Overview
Security foundations cover the hands-on skills every engineer needs before specializing into a role. Whether you go on to red team, blue team, or security leadership, these are the controls, tools, and concepts you will encounter in every security conversation.
Why Start Here
The role tracks (Red Team, Blue Team, CISO) assume you already know how firewalls work, what TLS does, how to read logs, and what a CVE means. This track builds that baseline through 85 annotated examples — all code-first, no security background required.
What You Will Learn
- Firewall rules, packet analysis, TLS, VPN
- System hardening, patch management, least privilege
- Cryptography: symmetric/asymmetric encryption, hashing, PKI
- Vulnerability assessment: CVE, CVSS 4.0, scanning
- Cloud security: IAM misconfigurations, CSPM, shared responsibility
- Incident response: detect, contain, eradicate, recover
- Security monitoring: logs, SIEM queries, anomaly detection
Learning Path
| Level | Focus |
|---|---|
| Beginner | Fundamentals every engineer should know |
| Intermediate | Production-grade controls and cloud security |
| Advanced | Threat modeling, zero-trust, CI/CD security gates |
Where to Go Next
After completing Foundations, pick a role:
Start at By Example — Beginner or see the full example list.
Last updated May 20, 2026