Cybersecurity

Learn offensive and defensive security techniques used by real security engineers to protect modern systems.

16 weeksIntermediateLive Sessions
Access Content
Program HighlightsWhat You'll Get
Live instructor-led sessions
1-on-1 mentorship
Real-world projects
Career guidance

Technologies You'll Master

Splunk
Splunk
Wireshark
Wireshark
Kali Linux
Kali Linux
Nmap
Nmap
Burp Suite
Burp Suite
Metasploit
Metasploit
MITRE ATT&CK
MITRE ATT&CK

Learning Outcomes

Conduct comprehensive vulnerability assessments and penetration tests
Monitor, detect, and respond to security incidents using Splunk SIEM
Analyze network traffic and identify malicious patterns using Wireshark
Implement strong defensive measures based on the MITRE ATT&CK framework
Curriculum

Master the Curriculum

A carefully structured syllabus designed by industry experts — progressive mastery from ground zero to production-level readiness.

Month 1 pyramid

Month 1

Networking & Fundamentals

Network Analysis 1
  • Deep dive into OSI layers
  • TCP/IP suite
  • Subnetting and VLANs
  • Common network protocols
Project Allocation Framework

Real-World Project Execution

The Cybersecurity project framework bridges theoretical threat knowledge with entirely hands-on offensive operations and rigorous SOC-level defensive deployments.

Learning Stages

  • Set 1 & 2: Reconnaissance and Network Defense
  • Set 3 & 4: Application Exploitation and SIEM Detection
  • Set 5: Enterprise-Grade Purple Team Operations

Implementation Guidelines

  • All offensive operations must be conducted strictly within assigned safe-haven sandboxes.
  • Documentation must follow industry-standard CVSS scoring methodologies.
  • Include remediation steps for every successful exploit demonstrated.
  • Never run scans against unauthorized public infrastructure.

Expected Outcomes

  • Operate industry-standard offensive suites like Kali, Burp, and Metasploit.
  • Deploy and configure enterprise SIEM systems like Splunk.
  • Translate cyber risk into business-level reporting.
  • Engineer secure infrastructures following the MITRE ATT&CK mitigation guidelines.
Project Catalogue
Foundational Level (Reconnaissance)

Project Set 1

Focus on non-destructive data gathering and basic network topography mapping.

1
Corporate OSINT Profiling Report
2
Nmap Subnet Topology Discovery
3
Open-Source Phishing Campaign Analysis
4
DNS Record Spoofing Investigation

Ready to Get
Started?

Join thousands of students who transformed their careers with Orvion Academy

Outcomes That Matter

Real Results for
Real Students
Real Results for
Real Students
Orvion Academy Outcomes Logo
Book a call