Assets, Threats, and Vulnerabilities Course Syllabus
Full curriculum breakdown — modules, lessons, estimated time, and outcomes.
Overview: This foundational course introduces learners to the core concepts of identifying, assessing, and defending organizational assets against threats and vulnerabilities. Through a structured, hands-on approach aligned with industry standards like NIST and MITRE ATT&CK, you’ll develop an adversarial mindset and practical skills essential for roles in cybersecurity. The course spans approximately 15 hours of content, combining theory, case studies, and interactive labs to build competence in asset classification, threat modeling, and vulnerability management—ideal for beginners and aspiring SOC analysts.
Module 1: Introduction to Asset Security
Estimated time: 3 hours
- Asset classification
- NIST Cybersecurity Framework
- Differentiating physical vs. digital assets
- Inventorying assets and mapping critical resources
Module 2: Protecting Organizational Assets
Estimated time: 4 hours
- Implementing security controls like encryption and hashing
- Authentication vs. authorization techniques
- Control selection based on asset sensitivity
- Embedded labs on control implementation
Module 3: Vulnerabilities in Systems
Estimated time: 4 hours
- Vulnerability life-cycle and management
- Understanding CVEs
- MITRE ATT&CK framework
- Case-based exercises on vulnerability discovery and mitigation
Module 4: Threats to Asset Security
Estimated time: 4 hours
- Malware, phishing, and social engineering
- Web-based exploits
- Threat modeling principles
- Practical labs using a threat modeling methodology
Prerequisites
- Familiarity with basic computing concepts
- No prior cybersecurity experience required
- Basic understanding of organizational IT systems helpful
What You'll Be Able to Do After
- Classify organizational assets by type and sensitivity
- Analyze attack surfaces to identify risks and exposure points
- Recognize common cyber threats such as social engineering and malware
- Apply threat modeling techniques using an attacker’s mindset
- Understand and contribute to vulnerability management processes