Cybersecurity

Learn offensive and defensive security techniques used by real security engineers to protect modern systems.

16 weeksIntermediateLive Projects
Get Syllabus
Program HighlightsWhat You'll Experience
Live instructor-led sessions
1-on-1 mentorship
Real-world projects
Career guidance

Key Responsibilities

Actively monitor Splunk SIEM dashboards for anomalous behavior
Perform weekly vulnerability scans and triage risk priorities
Conduct post-mortem analysis on simulated security incidents
Audit cloud configurations and identity access management policies

Technologies You'll Master

Splunk
Splunk
Wireshark
Wireshark
Kali Linux
Kali Linux
Nmap
Nmap
Burp Suite
Burp Suite
Metasploit
Metasploit
MITRE ATT&CK
MITRE ATT&CK

Learning Outcomes

Conduct comprehensive vulnerability assessments and penetration tests
Monitor, detect, and respond to security incidents using Splunk SIEM
Analyze network traffic and identify malicious patterns using Wireshark
Implement strong defensive measures based on the MITRE ATT&CK framework
Project Allocation Framework

Real-World Project Execution

The Cybersecurity project framework bridges theoretical threat knowledge with entirely hands-on offensive operations and rigorous SOC-level defensive deployments.

Learning Stages

  • Set 1 & 2: Reconnaissance and Network Defense
  • Set 3 & 4: Application Exploitation and SIEM Detection
  • Set 5: Enterprise-Grade Purple Team Operations

Implementation Guidelines

  • All offensive operations must be conducted strictly within assigned safe-haven sandboxes.
  • Documentation must follow industry-standard CVSS scoring methodologies.
  • Include remediation steps for every successful exploit demonstrated.
  • Never run scans against unauthorized public infrastructure.

Expected Outcomes

  • Operate industry-standard offensive suites like Kali, Burp, and Metasploit.
  • Deploy and configure enterprise SIEM systems like Splunk.
  • Translate cyber risk into business-level reporting.
  • Engineer secure infrastructures following the MITRE ATT&CK mitigation guidelines.
Project Catalogue
Foundational Level (Reconnaissance)

Project Set 1

Focus on non-destructive data gathering and basic network topography mapping.

1
Corporate OSINT Profiling Report
2
Nmap Subnet Topology Discovery
3
Open-Source Phishing Campaign Analysis
4
DNS Record Spoofing Investigation

1-on-1 Mentorship

Get personalized guidance from industry experts. Regular code reviews, career advice, and technical support throughout your internship.

Certificate

Earn an industry-recognized certificate upon successful completion. Boost your resume and stand out to potential employers.

Outcomes That Matter

Real Results for
Real Students
Real Results for
Real Students
Orvion Academy Outcomes Logo
Book a call