Space is limited
Course logo

Security Foundations for Engineers

This course provides a solid foundation in the core principles of cybersecurity engineering that allow entrants into the field to further their journey into one of the many specializations available such as cybersecurity operations, detection engineering, secure design, or offensive cybersecurity.

We designed this course specifically to give you the buzzword-resistant foundation in cybersecurity engineering that will stand the test of time. Only by understanding how modern systems are built and operated can we truly contribute to the protection of systems, services, and user data.

Instructor profile photo
Wael Ghandour
Security Engineer at VMware
Instructor profile photo
Sar Haidar
Senior DevOps Engineer, MIT Open Learning
Real-world projects that teach you industry skills
Learn alongside a small group of your professional peers
Part-time program with 2 live events per week
Next Cohort
January 15, 2024
4 weeks
US$ 400
or included with membership
Space is limited

Course taught by expert instructors

Instructor Photo
Affiliation logo

Wael Ghandour

Security Engineer at VMware

Wael is currently a security software engineer at VMware focusing on the development of automated and scalable security technologies. Prior to his current role he led security for VMware VeloCloud covering all aspects of the security development lifecycle. His experience includes working on and securing large-scale distributed systems at various companies in the San Francisco Bay Area such as VMware, Cisco Systems, Medallia, and Lending Club as well as internationally in Canada and the UAE.

Instructor Photo
Affiliation logo

Sar Haidar

Senior DevOps Engineer, MIT Open Learning

Sar is currently a DevOps engineer in the Office of Open Learning at MIT participating in the design, architecture, implementation, and delivery of some of the most exciting teaching, learning, and data platforms that support the mission of Open Learning. Prior to his current role he held multiple IT managerial positions leading teams in implementing endpoint management solutions in higher education.

The course

Learn and apply skills with real-world projects.

Who is it for?
  • Individuals that wish to start a career in cybersecurity.

  • Engineers in non-security fields that wish to acquire a foundational understanding of cybersecurity to apply in their respective areas of expertise.

  • Anyone curious about the fundamentals of defensive cybersecurity.

  • A basic understanding of systems (mainly Linux).

  • Basic knowledge of Internet (network and application) protocols (TCP/IP, DNS, TLS, HTTP).

  • Basic familiarity with cloud environments (AWS, GPC, e.t.c.).

  • Basic Python skills (loops, functions, basic data types)

Not ready?

Try these prep courses first

  • What makes up a system? Memory, kernel, storage, cache, filesystems, communications.
  • Networks: architectures, protocols, components.
  • Distributed infrastructure: on-prem, cloud, hybrid.
  • Modern service architectures: bare- metal, virtual, cloud, service-mesh.
  • Building modern services: pipelines, orchestration.
  • CIA Triad, offensive vs. defensive security.
  • How to approach the discovery phase.
Discover and document all components in a multi-tiered service in an IaaS stack.
  • System security fundamentals: OS, kernel, memory.
  • Infrastructure security: control-plane security, service-plane security, dev environment security.
  • An understanding of what questions are worth raising when probing for weak spots that should be further explored.
Project to detect and remediate vulnerabilities in a running cloud environment.
  • Software security fundamentals: Secure coding topics, open-source and third-party software security.
  • Service security fundamentals: Beyond the code we write, a lot goes into building a secure service including design and architecture to insure CIA requirements are met.
Project to detect and remediate vulnerabilities in the code of a running service.
  • Process for building, deploying, and operating secure services.
  • Threat modeling, secure design, security testing.
Build a threat-model of a full production environment (infrastructure plus running service).

A course you'll actually complete. AI-powered learning that drives results.

AI-powered learning

Transform your learning programs with personalized learning. Real-time feedback, hints at just the right moment, and the support for learners when they need it, driving 15x engagement.

Live courses by leading experts

Our instructors are renowned experts in AI, data, engineering, product, and business. Deep dive through always-current live sessions and round-the-clock support.

Practice on the cutting edge

Accelerate your learning with projects that mirror the work done at industry-leading tech companies. Put your skills to the test and start applying them today.

Flexible schedule for busy professionals

We know you’re busy, so we made it flexible. Attend live events or review the materials at your own pace. Our course team and global community will support you every step of the way.


Completion certificates

Each course comes with a certificate for learners to add to their resume.

Best-in-class outcomes

15-20x engagement compared to async courses

Support & accountability

You are never alone, we provide support throughout the course.

Get reimbursed by your company

More than half of learners get their Courses and Memberships reimbursed by their company.

Hundreds of companies have dedicated L&D and education budgets that have covered the costs.


Frequently Asked Questions

Still not sure?

Get in touch and we'll help you decide.

Keep in touch for updates, discounts, and new courses.

Questions? Ask us anything at

© 2021-2023 Uplimit