Session 01: Introduction to Cybersecurity - Build a clear, practical foundation in cybersecurity fundamentals. Learn threats, risks, and the essentials of protecting data and projects in real organizational contexts.
Build a clear, practical foundation in cybersecurity—threats, risks, and the essentials of protecting data and projects. Learn the basics you need to reason about security in real organizational contexts.
This course introduces students to the crucial challenges of cybersecurity by providing them with an understanding of threats, vulnerabilities, and risks. Participants will learn to assess organizational risks, adopt good digital practices, and understand current data protection legislation. This program aims to develop essential theoretical and practical skills to navigate the cybersecurity landscape.
Group capstone project, MCQs, exercises
Case study + course questions
Business impact and real-world relevance
Reliability
"Will the system keep working under expected conditions?"
Security
"Will the system keep working under adversarial conditions?"
Everyone owns part of it, but accountability must be clear:
Threat, vulnerability, risk
A potential cause of harm (criminal groups, malware campaigns, insiders, accidents).
A weakness in technology, process, or people that could be exploited.
The combination of likelihood and impact if a threat exploits a vulnerability.
A measure that reduces risk (technology, process, or behavior).
There is a risk that a phishing campaign exploits weak authentication (no MFA), causing invoice fraud and financial losses.
Why it works: it names the scenario, the weakness, and the business impact in one sentence.
Attack patterns and vectors
Click a threat type to see how it typically works and which controls reduce risk.
Attackers impersonate trusted entities (a manager, supplier, bank, or IT) to steal credentials, redirect payments, or convince someone to bypass process. Increasingly supported by AI (better language, deepfake voice, faster targeting).
Describe the likely outcome in business terms: downtime, fraud, data exposure, or trust damage.
For each threat type, identify:
MITRE ATT&CK framework
Professionals often map real attacker behavior using the MITRE ATT&CK framework (a knowledge base of tactics and techniques). You do not need to memorize it now, but you should understand the idea: attackers reuse techniques, and defenders can measure coverage.
If you want to explore later: search for “MITRE ATT&CK tactics” and compare them with the chain above.
Open each step to see typical controls and manager questions.
How attackers get a first foothold.
Attackers try to become admins and remain hidden.
Attackers move from the first system to others.
Attackers locate and steal valuable data.
Attackers disrupt operations to force payment or cause damage.
Motives and attribution
Likelihood, impact, decisions
Move the sliders to see how criticality, likelihood, and impact change prioritization.
Use it as a conversation starter: “If this happened, would the business accept it?” If not, you need controls to reduce likelihood and/or impact.
This is a toy model. Real risk analysis also considers detection time, existing controls, and your risk appetite. Critical assets often get “at least Medium” priority even when unlikely.
Risk: credential theft could lead to unauthorized payments and financial loss.
Current landscape
EU cybersecurity agency
"Because ransomware and availability attacks are top trends (ENISA), we will invest in backups + MFA + segmentation to reduce downtime risk for critical operations."
Statistics and metrics
Key takeaways
Next you will learn how the internet works (networks, the web, protection mechanisms) and why "digital hygiene" is the cheapest security investment.
Knowledge validation
Flashcards and definitions
Meet the course instructors and support team