Duration 35 days – 245 hrs
Overview
This bootcamp roadmap is a structured, role-ready cybersecurity learning journey designed to take learners from basic security fundamentals to advanced cybersecurity defense and operations, aligned with ISO/IEC 27001 best practices.
Participants will progressively build the skills needed to secure systems and networks, monitor and detect threats, respond to incidents, manage vulnerabilities, and ultimately develop an organization-ready cybersecurity improvement plan.
Ideal for IT teams and organizations that want a practical, risk-based cybersecurity capability—from building security baselines to preparing for SOC operations and advanced threat defense.
1) Cybersecurity Practitioner Level 1: System Hardening, IAM & Security Baselines
Duration: 5 Days – 35 Hours
Course Overview
A hands-on course focused on building a security baseline for Windows/Linux systems and user environments. Learners will implement practical controls like secure configuration, patching, encryption, endpoint protection, and identity access management aligned with ISO 27001 controls.
Objectives
- Apply OS hardening for Windows and Linux
- Implement baseline security settings and checklists
- Improve identity security (passwords, MFA, access control)
- Deploy patching and endpoint security practices
- Create a minimum cybersecurity baseline for SMEs
Target Audience
- IT support / sysadmins / infrastructure teams
- Junior cybersecurity staff
- Technical leads managing small-to-medium environments
Prerequisites
- Your Cybersecurity Fundamentals course
- Basic Windows/Linux and networking knowledge
Course Outline
Module 1: Security Baselines & Secure Admin Practices
Module 2: Windows Hardening Essentials (local policies, services, RDP controls)
Module 3: Linux Hardening Essentials (permissions, SSH hardening, updates)
Module 4: Patch & Vulnerability Exposure Reduction
Module 5: Endpoint Protection (AV/EDR concepts, device control)
Module 6: Identity Security (RBAC, MFA, admin accounts, privilege control)
Module 7: Logging Basics (what to log, retention, basic review)
Module 8: Hands-on Lab: Build a “Minimum Secure Baseline” checklist
2) Network Security Essentials: Firewalls, Segmentation, Secure Wi-Fi & VPN
Duration: 5 Days – 35 Hours
Course Overview
Build strong foundational defenses by learning practical network security engineering: firewall rule design, VLAN segmentation, secure remote access, Wi-Fi security, and monitoring concepts.
Objectives
- Design segmentation to reduce blast radius
- Build firewall rules safely (least privilege)
- Secure Wi-Fi and guest networks
- Implement safe remote access via VPN concepts
- Identify common insecure network patterns
Target Audience
- Network admins / IT infrastructure teams
- System administrators supporting networks
- Junior security engineers
Prerequisites
- Cybersecurity Fundamentals
- Networking basics (IP/subnet/VLAN concepts helpful)
Course Outline
Module 1: Network Security Principles (trust zones, segmentation strategy)
Module 2: Firewall Deep Dive (stateful rules, inbound vs outbound)
Module 3: VLANs + Network Isolation Design
Module 4: Secure Wi-Fi (WPA2/3, guest isolation, rogue AP risks)
Module 5: VPN Concepts (remote access vs site-to-site, MFA)
Module 6: IDS/IPS Concepts + Practical Use Cases
Module 7: Hands-on Labs:
- Build a secure rule set
- Validate segmentation effectiveness
- Identify misconfigurations from sample network diagrams
3) SOC Analyst Bootcamp: Security Monitoring, SIEM & Alert Triage
Duration: 4 Days – 28 Hours
Course Overview
This course trains learners to operate like a Security Operations Center (SOC) Analyst—monitoring logs, detecting suspicious behavior, triaging alerts, escalating incidents, and improving visibility using a SIEM approach.
