Foundations & Offensive Techniques in Cybersecurity

Duration – 3 Days

Objectives

To introduce participants to the core principles of cybersecurity along with hands-on exposure to real-world attack and defense techniques. This program aims to build awareness, technical skills, and readiness for future roles in ethical hacking, threat analysis, and security operations.

Tools & Platforms

  • Kali Linux
  • Wireshark
  • VirtualBox

Pre-requisites

  • Basic understanding of computers and the internet
  • Familiarity with Windows or Linux OS (basic commands helpful)
  • Interest in cybersecurity and ethical hacking
  • Laptop with internet access (Linux/Kali setup will be guided)

Take away

By the end of this 2-day workshop, participants will:

  • Understand core cybersecurity concepts and governance frameworks
  • Gain practical experience with threat detection and Linux hardening
  • Learn how to identify vulnerabilities and simulate basic penetration tests
  • Use industry-standard tools like Wireshark and Kali Linux
  • Appreciate the real-world applications of offensive and defensive strategies

  • Introduction to Linux Security & File Permissions
  • IAM & PAM
  • Understanding Malware, Phishing, and Threat Actors

  • Penetration Testing Workflow (Reconnaissance to Exploitation)
  • SIEM Concepts & Log Analysis
  • Introduction to Kali Linux
  • Network Packet Analysis using Wireshark
  • Cloud & Enterprise Security Best Practices

Enquire Now

Enquire Now

Enquire Now

Please Sign Up to Download

Please Sign Up to Download

Enquire Now

Please Sign Up to Download




    Enquiry Form