Cyber SECURITY

Cyber Security

SmartED's Cybersecurity program is a hands-on, project-based course that covers essential topics like network security, ethical hacking, cloud security, cryptography, and incident response—equipping students with real-world skills to defend digital environments.

Next batch is coming soon!

5/5

Descriptions

The SmartED Cybersecurity Internship Program is designed to transform beginners into capable cybersecurity professionals. With a carefully structured curriculum, the program begins with foundational knowledge and progresses into advanced topics like ethical hacking, malware analysis, cloud security, and IoT security.

Through practical projects and tools like Kali Linux, Wireshark, Metasploit, and Burp Suite, students learn to defend systems, investigate attacks, and implement modern security practices. This industry-relevant course also focuses on compliance, threat intelligence, and incident response making learners job-ready.

Key Points

Course Lessons

  • Topics: Cybersecurity concepts, threats, legal considerations
  • Capstone: Create a basic security policy for a small business
  • Homework: Write a security audit checklist
  • Topics: TCP/IP, protocols, network architecture
  • Capstone: Set up and configure a basic secure network
  • Homework: Diagram and label a secure home/office network
  • Topics: Linux CLI, shell scripting, file management
  • Capstone: Automate tasks using shell scripts
  • Homework: Write a user management script
  • Topics: Install & configure Kali Linux, tool setup
  • Capstone: Kali Linux virtual machine setup for pentesting
  • Homework: Create a report listing installed tools and their purpose
  • Topics: Firewalls, VPNs, IDS/IPS, Nmap, Wireshark
  • Capstone: Perform network scanning and secure design
  • Homework: Analyze traffic captures using Wireshark
  • Topics: OS hardening (Windows, Linux, macOS), SELinux
  • Capstone: Harden a Linux system against attacks
  • Homework: Create secure user access policies
  • Topics: XSS, SQLi, CSRF, Burp Suite, OWASP
  • Capstone: Test and fix vulnerabilities in a sample app
  • Homework: Conduct XSS and SQLi simulations in DVWA
  • Topics: Encryption, hashing, SSL/TLS, SSH, PKI
  • Capstone: Implement secure file transfer using OpenSSL
  • Homework: Encrypt & decrypt messages using GPG
  • Topics: Threat data collection, incident lifecycle, forensics
  • Capstone: Simulate an incident response and forensic analysis
  • Homework: Create a threat intelligence report
  • Topics: Malware types, IDA Pro, Cuckoo Sandbox
  • Capstone: Analyze and report a malware sample
  • Homework: Perform static analysis of a malicious file
  • Topics: WEP/WPA, ADB, app security
  • Capstone: Audit the security of a wireless network
  • Homework: Analyze APK files for vulnerabilities
  • Topics: Cloud infrastructure, IAM, AWS/Azure tools
  • Capstone: Secure and configure a cloud instance
  • Homework: Set up IAM roles and policies in AWS
  • Topics: IoT vulnerabilities, Shodan, firmware analysis
  • Capstone: Assess and secure IoT device configurations
  • Homework: Identify threats using Shodan
  • Topics: Phishing, SET toolkit, awareness training
  • Capstone: Create a simulated phishing awareness campaign
  • Homework: Draft an internal cybersecurity awareness policy
  • Topics: Reconnaissance, exploitation, Metasploit
  • Capstone: Perform a penetration test on a test network
  • Homework: Document vulnerabilities and suggest fixes
  • Topics: SOC, log analysis, ELK Stack, TheHive
  • Capstone: Build a mini SOC and manage a mock breach
  • Homework: Analyze logs and report suspicious activity
  • Topics: Risk assessment, ISO 27001, compliance
  • Capstone: Design a risk mitigation plan
  • Homework: Evaluate a company's compliance readiness
  • Topics: AI in security, future threats, career paths
  • Capstone: Research & present an emerging cybersecurity trend
  • Homework: Write a summary on any cybersecurity trend

Projects

  • Objective:
    Build, monitor, and defend a small enterprise network from multiple simulated cyber threats.
  • Requirements:

Deploy secure Linux and Windows servers, Set up IDS/IPS and monitor logs, Identify and block phishing & malware attacks, Perform real-time incident response, Create documentation (policies, playbooks, reports).

  • Teamwork: Group project with defined roles (analyst, engineer, responder, presenter). Final presentation includes a live demo, attack/defense walkthrough, and mitigation report.

Instructor

Raja Lakshmi

Security Analyst

This course includes:

After the final task and according to the results

certificate
certificate

After the final task and according to the results

Government Certified

Earn NSDC Certification

This course is delivered in National Skill Development Corporation (NSDC) standards and fully aligned with NSDC’s national skill standards. We are live on the Skill India portal, offering government-recognized certification upon completion. Learners also benefit from live classes conducted directly through the Skill India platform, ensuring interactive, high-quality training from industry experts.
Benefits of NSDC Certification:
Register for NSDC certification today and advance your career with industry-recognized credentials.
Hear it From Them

Ambitious People ❤️ SmartEd