Cybersecurity
Learn offensive and defensive security techniques used by real security engineers to protect modern systems.
16 weeksIntermediateLive Sessions
Program HighlightsWhat You'll Get
Live instructor-led sessions
1-on-1 mentorship
Real-world projects
Career guidance
Technologies You'll Master
Learning Outcomes
Conduct comprehensive vulnerability assessments and penetration tests
Monitor, detect, and respond to security incidents using Splunk SIEM
Analyze network traffic and identify malicious patterns using Wireshark
Implement strong defensive measures based on the MITRE ATT&CK framework
Curriculum
Master the Curriculum
A carefully structured syllabus designed by industry experts — progressive mastery from ground zero to production-level readiness.
Month 1
Networking & Fundamentals
Network Analysis 1
- Deep dive into OSI layers
- TCP/IP suite
- Subnetting and VLANs
- Common network protocols
Project Allocation Framework
Real-World Project Execution
The Cybersecurity project framework bridges theoretical threat knowledge with entirely hands-on offensive operations and rigorous SOC-level defensive deployments.
Learning Stages
- Set 1 & 2: Reconnaissance and Network Defense
- Set 3 & 4: Application Exploitation and SIEM Detection
- Set 5: Enterprise-Grade Purple Team Operations
Implementation Guidelines
- All offensive operations must be conducted strictly within assigned safe-haven sandboxes.
- Documentation must follow industry-standard CVSS scoring methodologies.
- Include remediation steps for every successful exploit demonstrated.
- Never run scans against unauthorized public infrastructure.
Expected Outcomes
- Operate industry-standard offensive suites like Kali, Burp, and Metasploit.
- Deploy and configure enterprise SIEM systems like Splunk.
- Translate cyber risk into business-level reporting.
- Engineer secure infrastructures following the MITRE ATT&CK mitigation guidelines.
Project Catalogue
Foundational Level (Reconnaissance)
Project Set 1
Focus on non-destructive data gathering and basic network topography mapping.
1
Corporate OSINT Profiling Report2
Nmap Subnet Topology Discovery3
Open-Source Phishing Campaign Analysis4
DNS Record Spoofing InvestigationReady to Get
Started?
Join thousands of students who transformed their careers with Orvion Academy