Course Overview
Protecting the digital frontier requires a deep understanding of how attacks happen. Our curriculum follows the **Cyber Kill Chain** methodology, teaching you both how to think like a hacker and how to defend like a security architect.
Curriculum Path
Module 1: Information Security Essentials
Networking fundamentals (TCP/IP), OSI Model, Linux for Security, and Cryptography basics.
Module 2: Offensive Security & VAPT
Vulnerability Assessment, Footprinting, Scanning Networks (Nmap), and System Hacking (Metasploit).
Module 3: Web Application & Network Security
OWASP Top 10 (SQLi, XSS), Firewall management, IDS/IPS, and Wi-Fi security auditing.
Module 4: SOC Operations & Incident Response
Log analysis with SIEM tools (Splunk/ELK), Digital Forensics, and Disaster Recovery planning.