Cyber SECURITY
Cyber Security
Next batch is coming soon!
- 4.721 students
- Last updated 25/7/2023
Descriptions
The SmartED Cybersecurity Internship Program is designed to transform beginners into capable cybersecurity professionals. With a carefully structured curriculum, the program begins with foundational knowledge and progresses into advanced topics like ethical hacking, malware analysis, cloud security, and IoT security.
Through practical projects and tools like Kali Linux, Wireshark, Metasploit, and Burp Suite, students learn to defend systems, investigate attacks, and implement modern security practices. This industry-relevant course also focuses on compliance, threat intelligence, and incident response making learners job-ready.
Key Points
- Solid Foundations in Cybersecurity
- Hands-on Network & System Security
- Web, Cloud & Mobile Security
- Offensive & Defensive Skills
- Governance & Risk Management
- Capstone Experience
Course Lessons
- Topics: Cybersecurity concepts, threats, legal considerations
- Capstone: Create a basic security policy for a small business
- Homework: Write a security audit checklist
- Topics: TCP/IP, protocols, network architecture
- Capstone: Set up and configure a basic secure network
- Homework: Diagram and label a secure home/office network
- Topics: Linux CLI, shell scripting, file management
- Capstone: Automate tasks using shell scripts
- Homework: Write a user management script
- Topics: Install & configure Kali Linux, tool setup
- Capstone: Kali Linux virtual machine setup for pentesting
- Homework: Create a report listing installed tools and their purpose
- Topics: Firewalls, VPNs, IDS/IPS, Nmap, Wireshark
- Capstone: Perform network scanning and secure design
- Homework: Analyze traffic captures using Wireshark
- Topics: OS hardening (Windows, Linux, macOS), SELinux
- Capstone: Harden a Linux system against attacks
- Homework: Create secure user access policies
- Topics: XSS, SQLi, CSRF, Burp Suite, OWASP
- Capstone: Test and fix vulnerabilities in a sample app
- Homework: Conduct XSS and SQLi simulations in DVWA
- Topics: Encryption, hashing, SSL/TLS, SSH, PKI
- Capstone: Implement secure file transfer using OpenSSL
- Homework: Encrypt & decrypt messages using GPG
- Topics: Threat data collection, incident lifecycle, forensics
- Capstone: Simulate an incident response and forensic analysis
- Homework: Create a threat intelligence report
- Topics: Malware types, IDA Pro, Cuckoo Sandbox
- Capstone: Analyze and report a malware sample
- Homework: Perform static analysis of a malicious file
- Topics: WEP/WPA, ADB, app security
- Capstone: Audit the security of a wireless network
- Homework: Analyze APK files for vulnerabilities
- Topics: Cloud infrastructure, IAM, AWS/Azure tools
- Capstone: Secure and configure a cloud instance
- Homework: Set up IAM roles and policies in AWS
- Topics: IoT vulnerabilities, Shodan, firmware analysis
- Capstone: Assess and secure IoT device configurations
- Homework: Identify threats using Shodan
- Topics: Phishing, SET toolkit, awareness training
- Capstone: Create a simulated phishing awareness campaign
- Homework: Draft an internal cybersecurity awareness policy
- Topics: Reconnaissance, exploitation, Metasploit
- Capstone: Perform a penetration test on a test network
- Homework: Document vulnerabilities and suggest fixes
- Topics: SOC, log analysis, ELK Stack, TheHive
- Capstone: Build a mini SOC and manage a mock breach
- Homework: Analyze logs and report suspicious activity
- Topics: Risk assessment, ISO 27001, compliance
- Capstone: Design a risk mitigation plan
- Homework: Evaluate a company's compliance readiness
- Topics: AI in security, future threats, career paths
- Capstone: Research & present an emerging cybersecurity trend
- Homework: Write a summary on any cybersecurity trend
Projects
- Objective:
Build, monitor, and defend a small enterprise network from multiple simulated cyber threats. - Requirements:
Deploy secure Linux and Windows servers, Set up IDS/IPS and monitor logs, Identify and block phishing & malware attacks, Perform real-time incident response, Create documentation (policies, playbooks, reports).
- Teamwork: Group project with defined roles (analyst, engineer, responder, presenter). Final presentation includes a live demo, attack/defense walkthrough, and mitigation report.

Instructor

Security Analyst
This course includes:
- 45+ hours on-demand video
- Full lifetime access
- Access on mobile and TV
- Free Webinar
- Certificate of completion
After the final task and according to the results


After the final task and according to the results
Government Certified
Earn NSDC Certification
Benefits of NSDC Certification:
- Government-Recognized Credential
- Industry-Accepted Validation
- Enhanced Employability
- Added Value for Higher Education & International Opportunities
- Alignment with Skill India Mission
- National Skill Registry Entry