🔹 MODULE 1 - Modern Digital Systems & Infrastructure Foundations (6 Hours)
📌 Module Description
This module introduces learners to how modern digital systems actually function in real-world production environments. Students explore internet architecture, system layers (frontend, backend, database), API communication flows, and cloud infrastructure fundamentals. The goal is to build a structural understanding of how applications operate behind the scenes — and where vulnerabilities or failures may occur.
🎯 Learning Outcomes
By the end of this module, learners will be able to:
Explain how DNS, HTTP/HTTPS, TCP, and CDN systems operate
Differentiate frontend, backend, and database layers
Interpret a real API request and response structure
Diagram a complete application architecture flow
Identify potential system failure or exposure points
🛠 Practical Exercise
Students will map the architecture of a real-world application (e.g., social platform, hospital portal, or e-commerce system), identify all infrastructure components, and highlight possible risk areas.
Module Description
This module develops an ethical attacker mindset by examining how systems become compromised. Learners analyze common breach root causes, attack surfaces (login forms, APIs, cloud misconfigurations, human error), and real phishing workflows. The module emphasizes structured vulnerability identification and risk prioritization.
🎯 Learning Outcomes
Identify primary system attack surfaces
Explain common breach causes and misconfigurations
Analyze phishing attack flow and social engineering tactics
Conduct a basic exposure scan conceptually
Prioritize vulnerabilities using risk levels
🛠 Practical Exercise
Students will analyze a fictional company’s technology stack, map its attack surfaces, and produce a short vulnerability assessment report with recommended mitigation steps.
🔹 MODULE 3 Data Literacy & Analytical Foundations (7 Hours)
📌 Module Description
This module builds foundational data literacy skills necessary for modern cybersecurity and technology professionals. Learners examine structured, semi-structured, and unstructured data; database relationships; SQL queries; and common data pipeline failures. Emphasis is placed on interpreting data critically and avoiding decision-making errors caused by poor data quality.
🎯 Learning Outcomes
Distinguish between structured, semi-structured, and unstructured data
Explain primary key, foreign key, NULL, and aggregation concepts
Write and interpret basic SQL queries
Identify data quality issues and ETL risks
Extract insights from datasets using structured reasoning
🛠 Practical Exercise
Students will clean and analyze a real dataset (CSV), identify key trends or anomalies, and present findings using visual charts.
Module Description
This module examines real-world security failures in widely used services such as GitHub, OAuth (Google Auth), Stripe, Cloudflare, and email systems. Learners analyze misconfigurations, secret exposure, client-side trust issues, and infrastructure bypass techniques. The emphasis is on actionable hardening before production deployment.
🎯 Learning Outcomes
Identify secret leakage risks in version control systems
Explain OAuth flow vulnerabilities and secure implementation practices
Prevent client-side price manipulation in payment systems
Secure cloud origin servers against direct exposure
Apply email authentication controls (SPF, DKIM, DMARC)
🛠 Practical Exercise
Students will complete a structured service hardening checklist and identify vulnerabilities in a simulated deployment scenario.
Module Description
This module introduces modern AI-assisted security automation frameworks. Learners explore Playwright browser testing, AI security agents, MCP architecture concepts, CI/CD security gates, and the evolving AI threat landscape. The module emphasizes understanding automation while maintaining human oversight.
🎯 Learning Outcomes
Explain the role of automated browser testing in security
Describe the architecture of AI security agents
Understand SARIF reporting and CI/CD security gates
Identify emerging AI-era threat vectors
Differentiate between AI-automated tasks and human judgment responsibilities
🛠 Practical Exercise
Students will simulate a mini AI-driven security audit and analyze automated findings for accuracy and relevance.
The final capstone integrates system architecture analysis, vulnerability mapping, data interpretation, and service hardening strategies. Students evaluate a simulated small business digital environment, identify risks, analyze data patterns, and propose security improvements.