Hands-on cybersecurity training with real cyber-attack simulations, SOC workflows, digital forensics tools and practical penetration testing experience.
Module 1 — Foundations of Cybersecurity (Basic)
- Cybersecurity concepts: CIA Triad, threats, vulnerabilities, exploits
- Risk management & Zero Trust
- Ethical hacking laws & cybersecurity regulations
Module 2 — Cyber Threats & IT Fundamentals
- Malware types: Virus, Ransomware, Spyware, Trojans
- Social engineering: phishing, vishing, smishing
- Network basics: OSI model, TCP/IP, subnetting
- Windows & Linux basics for cybersecurity
Module 3 — Defensive & Offensive Security
- Firewalls, IDS/IPS, VPN, DMZ
- Cryptography: AES, RSA, SSL/TLS
- Ethical hacking phases: Recon → Scanning → Exploitation → Persistence
- OWASP Top-10 vulnerabilities
Module 4 — Security Operations & Forensics
- SOC operations, SIEM tools (Splunk / QRadar)
- Incident response lifecycle
- Digital forensics: Autopsy, Volatility, Sleuth Kit
- IAM: MFA, RBAC, authentication methods
Module 5 — Advanced Cybersecurity
- Pen-testing, exploit development
- Malware reverse engineering basics
- Cloud security: AWS, containers, Kubernetes
- IoT & OT/ICS security
- AI in cybersecurity (defensive & offensive)
Tools & Visuals
Examples of cybersecurity labs, SOC dashboards, scanning tools and ethical hacking simulations.