This intensive cybersecurity program provides foundational and hands-on knowledge in key security domains, including threat intelligence, SIEM & SOAR, IAM, email and endpoint security, incident response, firewall configuration, and digital forensics. Participants will learn through real-world scenarios and labs focused on prevention, detection, and response to cyber threats. With practical experience in tools and frameworks, the course prepares students for entry-level cybersecurity roles and certifications. Capstone activities follow each module to consolidate learning and simulate job-readiness.
Course Structure
The course spans multiple modules, each with theoretical foundations, hands-on labs, and real-world scenarios. Modules conclude with capstone activities to apply the knowledge in a simulated environment.
Course Modules
Cybersecurity Fundamentals
- CIA Triad (Confidentiality, Integrity, Availability)
- Threat Actors and Attack Vectors
- Common Attack Types: Phishing, Malware, DoS/DDoS
- Security Controls: Preventive, Detective, Corrective
- Concepts of Risk, Threat, and Vulnerability
SIEM & SOAR
- Purpose and Components of SIEM
- Log Collection & Analysis Principles
- Correlation Rules and Alerting
- Introduction to SOAR and its Benefits
- Why SIEM and SOAR are Important
Identity and Access Management (IAM)
- Authentication vs Authorization
- MFA (Multi-Factor Authentication)
- Federation and SSO (Single Sign-On)
- Principle of Least Privilege
- Role-Based vs Attribute-Based Access Control
Email Security
- Threats: Phishing, Spoofing, Business Email Compromise (BEC)
- SPF, DKIM, DMARC Overview
- Email Filtering and Encryption
- User Awareness Practices
- Lab: Simulate phishing and analyze headers
Endpoint Security
- Antivirus, EDR, XDR Solutions
- Application Whitelisting & Sandboxing
- Device Control and Patch Management
- Endpoint Hardening Techniques
Security and Risk Management
- Risk Assessment Process
- Accepting vs Mitigating Risk
- Security Policies and Governance
- Compliance Standards (ISO 27001, NIST, GDPR)
- Business Continuity and Disaster Recovery
Incident Handling and Response
- Incident Response Lifecycle: Preparation to Lessons Learned
- Playbooks and Runbooks
- Chain of Custody and Documentation
- Real-life Scenarios
Firewall Configuration
- Types: Packet Filtering, Stateful, NGFW
- Basic Rules: Allow, Deny, Port, Protocol
- NAT, Zones, and DMZ Concepts
- Lab: Firewall Configuration
Digital Forensics
- Forensics Process: Collection, Examination, Analysis, Reporting
- Volatile vs Non-Volatile Data
- Imaging and Hashing
- Chain of Custody Importance
Vulnerability Management
- Vulnerability Scanning vs Penetration Testing
- CVSS Scores and Results Interpretation
- Patch Management Process
- Common Tools: Nessus, OpenVAS, Nmap
- Lab: Using Vulnerability Tools
Use Cases & Real-World Incidents
- Case Studies: SolarWinds, Colonial Pipeline, Log4Shell
- Root Cause Analysis and Mitigation
- Layered Security Discussions
- Group Activity: Simulated Breach Response Strategy
Capstone Activities
- Each module includes capstone projects to apply practical and theoretical knowledge in simulated environments.
Career Counselling
- Resume, Cover Letter Building & Review
- LinkedIn Profile Optimization
- Job Hunt Strategy Assistance
- Mock Interview Session: Behavioral & Technical
- Interview Preparation
- Assistance with Business and Professional Email Writing
- Continuous Assistance Until You Land the Job!