Cyber Security Mastery Program – From Fundamentals to Advance
Level-1: Duration – 60 Hrs
Level-2: Duration – 60 Hrs
Modules
Level 1: Cyber Security Foundations (60 hrs)
- Introduction & Core Concepts
- Networking & Infrastructure Security Basics
- Risk, Governance & Compliance
- Cloud, Linux & Data Security Basics
- Identity & Access Management
- Threats, Attacks & Intelligence
- Advanced Networking & Infrastructure defence
- Incident Detection & SIEM
- Offensive Security & Pen testing
- Enterprise & Cloud Security Deep Dive
Program Objectives
• Build a Strong Foundation in Cyber Security Concepts
• Develop Practical Skills in Defensive and Preventive
Security
• Gain Expertise in Offensive Security and Penetration
Testing
• Understand Compliance, Governance, and Emerging
Technologies
Program Outcomes
- Integrated Problem-Solving Approach
- Hands-on experience solving challenges from platforms like CodeChef, HackerRank, and GeeksforGeeks.
- Practical exposure to real-time issues and debugging strategies.
- Industry-Ready Skills
- Preparedness for assessments via platforms like Mettl.
Project
• A Threat Hunting and Incident Response System
• Building a Secure Data Exchange Platform
• Offensive Security Assessment of Web and Cloud
Applications
• Designing a Full-Stack Cybersecurity Framework
Tools / Platform:
• Kali Linux
• Wireshark
Level 1: Cyber Security Foundations (60 Hours) | ||
---|---|---|
Module 1: Introduction & Core Concepts (10 Hours) | ||
Introduction to Cyber Security, CIA Triad (Confidentiality, Integrity, Availability) | Basics of Authentication | Understanding Cryptography, Cryptocurrency & Blockchain, Social Engineering & Wi-Fi Security (CEH-Oriented) |
Module 2: Networking & Infrastructure Security Basics (12 Hours) | ||
Networking Fundamentals: OSI Model, TCP/IP | IP Addressing, Network Services, Public vs. Private IP, Load Balancing, Proxy | Network Security & Firewalls, VPN (Virtual Private Network), Wireshark Introduction |
Module 3: Risk, Governance & Compliance (12 Hours) | ||
Risk Management, Governance, Risk & Compliance (GRC) | Key Regulations & Standards: ISO 27001:2022, GDPR, Digital Data Protection Act (DPDP), Digital Operational Resilience Act | Introduction to Internal Audits & Certification Audits, Authorization, Accounting |
Module 4: Cloud, Linux & Data Security Basics (13 Hours) | ||
Linux Essentials & Linux Administration | Cloud Security Basics (Public, Private, Hybrid Cloud) | Data Security: Encryption, Data Masking, Data Loss Prevention (DLP), Cloud Access Security Broker (CASB) |
Module 5: Identity & Endpoint Security (13 Hours) | ||
Identity & Access Management (IAM), Authentication Implementation, Security Awareness Training | Endpoint Security Controls: Antivirus, Endpoint Detection & Response (EDR) | Extended Detection & Response (XDR) |
Level 2: Cyber Security Advanced & Offensive Techniques (60 Hours) | ||
Module 6: Threats, Attacks & Intelligence (12 Hours) | ||
Understanding Modern Cyber Attacks, MITRE ATT&CK Framework, Cyber Kill Chain | Advanced Persistent Threats (APT), Ransomware & Cyber Insurance | Threat Intelligence Basics |
Module 7: Advanced Networking & Infrastructure Defense (12 Hours) | ||
Next Generation Firewall (NGFW), Intrusion Detection Systems (IDS) | Leveraging AI for Network Security | Operation Technology & IoT Security Trends, Strengthening Security Systems with AI |
Module 8: Incident Detection & SIEM (12 Hours) | ||
Incident Response & Response Playbooks | Security Information and Event Management (SIEM): QRadar, Splunk | Security Operations Fundamentals |
Module 9: Offensive Security & Pen Testing (14 Hours) | ||
Introduction to Penetration Testing, Pen Testing Techniques | Infrastructure Pen Testing, Network Penetration Testing, Web Application Pen Testing, OWASP Top 10 | Scripting Basics for Pen Testing, Bug Bounty Insights |
Module 10: Enterprise & Cloud Security Deep Dive (10 Hours) | ||
Active Directory Basics & Pentesting | Cloud Security Across Platforms, Cloud Infrastructure Security | Mobile Application & IoT Security (CEH-Oriented), Incident Detection & Response in Cloud, Cyber Security Compliance in Enterprise Environments |