Cybersecurity Foundations — IAM & Threat Modeling
techbeginner • ~6h • SKU: cybersecurity-foundations
What You’ll Learn
- Identity & access control fundamentals (users, roles, permissions)
- Least privilege and secure policy design
- Threat modeling workflow (assets → threats → mitigations)
- Secure-by-default patterns for common systems
Outline
- Security basics: CIA, risk, and attack surface
- IAM concepts: authentication vs authorization
- Policies: allow/deny logic and common pitfalls
- Threat modeling: STRIDE-style thinking
- Mitigations: logging, segmentation, validation
- Practical exercises + review checklist
How Access Works
After payment, you receive course access links (Google Drive) and any included practice materials by email. If you don’t receive access, contact support.