Studies
Admissions
The Institute
Resources
Studies
Admissions
The Institute
Resources
Studies
Admissions
The Institute
Resources

CSEC201BKK

Intro to Cyber Security

Bangkok Campus
Aug 18, 2025 - Sep 05, 2025
This course offers a practical introduction to Cybersecurity through the lens of modern Security Operations (SecOps) and Purple Team methodology.
Bangkok Campus
Aug 18, 2025 - Sep 05, 2025
Sergey Gordeychik

Faculty

Sergey Gordeychik

CEO at CyberOK

Course length

3 weeks

Duration

3 hours
per day

Total hours

45 hours

Credits

4 ECTS

Language

English

Course type

Offline

Fee for single course

€1500

Fee for degree students

€750

Skills you’ll learn

Identify Security NeedsDetection of Common Cyber AttacksSecurity ToolsSecure DevelopmentIncident Response SkillsDigital Forensics
OverviewCourse outlineCourse materialsPrerequisitesMethod & grading

Overview

Conducted in collaboration with the CyberEd platform, this course offers a practical introduction to Cybersecurity through the lens of modern Security Operations (SecOps) and Purple Team methodology. Students will explore both offensive (Red Team) and defensive (Blue Team) techniques across key areas such as network, operating system, and web application security. The curriculum includes hands-on exposure to common attack vectors, detection strategies, and incident response processes, using industry-standard tools and open lab platforms. Core topics also include authentication, cryptography, cloud and container security, and emerging trends like AI threats and supply chain attacks. Designed for technically capable students, the course balances foundational theory with real-world practice.

Learning highlights

  • Understand Core Cybersecurity Concepts and Modern Threats. Students will grasp fundamental security principles, including the CIA triad, risk and threat models, and attacker tactics. They will learn how modern cyber threats (e.g., APTs, ransomware, supply chain attacks) target systems across networks, applications, cloud, and physical infrastructure.
  • Apply Offensive and Defensive Techniques in Realistic Scenarios. Through a purple team approach, students will simulate attacks (e.g., web exploitation, privilege escalation) and then defend against them using logging, detection tools, and system hardening. They will gain experience with tools like Wireshark, Metasploit, PortSwigger, and Snort.
  • Integrate Security into IT and Development Practices. Students will learn how to apply security controls across DevOps workflows, cloud environments, and enterprise systems. They will understand how to identify misconfigurations, use open-source scanning tools, and respond to incidents using SecOps methodologies and forensic analysis.

Course outline

15 classes

Dive into the details of the course and get a sense of what each class will cover.
Monday
Tuesday
Wednesday
Thursday
Friday
Monday
1

Introduction to Cybersecurity & Threat Landscape

CIA Triad: Confidentiality, Integrity, Availability.

Assets, Threats, Vulnerabilities, Risks.

Types of Threat Actors and Motivations.

Common Attack Vectors and Real-World Examples.

Security Controls: Preventive, Detective, Corrective.

Tuesday
2

Security Architecture and Access Control

Authentication, Authorization, and Accounting (AAA).

Access Control Models: DAC, MAC, RBAC.

Formal Security Models.

Security Architecture Layers and Physical Security.

Identity and Access Management (IAM).

Wednesday
3

Introduction to Cryptography

Symmetric vs Asymmetric Encryption.

Public Key Infrastructure (PKI) and Certificates.

Hash Functions and Integrity.

Real-World Applications of Cryptography.

Common Cryptographic Pitfalls.

Thursday
4

Network Security I – Local Networks and Attacks

OSI Layers and Network Protocol Basics.

ARP, MAC Spoofing, and Packet Sniffing.

Man-in-the-Middle (MitM) Attacks.

Network Segmentation and Local Defense.

Wi-Fi and LAN Security Concepts.

Friday
5

Network Security II – Internet Protocols and Defense

IP Spoofing, ICMP Abuse, and DoS Attacks.

Fragmentation and Session Hijacking.

Network Address Translation (NAT).

Firewall Concepts and Rule Sets.

Introduction to IDS/IPS.

Monday
6

Windows Security Essentials

Windows User Accounts and Permissions.

NTLM, Kerberos, and Authentication Protocols.

Common Windows Services and Vulnerabilities.

Event Logging and Auditing.

Endpoint Protection and Hardening Techniques.

Tuesday
7

Linux Security Essentials

File Permissions, Ownership, and sudo.

Common Misconfigurations and Exploits.

Service Management and Secure Defaults.

Authentication and SSH Hardening.

SELinux and AppArmor Basics.

Wednesday
8

Application Security I – Web Attacks

Web Architecture and HTTP Basics.

OWASP Top 10 and modern threats.

Session Management and Authentication Flaws.

Client-Side vs Server-Side Vulnerabilities.

Reverse Shells and Command Injection.

Thursday
9

Application Security II – DevSecOps and Secure Development

Secure Coding Principles.

SDLC and DevSecOps Introduction.

Static and Dynamic Code Analysis.

Supply Chain and Dependency Risks.

CI/CD Pipeline Security.

