Cyber Security Mastery Program – From Fundamentals to Advance

Level-1: Duration – 60 Hrs
Level-2: Duration – 60 Hrs

Modules

Level 1: Cyber Security Foundations (60 hrs)
  • Introduction & Core Concepts
  • Networking & Infrastructure Security Basics
  • Risk, Governance & Compliance
  • Cloud, Linux & Data Security Basics
  • Identity & Access Management
Level 2: Cyber Security Advanced & Offensive Techniques (60 hrs)
  • Threats, Attacks & Intelligence
  • Advanced Networking & Infrastructure defence
  • Incident Detection & SIEM
  • Offensive Security & Pen testing
  • Enterprise & Cloud Security Deep Dive

Program Objectives

• Build a Strong Foundation in Cyber Security Concepts
• Develop Practical Skills in Defensive and Preventive
Security
• Gain Expertise in Offensive Security and Penetration
Testing
• Understand Compliance, Governance, and Emerging
Technologies

Program Outcomes

  • Integrated Problem-Solving Approach
    • Hands-on experience solving challenges from platforms like CodeChef, HackerRank, and GeeksforGeeks.
    • Practical exposure to real-time issues and debugging strategies.
  • Industry-Ready Skills
    • Preparedness for assessments via platforms like Mettl.

Project

• A Threat Hunting and Incident Response System
• Building a Secure Data Exchange Platform
• Offensive Security Assessment of Web and Cloud
Applications
• Designing a Full-Stack Cybersecurity Framework

Tools / Platform:

• Kali Linux
• Wireshark

Level 1: Cyber Security Foundations (60 Hours)
Module 1: Introduction & Core Concepts (10 Hours)
Introduction to Cyber Security, CIA Triad (Confidentiality, Integrity, Availability) Basics of Authentication Understanding Cryptography, Cryptocurrency & Blockchain, Social Engineering & Wi-Fi Security (CEH-Oriented)
Module 2: Networking & Infrastructure Security Basics (12 Hours)
Networking Fundamentals: OSI Model, TCP/IP IP Addressing, Network Services, Public vs. Private IP, Load Balancing, Proxy Network Security & Firewalls, VPN (Virtual Private Network), Wireshark Introduction
Module 3: Risk, Governance & Compliance (12 Hours)
Risk Management, Governance, Risk & Compliance (GRC) Key Regulations & Standards: ISO 27001:2022, GDPR, Digital Data Protection Act (DPDP), Digital Operational Resilience Act Introduction to Internal Audits & Certification Audits, Authorization, Accounting
Module 4: Cloud, Linux & Data Security Basics (13 Hours)
Linux Essentials & Linux Administration Cloud Security Basics (Public, Private, Hybrid Cloud) Data Security: Encryption, Data Masking, Data Loss Prevention (DLP), Cloud Access Security Broker (CASB)
Module 5: Identity & Endpoint Security (13 Hours)
Identity & Access Management (IAM), Authentication Implementation, Security Awareness Training Endpoint Security Controls: Antivirus, Endpoint Detection & Response (EDR) Extended Detection & Response (XDR)
Level 2: Cyber Security Advanced & Offensive Techniques (60 Hours)
Module 6: Threats, Attacks & Intelligence (12 Hours)
Understanding Modern Cyber Attacks, MITRE ATT&CK Framework, Cyber Kill Chain Advanced Persistent Threats (APT), Ransomware & Cyber Insurance Threat Intelligence Basics
Module 7: Advanced Networking & Infrastructure Defense (12 Hours)
Next Generation Firewall (NGFW), Intrusion Detection Systems (IDS) Leveraging AI for Network Security Operation Technology & IoT Security Trends, Strengthening Security Systems with AI
Module 8: Incident Detection & SIEM (12 Hours)
Incident Response & Response Playbooks Security Information and Event Management (SIEM): QRadar, Splunk Security Operations Fundamentals
Module 9: Offensive Security & Pen Testing (14 Hours)
Introduction to Penetration Testing, Pen Testing Techniques Infrastructure Pen Testing, Network Penetration Testing, Web Application Pen Testing, OWASP Top 10 Scripting Basics for Pen Testing, Bug Bounty Insights
Module 10: Enterprise & Cloud Security Deep Dive (10 Hours)
Active Directory Basics & Pentesting Cloud Security Across Platforms, Cloud Infrastructure Security Mobile Application & IoT Security (CEH-Oriented), Incident Detection & Response in Cloud, Cyber Security Compliance in Enterprise Environments

Enquire Now

Enquire Now

Enquire Now

Please Sign Up to Download

Please Sign Up to Download

Enquire Now

Please Sign Up to Download




    Enquiry Form