A comprehensive introduction to the mathematical foundations of cybersecurity. Students journey from historical substitution ciphers to modern public-key infrastructure, hashing, and steganography to understand how data secrecy and integrity are maintained in the digital age.