Friday
10

Cloud and Container Security

Cloud Service Models and Shared Responsibility.

IAM, Misconfigurations, and S3 Exposure.

Introduction to Containers and Docker Security.

Vulnerability Scanning and Image Hardening.

Basics of Kubernetes and Cloud-Native Security.

Monday
11

Security Operations and Monitoring

Introduction to SecOps and SOC Functions.

Logging and Log Management.

SIEM Systems and Alerting.

Use Cases and Detection Rules.

Threat Hunting Basics and MITRE ATT&CK.

Tuesday
12

Incident Response and Forensics

Incident Response Lifecycle.

Basic Digital Forensics: Disk, Memory, Network.

Evidence Collection and Chain of Custody.

Indicators of Compromise (IOCs) and Threat Intel.

Introduction to Managed Detection & Response (MDR).

Wednesday
13

Red Team Tactics and Adversary Simulation

Penetration Testing Methodology.

Reconnaissance, Exploitation, Post-Exploitation.

Social Engineering and Physical Intrusion.

Red & Blue & Purple Teams.

Reporting and Remediation Strategy.

Thursday
14

Emerging Trends and Security Strategy

AI in Cybersecurity: Threats and Defenses.

External Attack Surface Management (EASM).

Cloud Security Posture Management (CSPM).

Zero Trust Architecture.

IoT, OT, and Critical Infrastructure Security.

Friday
15

Final Practical Assessment – Purple Team Challenge

Red Team: Identify and Exploit Vulnerabilities.

Blue Team: Detect, Analyze, and Mitigate Attacks.

Full Attack Lifecycle in Practice.

Final Report and Team Review.

Course Recap and Q&A Session.

Prerequisites

Understanding of basic computing concepts and computer architecture.

Familiarity with the TCP/IP stack and core networking concepts (e.g., IP, ports, DNS, routing).

Basic administrative experience with Linux (command line, file system, permissions) and Windows (user management, system settings).

Proficiency in Python scripting (control structures, file I/O, basic modules).

Exposure to Unix shell scripting and command-line tools.

Basic knowledge of algorithms and data structures.

Familiarity with software development lifecycle and programming logic.

Methodology

The course combines interactive lectures, guided hands-on labs, and real-world cybersecurity exercises. Each day includes a mix of theory and practical work, typically structured as 1 hour of lecture followed by 2 hours of hands-on lab tasks and group discussion. Students will work individually and in small teams to solve offensive and defensive security challenges using online lab platforms such as PortSwigger, TryHackMe.

Throughout the three weeks, students progress from foundational concepts to more advanced topics, culminating in a final practical assessment on Day 15. The assessment simulates a real-world cyberattack/response scenario, testing both Red Team and Blue Team skills. Regular reflection and discussion help reinforce the “Purple Team” mindset—thinking like an attacker and defender.

Grading

The final grade will be composed of the following criteria:
15% - Participation
35% - Homework and Labs
20% - Weekly Quizzes
30% - Final Exam
Sergey Gordeychik

Faculty

Sergey Gordeychik

CEO at CyberOK

Sergey Gordeychik is CEO and Co-Founder of CyberOK, a cybersecurity company delivering advanced services and research. He is also a Visiting Professor at Harbour.Space University (Barcelona, Spain), contributor of different social and educational initiatives. Previously, he was CIO at the Inception Institute of Artificial Intelligence (UAE), where he led AI-driven product development and secure infrastructure design. As Deputy CTO at Kaspersky Lab, he launched Security Intelligence Services and Managed Detection and Response solutions. Earlier, as CTO of Positive Technologies, he led development of award-winning enterprise security products and co-created Positive Hack Days (PHDays), the largest cybersecurity event in Eastern Europe.

Sergey is the author of two books and multiple scientific publications, with three patents in cybersecurity. He has created several training programs including "Critical Infrastructure Protection" and "Web Application Security Assessment." A regular speaker at top-tier conferences such as S4, CCC, CodeBlue, POC, and ZeroNights, Sergey holds CISSP, MCSE, MCT, CWNA, and was recognized as a Microsoft MVP in Enterprise Security R&D.

See full profile

Apply for this course

Snap up your chance to enroll before all spaces fill up.

Intro to Cyber Security

by Sergey Gordeychik

Total hours

45 Hours

Dates

Aug 18 - Sep 05, 2025

Fee for single course

€1500

Fee for degree students

€750

How to secure your spot

Complete the form below to kickstart your application

Schedule your Harbour.Space interview

If successful, get ready to join us on campus

FAQ

Will I receive a certificate after completion?

Yes. Upon completion of the course, you will receive a certificate signed by the director of the program your course belonged to.

Do I need a visa?

This depends on your case. Please check with the Spanish or Thai consulate in your country of residence about visa requirements. We will do our part to provide you with the necessary documents, such as the Certificate of Enrollment.

Can I get a discount?

Yes. The easiest way to enroll in a course at a discounted price is to register for multiple courses. Registering for multiple courses will reduce the cost per individual course. Please ask the Admissions Office for more information about the other kinds of discounts we offer and what you can do to receive one.