This repository contains notes, labs, extras, case studies, and certificate of completion for the Practical Security Fundamentals course by TCM.
The program builds a strong foundation in footprinting, scanning, enumeration, system hacking, malware analysis, network security, cryptography, and reporting.
- 📄
01-introduction.md– Course Introduction - 📄
02-footprinting-reconnaissance.md– Footprinting & Reconnaissance - 📄
03-scanning-networks.md– Network Scanning Techniques - 📄
04-enumeration.md– Network & System Enumeration - 📄
05-system-hacking.md– System Hacking Fundamentals - 📄
06-malware-threats.md– Malware Analysis & Threats - 📄
07-sniffing.md– Network Sniffing - 📄
08-social-engineering.md– Social Engineering Attacks - 📄
09-denial-of-service.md– DoS Attacks & Mitigation - 📄
10-session-hijacking.md– Session Hijacking - 📄
11-web-application-hacking.md– Web App Hacking Basics - 📄
12-sql-injection.md– SQL Injection Techniques - 📄
13-wireless-network-hacking.md– Wireless Network Security - 📄
14-cryptography.md– Cryptography Concepts - 📄
15-reporting-mitigation.md– Reporting & Mitigation
- 🌐
network-scanning-lab.md– Network Scanning Lab - 🖥️
system-hacking-lab.md– System Hacking Lab - 🔍
enumeration-lab.md– Enumeration Lab - 🦠
malware-analysis-lab.md– Malware Analysis Lab - 🖥️
sniffing-lab.md– Sniffing Lab - 🌐
web-application-lab.md– Web Application Hacking Lab
- 📑
case-studies.md– Real-world Security Case Studies - 📚
resources.md– Recommended Security Resources - 📆
timeline.md– Learning Timeline
- 📘
glossary.md– Glossary of Security Terms - 📘
index.md– Repository Index - 📘
references.md– References & Further Reading - 📘
roadmap.md– Learning Roadmap - 📘
syllabus.md– Course Syllabus
| Content | Screenshot |
|---|---|
| 🏫 Course Overview | ![]() |
| 📑 Learning Content | ![]() |
🎓 Practical Security Fundamentals
This course offered a comprehensive introduction to practical security fundamentals.
The labs on scanning, system hacking, and malware analysis provided hands-on experience with real-world scenarios.
It helped me understand attack methodologies, defense mechanisms, and proper reporting for professional security operations.
Overall, it is an excellent foundation for anyone pursuing ethical hacking and cybersecurity skills.
Thành Danh – Red Team Learner & Security Researcher
- GitHub: @ngvuthdanhh
- Email: ngvu.thdanh@gmail.com
This project is licensed under the MIT License.
See LICENSE for details.
© 2025 ngvuthdanhh. All rights reserved.

