Cyber Security

Week 1: Cybersecurity Foundations 
Theme: Understand the basics & real-world importance 
Day 1: What is cybersecurity & why it matters 
Day 2: CIA Triad & Zero Trust explained with examples 
Day 3: Threat landscape (malware, phishing, ransomware, DDoS) 
Day 4: Cybersecurity domains (Network, Web, Cloud, SOC) 
Day 5: Famous breaches (WannaCry, SolarWinds, Equifax) 
Day 6 (Project 1): Research & present a real-world cyberattack (cause, effect, prevention) 

Week 2: Networking for Security 
Theme: Learn networking essentials before hacking 
Day 7: OSI & TCP/IP models simplified 
Day 8: IP, MAC, DNS, DHCP explained practically 
Day 9: Common protocols (HTTP, HTTPS, FTP, SSH, SMTP) 
Day 10: Tools: ping, traceroute, netstat, ip, arp 
Day 11: Intro to Wireshark (packet sniffing basics) 
Day 12 (Project 2): Capture network traffic & identify 3 protocols using Wireshark 

Week 3: System & Network Security Tools 
Theme: Build hands-on skills with security tools 
Day 13: Passwords & authentication basics 
Day 14: Malware & social engineering explained 
Day 15: Tool: nmap scanning basics 
Day 16: Tool: netcat for connections & transfers 
Day 17: Tool: tcpdump for packet capture 
Day 18 (Project 3): Run a nmap scan, map open ports & create a vulnerability map 

Week 4: Cryptography in Action 
Theme: Protecting & verifying data 
Day 19: Symmetric vs Asymmetric encryption 
Day 20: Hashing & password cracking concepts 
Day 21: Digital signatures & certificates 
Day 22: SSL/TLS explained with demo 
Day 23: Tools: GPG & OpenSSL basics 
Day 24 (Project 4): Encrypt files, sign them digitally & verify integrity with hashes 

Week 5: Web & Application Security 
Theme: Breaking & defending websites 
Day 25: OWASP Top 10 overview 
Day 26: SQL Injection explained & tested 
Day 27: Cross-Site Scripting (XSS) basics 
Day 28: CSRF & authentication flaws 
Day 29: Secure coding principles (overview) 
Day 30 (Project 5): Exploit SQL Injection on a demo app & write an exploit report 

Week 6: Ethical Hacking & Pen Testing 
Theme: Learn hacker tools & testing approach 
Day 31: Phases of penetration testing (Recon → Exploit → Report) 
Day 32: Kali Linux toolkit overview 
Day 33: Reconnaissance & footprinting 
Day 34: Metasploit framework basics 
Day 35: Password cracking with Hydra & John the Ripper 
Day 36 (Project 6): Perform a penetration test on a sandbox system & prepare a pentest report 

Week 7: Security Monitoring & Incident Response 
Theme: Detecting & responding to attacks 
Day 37: What is a SOC? Roles & responsibilities 
Day 38: Logs: Windows vs Linux event logs 
Day 39: IDS/IPS basics (Snort, Suricata) 
Day 40: SIEM overview (Splunk/ELK basics) 
Day 41: Threat intelligence: IOCs & attack indicators 
Day 42 (Project 7): Analyze suspicious logs & create an incident response summary 

Week 8: Advanced Security Practices 
Theme: Strengthening infrastructure security 
Day 43: Firewalls explained (conceptual deep dive) 
Day 44: Intrusion prevention & honeypots 
Day 45: Secure network design (DMZ, segmentation, VPNs) 
Day 46: Endpoint security & patching 
Day 47: Cloud security basics (AWS/Azure security measures) 
Day 48 (Project 8): Design a secure enterprise network diagram with defense layers 

Week 9: Linux for Cybersecurity 
Theme: Using Linux for defense & monitoring 
Day 49: Linux basics: file system & navigation (ls, cd, pwd) 
Day 50: File operations & permissions (chmod, chown) 
Day 51: Users, groups, sudo, root privileges 
Day 52: Processes & services (ps, top, systemctl) 
Day 53: Secure SSH access & key authentication 
Day 54 (Project 9): Harden a Linux server (user policies, SSH keys, firewall setup) 

Week 10: Linux Security & Capstone Project 
Theme: Apply everything in a final project 
Day 55: Shell scripting for security automation 
Day 56: Log monitoring & auditing (journalctl, /var/log/) 
Day 57: Detecting suspicious activity on Linux 
Day 58: Capstone Project – Setup & Planning 
Day 59: Capstone Project – Execution (Secure Linux server OR Vulnerability Scan & Report) 
Day 60: Capstone Project – Final presentation + career roadmap 
 

Training Image
Cyber Security

Enroll To Workshop