Cybersecurity
Learn offensive and defensive security techniques used by real security engineers to protect modern systems.
16 weeksIntermediateLive Projects
Program HighlightsWhat You'll Experience
Live instructor-led sessions
1-on-1 mentorship
Real-world projects
Career guidance
Key Responsibilities
Actively monitor Splunk SIEM dashboards for anomalous behavior
Perform weekly vulnerability scans and triage risk priorities
Conduct post-mortem analysis on simulated security incidents
Audit cloud configurations and identity access management policies
Technologies You'll Master
Learning Outcomes
Conduct comprehensive vulnerability assessments and penetration tests
Monitor, detect, and respond to security incidents using Splunk SIEM
Analyze network traffic and identify malicious patterns using Wireshark
Implement strong defensive measures based on the MITRE ATT&CK framework
Project Allocation Framework
Real-World Project Execution
The Cybersecurity project framework bridges theoretical threat knowledge with entirely hands-on offensive operations and rigorous SOC-level defensive deployments.
Learning Stages
- Set 1 & 2: Reconnaissance and Network Defense
- Set 3 & 4: Application Exploitation and SIEM Detection
- Set 5: Enterprise-Grade Purple Team Operations
Implementation Guidelines
- All offensive operations must be conducted strictly within assigned safe-haven sandboxes.
- Documentation must follow industry-standard CVSS scoring methodologies.
- Include remediation steps for every successful exploit demonstrated.
- Never run scans against unauthorized public infrastructure.
Expected Outcomes
- Operate industry-standard offensive suites like Kali, Burp, and Metasploit.
- Deploy and configure enterprise SIEM systems like Splunk.
- Translate cyber risk into business-level reporting.
- Engineer secure infrastructures following the MITRE ATT&CK mitigation guidelines.
Project Catalogue
Foundational Level (Reconnaissance)
Project Set 1
Focus on non-destructive data gathering and basic network topography mapping.
1
Corporate OSINT Profiling Report2
Nmap Subnet Topology Discovery3
Open-Source Phishing Campaign Analysis4
DNS Record Spoofing Investigation1-on-1 Mentorship
Get personalized guidance from industry experts. Regular code reviews, career advice, and technical support throughout your internship.
Certificate
Earn an industry-recognized certificate upon successful completion. Boost your resume and stand out to potential employers.