A learning repository that consolidates academic notes, simulated labs, career playbooks, market research, post-learning checklists, and the CCSC completion certificate from HackAndFix Academy.
This course provides a solid foundation in:
- Modern Cyber Threat Landscape
- Starter Incident Security Analysis & Hypothesis
- Responsible Red Team mindset
- Security hygiene and compliance in enterprise environments
- Reporting skills, risk evaluation, and mitigation proposals
- 📄
01-introduction.md– Industry overview and security practitioner mindset - 📄
02-cyber-threats.md– Types of threats and common attack models - 📄
03-phishing-and-social-engineering.md– Psychological manipulation techniques in cyberattacks - 📄
04-passwords-and-authentication.md– Authentication mechanisms, common mistakes, best practices - 📄
05-secure-browsing.md– Safe browsing and browser-based risk awareness - 📄
06-data-protection.md– Data protection, encryption, and access delegation - 📄
07-cybersecurity-at-work.md– Security in organizations and defense models - 📄
08-staying-safe-online.md– Self-protection skills in cyberspace
- 🔍
lab1-threat-intel-basics.md– Threat collection & evaluation - 📊
lab2-incident-analysis-starter.md– Log analysis, timeline building, hypothesis validation - 🧾
lab3-security-hypothesis-and-reporting.md– Report writing based on hypothesis verification
- ✅
01-career-engagement-plan.md– Plan for building profile & applying for security roles - ✅
02-cert-validation-playbook.md– Proper process for verifying certificates - ✅
03-post-learning-checklist.md– Comprehensive checklist after course completion
- 📑
entry-level-skill-benchmarking.md– Benchmarking entry-level security skills - 🌍
role-market-analysis.md– Analysis of InfoSec workforce demand in 2025 - 🧠
interview-prep-checklist.md– Checklist for security interview preparation - 📘
cybersecurity-learning-curation.md– Curated learning resources, avoiding tool dependency
- 📘
index.md– Program description - 📘
references.md– Academic reference sources - 📘
roadmap.md– Learning and career roadmap - 📘
glossary.md– Key cybersecurity terminology
| Category | Image |
|---|---|
| Lesson | ![]() |
| Overview | ![]() |
🎓 CCSC Completion Certificate
📎 5257cf69-35a6-4e80-88e8-6987d56260a0.pdf
The course helped me reinforce fundamental knowledge and build practical security thinking.
- Security is not only about attacking, but validating hypotheses and evaluating risks
- Understanding threat context matters more than relying on tools
- Incident Response must be structured, logical, and evidence-driven
- Social Engineering is the most dangerous vector because it exploits humans, not systems
- A strong Red Team operator is someone who can propose mitigation, not just exploit
- Threat collection & evaluation
- Incident analysis and timeline building
- Security hypothesis verification report writing
- Building basic defense checklists for users and organizations
This is an excellent starter program for anyone aiming to enter InfoSec with a Red Team or Security Research direction, especially for those who want to dive into security logic instead of tool-based learning.
Thành Danh – Red Team Learner & Security Researcher
- GitHub: @ngvuthdanhh
- Email: ngvu.thdanh@gmail.com
This project is licensed under the terms of the MIT License.
See LICENSE for full details.
© 2025 ngvuthdanhh. All rights reserved.

