Learn more about the course
Get details on syllabus, projects, tools, and more
Cybersecurity Fundamentals
LEARNING OUTCOMES
Understand How Adversaries Think
Fast-track your programming journey with a case-based learning experience
-
Explain hacker ideologies, motivations, psychological drivers, and the evolution of tactics across generations
-
Apply ethical hacking and penetration testing methodologies, evaluate cryptographic systems, including PKI
-
Communicate cybersecurity findings through penetration test reports and executive summaries
-
Recognize real-world reconnaissance, exploitation, information gathering, and social engineering techniques
Earn a certificate of completion from Johns Hopkins University
KEY COURSE HIGHLIGHTS
Why Choose Cybersecurity Fundamentals Course?
-
Flexible format
Benefit from an asynchronous, self-paced learning journey, featuring engaging video walkthroughs and recorded sessions by Johns Hopkins University faculty
-
Case-based learning
Learn the motives, behaviors, and ethics behind responsible hacking through live real-world use cases, projects, and industry relevant techniques.
-
Earn Continuing Education Units
Earn two Continuing Education Units upon completion of this course, allowing you to demonstrate your commitment to continuous learning and skill advancement.
-
Globally recognized credential
Upon completion, earn a Certificate of Completion from Johns Hopkins University, along with 2 Continuing Education Unit (CEU)
Skills you will learn
Hacker Motivation
Exploitation Recognition
Social Engineering
Penetration Testing
Cryptography and PKI
Information Gathering
Security Reporting
Risk Communication
Hacker Motivation
Exploitation Recognition
Social Engineering
Penetration Testing
Cryptography and PKI
Information Gathering
Security Reporting
Risk Communication
view more
- Overview
- Learning Journey
- Curriculum
- Projects
- Certificate
- Faculty
- Fees
This Course Is Ideal For
Professionals seeking to build skills to identify vulnerabilities, assess risks, and communicate findings.
-
Network Administrators
Looking to build skills in real-world adversarial thinking, ethical responsibility, and industry-aligned cybersecurity practices.
-
IT Security Specialists
Including Infrastructure Professionals looking to enhance system defense skills.
-
Compliance and Risk Professionals
Compliance officers, auditors, and security consultants aiming to understand regulatory requirements and manage risk.
-
Aspiring Cybersecurity Practitioners
Individuals transitioning into cybersecurity roles who want hands-on experience and practical knowledge to enter the field.
Experience a unique learning journey
Our pedagogy is designed to ensure a holistic learning experience
-
Flexible learning journey
Learn at your own pace with a flexible, asynchronous format built for working professionals
-
Engaging material
Stay up-to-date with relevant content and video walkthroughs on today's cybersecurity landscape
-
Application-focused approach
Gain actionable insights through projects and real-world use cases
-
Globally recognized credentials
Earn a Johns Hopkins Certificate of Completion and 2 Continuing Education Units upon completion
Curriculum
The curriculum for this course is designed by the faculty of Johns Hopkins University and leading industry practitioners, focusing on cybersecurity basics, combining hacker psychology, penetration testing methodology, cryptographic foundations, and information-gathering techniques.
Module 1 | Ideology, Motives & Behaviors of Hackers
Concepts Covered: - Types and Generations of Hackers - Hacker Psychology and Motivation
Module 2 | PenTest Reports & Executive Summaries
Concepts Covered: - Penetration Testing Methodologies - Applying Ethical Hacking Frameworks - Structuring and Interpreting Executive-Level Security Reports
Module 3 | Cryptography & Public Key Infrastructure
Concepts Covered: - Secret-Key and Public-Key Encryption - How PKI Enables Authentication and Secure Communication - Identifying Cryptographic Weaknesses Exploited by Attackers
Module 4 | Information Gathering & Social Engineering
Concepts Covered: - Conducting Technical and Open-Source Information Gathering - Understanding Social Engineering Methods and Attack Patterns - Using Reconnaissance Tools to Identify Vulnerabilities
Work on Hands-On Assignments
Engage in comprehensive assignments using emerging tools and technologies across sectors
-
Real-World
Use Cases
-
Hands-On
Coding assignments
-
Industry-Ready
Tools and technologies
Description
Study real-world attacker motivations and behavioral patterns.
Skills you will learn
- Threat Analysis
- Attacker Psychology
- Adversarial Thinking
Description
Work with pentest reports, security findings and executive summaries.
Skills you will learn
- Security Reporting
- Risk Communication
- Executive Summaries
Description
Analyze how encryption and PKI protect—or expose—systems.
Skills you will learn
- Encryption Concepts
- Public Key Infrastructure (PKI)
- Cryptographic Risk Analysis
Description
Examine how attackers use reconnaissance and social engineering techniques to exploit vulnerabilities.
Skills you will learn
- Reconnaissance Techniques
- Social Engineering
- Vulnerability Analysis
Earn a Professional Certificate
Earn a certificate of completion from Johns Hopkins University to showcase to your professional network.
-
#1 Ranked Online Grad Program
Computer Information Technology by U.S. News & World Report
* Image for illustration only. Certificate subject to change.
Meet Your Faculty
Learn from world-renowned JHU faculty
Course Fees
The course fee is USD 500
Advance Your Career
-
Explain hacker ideologies, motivations, psychological drivers, and the evolution of tactics across generations
-
Apply ethical hacking and penetration testing methodologies, evaluate cryptographic systems, including PKI
-
Communicate cybersecurity findings through professional penetration test reports and executive summaries
-
Real-world reconnaissance, scanning, exploitation, information gathering, and social engineering techniques
Enrollment process
Get started instantly with our self-enrollment process and begin your learning journey today
-
1. Enter your details
Provide your information to begin the enrollment process
-
2. Make payment
Complete the payment to receive your enrollment confirmation via email
Prerequisites
- Learners must achieve a score of 85 percent or higher to successfully complete the course and earn a certificate of completion from Johns Hopkins University
Delivered in Collaboration with:
Johns Hopkins University is collaborating with online education provider Great Learning to offer the Learn Python with Generative AI course. Great Learning is a professional learning company with a global footprint in 14+ countries. Its mission is to make professionals around the globe proficient and future-ready. This course leverages JHU's leadership in innovation, science, engineering, and technical disciplines developed over years of research, teaching, and practice. Great Learning collaborates with institutions to manage enrollments (including all payment services and invoicing), technology, and participant support.