Module 1: Foundations of Cybersecurity
• Introduction to Cybersecurity Landscape
• CIA Triad (Confidentiality, Integrity, Availability)
• Cyber Threats, Attack Vectors and Threat Actors
• Cybersecurity Case Study: Equifax Data Breach
• Lab: Setting up a Cybersecurity Lab (Kali Linux, VirtualBox)
Module 2: Networking for Security
• TCP/IP, DNS, HTTP/HTTPS Fundamentals
• Network Topologies and Protocol Analysis
• Packet Analysis and Wireshark
• Case Study: Mirai Botnet Attack
• Lab: Packet Sniffing and Network Monitoring
Module 3: Linux for Hackers
• Linux Commands for Security Engineers
• File Permissions, Process Monitoring
• Bash Scripting Basics
• Lab: Automating Reconnaissance using Bash Scripts
Module 4: Ethical Hacking Methodology
• Reconnaissance (Passive & Active)
• Scanning and Enumeration
• Vulnerability Assessment
• Case Study: Target Corporation Breach
• Lab: Using Nmap, OpenVAS
Module 5: Web Application Security
• OWASP Top 10
• SQL Injection, XSS, CSRF
• Authentication & Session Attacks
• Case Study: Yahoo Data Breach
• Lab: Exploiting Vulnerable Web Apps (DVWA, Juice Shop)
Module 6: System Exploitation
• Password Attacks
• Privilege Escalation
• Exploit Frameworks
• Lab: Metasploit Hands-on Exercises
Module 7: Security Monitoring & Incident Response
• SIEM Concepts
• Log Analysis
• Incident Response Lifecycle
• Case Study: SolarWinds Supply Chain Attack
• Lab: Log Analysis and Incident Investigation
Module 8: Cloud & Modern Security
• Cloud Security Basics
• Container Security
• DevSecOps Overview
• Lab: Securing a Cloud VM
Module 9: Digital Forensics Basics
• Evidence Collection
• Disk and Memory Forensics
• Lab: Autopsy & Volatility Tools
Module 10: Capstone Industry Simulation
• Red Team vs Blue Team Simulation
• Students analyze and defend a simulated cyber attack
• Final industry-style security assessment report