Objectives
- Understand SOC workflows and escalation models
- Interpret common security logs and alerts
- Perform basic investigations using evidence and timelines
- Reduce false positives through tuning and context
- Create actionable incident reports for IT and management
Target Audience
- SOC / monitoring teams
- IT operations teams doing security monitoring
- Cybersecurity associates / analysts
Prerequisites
- Cybersecurity Fundamentals
- Familiarity with system/network logs is helpful
Course Outline
Module 1: SOC Concepts (tiers, SLAs, incident categories)
Module 2: Log Sources (AD, endpoints, firewalls, email, web)
Module 3: SIEM Fundamentals (use cases, correlation, dashboards)
Module 4: Alert Triage & Prioritization (severity + impact)
Module 5: Threat Indicators (IOC basics, suspicious behaviors)
Module 6: Investigation Workflow (timeline, hypothesis, evidence)
Module 7: Reporting & Escalation Writing (executive-ready reports)
Module 8: Hands-on Labs:
- Triage sample alerts
- Identify likely compromise patterns
- Write incident summaries
4) Incident Response Mastery: Containment, Investigation & Recovery (IR/DFIR)
Duration: 4 Days – 28 Hours
Course Overview
A practical course covering the full incident lifecycle: prepare → detect → contain → eradicate → recover → lessons learned, including basic digital forensics techniques for evidence handling and investigation readiness.
Objectives
- Execute a structured incident response plan
- Contain ransomware/phishing/endpoint compromise incidents
- Preserve and document evidence properly
- Perform basic host/network investigation steps
- Conduct post-incident improvements and reporting
Target Audience
- IT admins handling security incidents
- SOC staff and cybersecurity analysts
- IT managers and technical leads
Prerequisites
- SOC Analyst Bootcamp recommended (or equivalent experience)
Course Outline
Module 1: Incident Response Frameworks & Playbooks
Module 2: Incident Classification & Severity Scoring
Module 3: Evidence Handling & Documentation
Module 4: Endpoint Investigation Basics (processes, persistence clues)
Module 5: Network Investigation Basics (connections, suspicious traffic)
Module 6: Containment & Recovery Strategies (ransomware-ready)
Module 7: Tabletop Exercises (realistic incident scenarios)
Module 8: Post-Incident Review + Improvement Roadmap
5) Ethical Hacking Foundations: Vulnerability Discovery, Exploitation Basics & Reporting
Recommended Title
Duration: 4 Days – 28 Hours
Course Overview
A beginner-to-intermediate ethical hacking bootcamp that teaches learners how attackers think—while staying defensive and responsible. Focuses on vulnerability discovery, scanning, validation, safe exploitation concepts, and remediation reporting.
Objectives
- Run vulnerability scanning and interpret results
- Validate findings and reduce false positives
- Understand common vulnerabilities (OWASP basics)
- Produce a vulnerability report with remediation guidance
- Establish a vulnerability management cycle
Target Audience
- Security analysts / engineers
- IT teams assigned to vulnerability management
- Developers/QA who support security testing
Prerequisites
- Cybersecurity Fundamentals
- Networking + basic OS troubleshooting
Course Outline
Module 1: Ethical Hacking Rules, Scope, and Authorization
Module 2: Reconnaissance & Attack Surface Mapping
Module 3: Vulnerability Scanning & Validation
Module 4: Common Vulnerabilities (auth flaws, misconfig, exposures)
Module 5: Web App Basics (OWASP Top risks overview)
Module 6: Password Attacks & Defense Concepts (safe demonstrations)
Module 7: Reporting & Remediation Guidance
Module 8: Hands-on Labs: scan → validate → document → recommend fixes
6) Secure Cloud & DevSecOps: Hardening, Identity, CI/CD & Container Security
Duration: 3 Days – 21 Hours
Course Overview
Modern organizations move to cloud and CI/CD fast—this course helps teams secure cloud workloads using identity-first design, secure configurations, secrets management, logging, and DevSecOps controls.
