP, HTTPS, FTP, DNS, SMTP

    8. Quiz 2.4

    9. 2.5 Firewalls, IDS/IPS, and Network Security Basics

    10. Quiz 2.5

    11. 2.6 VPNs, Proxies, and TOR: Anonymity Online

    12. Quiz 2.6

    13. Lab 1: Understanding IP Addressing and Valid Ranges

    14. Lab 2: Setting Up a VPN Connection and Testing Network Security

    15. Reference Video

    1. 3.1 Malware Types: Viruses, Trojans, Ransomware, Worms, Rootkits

    2. Quiz 3.1

    3. 3.2 Phishing, Spear Phishing, and Social Engineering

    4. Quiz 3.2

    5. 3.3 DoS and DDoS Attacks: How They Work and Prevention

    6. Quiz 3.3

    7. 3.4 Man-in-the-Middle (MITM) Attacks

    8. Quiz 3.4

    9. 3.5 Insider Threats: Detecting and Preventing Insider Attacks

    10. Quiz 3.5

    11. 3.6 Emerging Threats: AI in Cybersecurity, Deepfake Threats

    12. Quiz 3.6

    13. Case Study: The RSA Encryption Crisis – The Quantum Threat to Global Security

    14. Lab 1: Malware Analysis – Using a Sandbox to Analyze Suspicious Files

    15. Lab 2: Phishing Attack Simulation – Simulating a Phishing Email & Studying Detection

    16. Lab 3: Breaking RSA with Factorization (Pre-Quantum Simulation)

    17. Reference Video

    1. 4.1 Windows Security: UAC, Windows Defender, BitLocker

    2. Quiz 4.1

    3. 4.2 Linux Security: Permissions, iptables, SELinux

    4. Quiz 4.2

    5. 4.3 macOS Security: Gatekeeper, XProtect, System Integrity Protection (SIP)

    6. Quiz 4.3

    7. 4.4 Hardening Operating Systems: Patching, Least Privilege

    8. Quiz 4.4

    9. 4.5 Secure File Systems and Encryption

    10. Quiz 4.5

    11. Lab 1: Encrypting and Decrypting Files with GPG & VeraCryp

    12. Lab 2: Detecting and Analyzing Security Logs Using Windows Event Viewer & Linux Logs

    13. Reference video

    1. 5.1 Symmetric vs. Asymmetric Encryption

    2. Quiz 5.1

    3. 5.2 Hashing and Digital Signatures

    4. Quiz 5.2

    5. 5.3 TLS/SSL: How HTTPS Works

    6. Quiz 5.3

    7. 5.4 PKI (Public Key Infrastructure)

    8. Quiz 5.4

    9. 5.5 Secure Email: PGP/GPG

    10. Quiz 5.5

    11. 5.6 Cryptanalysis and Breaking Encryption

    12. Quiz 5.6

    13. Lab 1: Securing Communications Against Interception

    14. Lab 2: Cracking Weak Passwords Using John the Ripper and Hashcat

    15. Reference Video

About this course

  • 171 lessons
  • 1750+ Transfer Colleges
  • ACE & NCCRS Approved
  • Globally Recognized

Answers You Didn't Know You Needed!

    General Questions

  • With UPI, you determine your own level of time commitment. You can move through coursework quickly or slow down your pace.

  • YES, there are exams—held online on our platform and are proctored. Your course grade distribution is:

    • 25% Attendance
    • 25% Quiz
    • 25% Assignments
    • 25% Final Exam
  • Content Questions

  • To ensure your UPI Study courses transfer to your university, check two things: 

    1) Is your university listed? If it's one of the 1,500 universities listed with NCCRS, you're all set. 

    OR 

    2) Check your university's credit policy. If it says they accept credits from "regionally accredited" universities, you're good to go! As long as you meet one of these criteria, your courses should transfer without a hitch.

    Check the list of colleges here.

  • Membership Questions

  • Yes, that is what differentiates UPI. With each student their advisor will guide them on how to move forward.