Foundations & Offensive Techniques in Cybersecurity
Duration – 3 Days
Objectives
To introduce participants to the core principles of cybersecurity along with hands-on exposure to real-world attack and defense techniques. This program aims to build awareness, technical skills, and readiness for future roles in ethical hacking, threat analysis, and security operations.
Tools & Platforms
- Kali Linux
- Wireshark
- VirtualBox
Pre-requisites
- Basic understanding of computers and the internet
- Familiarity with Windows or Linux OS (basic commands helpful)
- Interest in cybersecurity and ethical hacking
- Laptop with internet access (Linux/Kali setup will be guided)
Take away
By the end of this 2-day workshop, participants will:
- Understand core cybersecurity concepts and governance frameworks
- Gain practical experience with threat detection and Linux hardening
- Learn how to identify vulnerabilities and simulate basic penetration tests
- Use industry-standard tools like Wireshark and Kali Linux
- Appreciate the real-world applications of offensive and defensive strategies
Day 1 - Cyber Security Foundations
- Introduction to Cybersecurity & CIA Triad
- Basics of Networking and OSI/TCP Models
- Infrastructure Security (Firewall, VPN basics)
- Governance, Risk & Compliance Overview
Day 2 - Identity and Threat detection
- Introduction to Linux Security & File Permissions
- IAM & PAM
- Understanding Malware, Phishing, and Threat Actors
Day 3 - Offensive Techniques
- Penetration Testing Workflow (Reconnaissance to Exploitation)
- SIEM Concepts & Log Analysis
- Introduction to Kali Linux
- Network Packet Analysis using Wireshark
- Cloud & Enterprise Security Best Practices