
This four-hour workshop introduces the mental models that cybersecurity professionals use to understand risk, defend systems, and respond to threats.
Live Training $25.00
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date: April 17th, 2026 @ 12:00 PM EDT
Description
Cybersecurity isn’t just about tools. It’s about learning to think like the people responsible for defending systems and data.
This four-hour workshop introduces the mental models that cybersecurity professionals use to understand risk, defend systems, and respond to threats. Rather than focusing on specific technologies, students will explore the foundational principles that shape how defenders approach security problems. Concepts such as least privilege, the CIA triad, and the balance between prevention, detection, and response provide the starting point for understanding how security programs operate in the real world.
The workshop then expands into the practical frameworks organizations use to manage cyber risk, including defense in depth, zero trust principles, and basic threat intelligence. Students will also gain a high-level understanding of how modern security teams operate through Security Operations Centers (SOCs) and how technologies such as SIEM, EDR, and XDR support detection and response efforts.
Hands-on exercises reinforce the material through practical activities. Students will perform an OSINT investigation using freely available tools and participate in an interactive defense-in-depth exercise that demonstrates how layered security controls protect systems even when individual safeguards fail.
By the end of the workshop, participants will have a clear understanding of the mindset defenders use to approach cybersecurity challenges and will be better prepared to continue learning in the field or engage with more advanced security topics.
-
System Requirements
- A computer with a modern web browser
- Internet connectivity
- Ability to access publicly available OSINT tools during the lab exercise
- No special software installation or virtual machines are required
Syllabus
Module 1 – Introduction to Cybersecurity (1.5 hours)
-
Absolute Truths of Cybersecurity
-
Principle of Least Privilege
-
Confidentiality, Integrity, and Availability (CIA Triad)
-
Prevention, Detection, and Response
Module 2 – Risk Management & Cyber Defense Concepts (1.5 hours)
-
Defense in Depth
-
Zero Trust Principles
-
Threat Intelligence Basics
-
Understanding the Threat Landscape
-
Security Operations Center (SOC) Overview
-
Introduction to Detection and Response (EDR / XDR / SIEM)
Hands-On Exercises (1 hour total)
OSINT Investigation Lab
-
Use freely available tools to gather intelligence on a target organization
-
Identify publicly exposed information attackers might use for reconnaissance
Defense in Depth Exercise
-
Analyze a simplified network architecture
-
Identify potential attack paths
-
Apply layered security controls to reduce risk
-
Understand how multiple safeguards work together to protect systems
FAQ
All hands-on activities are designed to use freely available online tools and guided exercises, allowing students to participate without installing software or configuring lab environments.
The workshop focuses on understanding how defenders analyze problems and apply security concepts, rather than learning specific tools.
-
Individuals considering a transition into cybersecurity roles
-
IT professionals who want to up their game and better understand how cybersecurity works in practice
-
Security practitioners looking to strengthen their conceptual understanding of cyber defense
-
Managers and technical leaders who need a clearer understanding of security principles and terminology
Beginner + Everyone else!
No prior cybersecurity experience is required.
By the end of this workshop, students will:
-
understand the foundational mental models used in cybersecurity
-
learn how defenders evaluate risk and apply security principles
-
recognize how layered defenses protect systems from attack
-
gain awareness of how modern security operations function
-
develop a framework for continuing their cybersecurity education
About the Instructor
Doc Blackburn
Bio
Doc Blackburn is a seasoned (old) cybersecurity instructor with decades of experience in IT, security, and compliance. Over his career, he has worked in many areas of IT, including systems administration, programming, network design, cloud services, web development, and risk management, bringing a broad technical foundation to his teaching. For more than 13 years, Doc has trained students and professionals to understand, implement, and maintain effective security practices, drawing on real-world consulting experience in compliance frameworks such as NIST SP 800-171, CIS Critical Controls, and MITRE ATT&CK. Known for making complex concepts accessible to all audiences, he blends technical depth with practical insights, preparing learners to address today’s evolving cyber threats.
Register for Upcoming
-
Filter by Product Date
-
Filter by Product Instructor
-
Filter by Product Type
Workshop: How to Think Like a Cybersecurity Defender
Pay What You Can
Live Training Doc Blackburn
Virtual
-
Certificate of completion
-
6 months class recording access via Discord
For tuition assistance with this course, please send an email to: [email protected]
Related products
-
Andrew KrugLiveOD16 Hrs
Securing the Cloud: Foundations
View Course This product has multiple variants. The options may be chosen on the product pageApr 1 - Apr 2
-
Multiple InstructorsLiveOD16 Hrs
Enterprise Security for All
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive16 Hrs
Active Directory Security and Hardening
View Course -
Alissa TorresLiveOD16 Hrs
Advanced Endpoint Investigations
View Course This product has multiple variants. The options may be chosen on the product page

