๐ Table of Contents:
๐ก๏ธ
Module 1: Cybersecurity & Incident Handling Fundamentals (6 Hours)
๐น Understanding Cybersecurity & the Role of an Incident Handler
๐น Cyber Threat Landscape & Attack Vectors (Malware, Phishing, AI-Powered Threats)
๐น Introduction to Incident Handling Frameworks (NIST, SANS, MITRE ATT&CK)
๐น Hands-on Lab: Setting Up a Virtual Lab for Incident Handling
๐
Module 2: Basic Cybersecurity Tools & Techniques (6 Hours)
๐น Network Monitoring & Packet Analysis with Wireshark
๐น Log Analysis & SIEM Basics with Splunk
Memory & File Analysis using CyberChef & Velociraptor
๐น ๐น Hands-on Lab: Analyzing Real Network Traffic & Logs
โ ๏ธ
Module 3: Cyber Attack Lifecycle & Indicators of Compromise (IoCs) (6 Hours)
Cyber Kill Chain & MITRE ATT&CK Matrix
๐น Identifying & Collecting IoCs from Live Systems
๐น Using MISP for Threat Intelligence & IoC Enrichment
๐น Hands-on Lab: Extracting IoCs from a Ransomware Attack
๐จ
Module 4: Incident Detection & Triage (8 Hours)
๐น How SOC Teams Detect Cyber Threats
๐น Security Event Correlation & Log Analysis with SIEM
๐น Triage & Classification of Cyber Incidents
๐น Hands-on Exercise: Investigating a Suspicious Login & Lateral Movement in Logs**
๐ฅ๏ธ Module 5: Malware Analysis & Reverse Engineering (8 Hours)
๐น Types of Malware & Their Behaviors
๐น Basic Static & Dynamic Malware Analysis
๐น Using Sandboxing & AI for Malware Detection
๐น Hands-on Lab: Analyzing a Real Malware Sample in a Sandbox**
๐ฅ Module 6: Threat Hunting & AI-Driven Attacks (6 Hours)
๐น Threat Hunting Methodologies (Hypothesis-Driven, IOC-Based, AI-Assisted)
๐น Detecting AI-Powered Phishing, Deepfakes & Automation-Based Threats
๐น Hands-on Lab: Hunting AI-Generated Phishing Campaigns & Fake Profiles**
๐ Module 7: Incident Response & Playbook Development (8 Hours)
๐น Incident Response Process (Preparation, Detection, Containment, Eradication, Recovery, Lessons Learned)
๐น Developing Automated Playbooks with SOAR (Security Orchestration & Automated Response)
๐น Hands-on Workshop: Writing & Testing an Incident Response Playbook for Ransomware Attacks**
๐ ๏ธ Module 8: Advanced Incident Handling & Live Cyber Incident Simulation (8 Hours)
๐น Handling Real-Time Cyber Attacks (DDoS, APTs, Data Breaches)
๐น Tabletop Exercises for Crisis Management & Decision Making
๐น Hands-on Final Lab: Investigating & Mitigating a Simulated AI-Powered Attack**
๐ Module 9: Reporting, Legal & Compliance Considerations (4 Hours)
๐น Writing Effective Incident Reports
๐น Understanding Legal & Compliance Aspects (GDPR, ISO 27001, NIST, SOC 2)
Career Pathways for Incident Handlers & SOC Analysts
๐ก๏ธ Final Certification & Capstone Project (4 Hours)
๐น Final Practical Exam: Handling a Simulated Cyber Incident
๐น Capstone Project: End-to-End Investigation & Response Report
๐น Certification of Completion & Career Mentoring
๐ Who Can Join?
๐ฏ Students & Graduates โ Computer Science, IT, Cybersecurity, or related fields.
๐ฏ Career Changers โ IT professionals or individuals looking to transition into cybersecurity.
๐ฅ Key Takeaways :
โ
Hands-on Labs with Wireshark, Splunk, MISP, TheHive, CrowdStrike, Velociraptor
โ
Real-World Cyber Incident Simulations (AI-Powered Phishing, Ransomware, APTs)
โ
SOC Playbook Development for Automated Response
โ
Career Path Guidance for SOC Analyst & Incident Response Roles
๐ Prerequisites
This course is designed for beginners with no prior cybersecurity background. However, having a basic understanding of IT concepts can be helpful.
๐ป Hardware Requirements:
๐นProcessor: Minimum Intel i5 / Ryzen 5 (Recommended i7 / Ryzen 7 or higher).
๐นRAM: Minimum 8GB (Recommended 16GB+ for better virtualization).
๐นStorage: At least 100GB free space (Recommended SSD for faster performance).
๐ Internet & Network Requirements:
๐นStable Internet Connection: Minimum 10 Mbps (Recommended 25 Mbps+).
๐นVirtualization Support: Must support. VMware / VirtualBox / Hyper-V
๐นFirewall Permissions: Ability to download install security & forensic tools.
๐ ๏ธ Software & Tools Required:
๐นOperating System (At-least one of these): Windows 10/11 (Preferred), Linux (Kali/Ubuntu), or macOS.
๐นMust Support Virtualization Software: VMware Workstation / VirtualBox.