IT & Cybersecurity Foundations Career Path
Get everything you need to start your cybersecurity career journey, and stop wasting your time (and money) sorting through unreliable information from questionable sources. While this industry offers very lucrative career opportunities, finding accurate, relevant information to break into the field can be incredibly frustrating. That’s why we’ve crafted this IT and Cybersecurity Foundations path, featuring thoughtful, bite-sized content from expert instructors covering core concepts found across all cybersecurity roles. These instructors have helped thousands of other beginners grasp essential IT and cybersecurity topics. Get ready to take your first steps into cybersecurity by diving into core concepts needed for any cybersecurity role. Build practical skills and gain confidence as you begin your cybersecurity journey.

Purpose Statement
Overview
Who is this career path for?
This path is for newcomers who are just beginning to explore IT and cybersecurity careers and skillsets. Whether you’ve recently graduated with a technical degree or are making a pivot from a technical or operations-focused role.What skills will I gain by completing this path?
This path covers foundational skills that all cybersecurity roles and job functions are built upon. You’ll learn key concepts and skills including: Wireshark, NMAP, Cryptography, Firewall, IDS, and Vulnerability scanner basics.Will this prepare me for an entry-level role?
This course will prepare you to begin the search for your first cybersecurity role. While more specialized skills may be needed for your desired role, this path is designed to get you comfortable with essential concepts and on-the-job skills, giving you confidence to start the application and interview process.What prerequisites are needed for this career path? Do I need on-the-job experience?
No previous experience, knowledge, or skills are required for this path. All you need is intellectual curiosity and a growth-oriented mindset. On-the-job experience is not required but may be helpful for learners transitioning from a technical role in a different field.Incident handling is a critical aspect of cybersecurity — Incident Handlers ensure that organizations can detect, contain, and recover from cyber threats effectively. Without a structured response plan, security breaches can be chaotic events with significant consequences, including data loss, reputational damage, financial harm, and regulatory penalties.
As cyber threats grow more complex, companies rely on Incident Handlers to minimize downtime, prevent future attacks, and strengthen the organization’s overall security posture.
An Incident Handler collects and analyzes evidence related to a threat or attack, determines root cause, directs other security analysts and team members in how to stop the attack, and implements rapid system and service recovery.
Other Incident Handler responsibilities and job requirements may include:
- Developing incident response plans
- Implementing incident response plans
- Detecting and monitoring threats
- Developing security policies and procedures
- Evaluating the severity and impact of security threats
- Collecting digital evidence to determine the root cause of an incident
This is a mid-to-senior-level collection. We recommend familiarity with network fundamentals, network monitoring and threat hunting, and cybersecurity policy.
This career path is designed for learners with prior experience in cybersecurity who wish to specialize in building secure IT ecosystems. This includes current mid-career IT and security practitioners looking to transition into a Security Engineer role. Experienced security engineering practitioners will also benefit from reviewing core concepts and testing their skills in this path's Challenge and Assessment modules.
Test your Scripting and Programming Fundamentals knowledge and skills with this brief assessment. Identify your strengths, gaps, and weaknesses, and get targeted course and virtual lab recommendations to improve your scores and measure your skills development growth.
You will answer questions and complete tasks on PowerShell, BASH, and Python.
Prove your capability as an effective cybersecurity professional to yourself, your boss, or prospective employer
Responsibilities and job requirements vary greatly across IT and cybersecurity functions, but here are some tasks you may be responsible for in an entry-level IT or cybersecurity role:
- Monitoring and managing networks and systems
- Troubleshooting hardware and software issues
- Maintaining IT infrastructure
- Identifying security vulnerabilities
- Implementing security measures
- Ensuring systems meet compliance guidelines
- Using programming languages to automate security tasks
This career path is designed for learners who have no prior experience in IT or Cybersecurity, but are interested in pursuing a career in this exciting field. Learners should have a working knowledge of modern technology, basic analytical skills, and a strong desire to learn. Previous on-the-job experience in IT or cybersecurity is not required.

Network Reference Models
In this hands-on lab, you will learn about the OSI and TCP/IP Reference Models and how they are used to organize the communications standards used by computer networks. You will then explore the different layers of the two models using Wireshark and a PCAP file containing wireless network traffic.