Objectives
- Apply cloud security fundamentals (shared responsibility)
- Secure IAM, roles, and permissions in cloud environments
- Protect secrets and keys safely
- Add security checks into CI/CD pipelines
- Identify container and deployment risks
Target Audience
- DevOps / cloud engineers
- Developers supporting deployments
- Security engineers supporting cloud programs
Prerequisites
- Cybersecurity Fundamentals
- Basic knowledge of web apps and cloud concepts
Course Outline
Module 1: Cloud Security Fundamentals & Shared Responsibility
Module 2: IAM in the Cloud (roles, policies, least privilege)
Module 3: Secure Storage + Encryption Practices
Module 4: Logging, Monitoring & Cloud Visibility
Module 5: DevSecOps Foundations (shift-left security)
Module 6: Secrets Management & Secure Config
Module 7: Containers & Image Risks (baseline security practices)
Module 8: Capstone Lab: Build a secure CI/CD checklist + controls mapping
7) ISO/IEC 27001 ISMS Bootcamp: Implementation, Risk Assessment & Internal Audit
Duration: 3 Days – 21 Hours
Course Overview
For organizations preparing for ISO readiness, this bootcamp teaches how to build a working ISMS (Information Security Management System) including scope, risk assessment, controls selection, documentation, and internal audit readiness.
Objectives
- Understand ISO 27001 ISMS structure and requirements
- Perform a basic risk assessment & treatment plan
- Create minimum ISMS documents and policies
- Map controls to practical implementation
- Prepare for internal audits and evidence gathering
Target Audience
- IT managers, compliance, risk officers
- IT/security team leads supporting ISO readiness
- Organizations aiming for ISO certification
Prerequisites
- Cybersecurity Fundamentals (recommended)
- Familiarity with basic IT operations
Course Outline
Module 1: ISO 27001 Overview & ISMS Scope
Module 2: Risk Assessment & Risk Treatment Planning
Module 3: Controls Selection & Statement of Applicability (SoA)
Module 4: Required Policies & Evidence Checklist
Module 5: Internal Audit Basics (audit plan, findings, corrective actions)
Module 6: Practical Workshop: Build a “Starter ISMS Pack”
8) Advanced Threat Hunting & Purple Team Operations: Detect, Investigate, Improve
Duration: 5 Days – 35 Hours
Course Overview
An advanced defensive course focused on hunting real attacker behaviors, improving detection rules, and building repeatable methods. It blends blue-team detection with red-team simulation (purple team).
Objectives
- Perform structured threat hunting based on hypotheses
- Detect suspicious behavior across endpoint and network signals
- Improve alert rules and reduce blind spots
- Simulate attacker techniques safely to validate defenses
- Build repeatable hunt playbooks for the organization
Target Audience
- SOC Tier 2/Tier 3 analysts
- Security engineers and incident responders
- Defensive security leads
Prerequisites
- SOC Analyst Bootcamp + Incident Response Bootcamp (recommended)
Course Outline
Module 1: Threat Hunting Framework & Methodology
Module 2: Detection Engineering Basics
Module 3: Attack Techniques & Behavioral Indicators
Module 4: Hunting Playbooks for Common Intrusions
Module 5: Purple Team Operations & Validation Exercises
Module 6: Reporting Hunts + Improving Controls
Module 7: Capstone: Hunt → Validate → Improve detection rules
9) Cyber Defense Capstone: Attack–Defense Simulation + Security Roadmap Workshop
Duration: 2 Days – 14 Hours
Course Overview
A final simulation-based capstone where learners combine everything: security baselines, monitoring, response, and improvements. Ends with a practical security roadmap for their organization.
Objectives
- Respond to realistic multi-stage attacks
- Coordinate SOC + IR workflows
- Produce incident reports and corrective actions
- Build a 30–60–90 day security improvement plan
- Align controls with ISO 27001 and practical constraints
Target Audience
- Bootcamp graduates
- IT/security teams preparing for real operations
Prerequisites
- At least 3 courses from the pathway (SOC + IR strongly recommended)
Course Outline
Day 1: Attack Simulation (phishing → compromise → lateral movement)
Day 2: Containment + Recovery + Executive Reporting + Roadmap building
Optional “Tracks” You Can Offer (If You Want Role-Based Bundles)
- Blue Team Track (Defense):
Fundamentals → Practitioner → Network Security → SOC → IR → Threat Hunting → Capstone - Purple Team Track (Defense + Validation):
SOC → IR → Vulnerability/Pentest → Threat Hunting → Capstone - GRC / ISO Track (Compliance + Governance):
Fundamentals → Practitioner → ISO 27001 ISMS → Capstone Roadmap - Cloud Security Track:
Fundamentals → Practitioner → SOC → Cloud & DevSecOps → Capstone

