HSR Sector 6 · Bangalore +91 96110 27980 Mon–Sat · 09:30–20:30
8-Month Program

Fullstack Cloud Security & Cybersecurity Syllabus

Complete roadmap from Network Fundamentals to Enterprise Security Professional

8 Months
Duration
122+
Topics
250+
Labs
100%
Placement

Month-by-Month Curriculum

Complete learning roadmap with topics, tools, and projects

MONTH 1
30 Days13 Topics

Network Fundamentals & Security

Topics Covered

  • IP addressing, subnetting, and VLAN design
  • Layer 2 & 3 switching and routing setups
  • Static and dynamic routing (RIP, OSPF, EIGRP)
  • DHCP, NAT, ACL implementation
  • Perimeter firewall setup
  • VPN and site-to-site tunneling
  • Access-control and segmentation testing
  • Basic intrusion detection using packet analysis
  • Packet capture and protocol analysis
  • Network-performance baselining
  • Fault isolation and log analysis
  • Multi-branch topology build (EVE-NG/GNS3)
  • Integration with virtual servers

Tools & Technologies

Cisco Packet Tracer
GNS3
EVE-NG
Wireshark
pfSense
MikroTik RouterOS
SolarWinds

Hands-on Projects

  • Design and deploy a 3-site enterprise network with secure inter-site connectivity
  • Implement VPN-based remote access and packet-level monitoring dashboard
MONTH 2
30 Days15 Topics

Linux Core & Advanced

Topics Covered

  • Installation and configuration of Ubuntu & CentOS servers
  • File system management, partitions, and permissions
  • User, group, and privilege management
  • Process control, logs, and system services
  • Cron jobs and task automation
  • System resource monitoring and troubleshooting
  • Kernel parameters, GRUB, and performance tuning
  • Shell scripting for network and security automation
  • Secure SSH, Sudo policies, and key-based authentication
  • Firewall configuration (UFW, iptables)
  • SELinux & AppArmor implementation
  • Log management and auditd configuration
  • Deploy and manage servers using Ansible
  • Remote command execution and configuration templating
  • Patch management and compliance checking

Tools & Technologies

Ubuntu Server
CentOS
Fedora
Ansible
UFW
iptables
Fail2Ban
Lynis
Bash
Python

Hands-on Projects

  • Deploy a 3-node Linux cluster with SSH hardening and central log collection
  • Automate server setup and firewall policies using Ansible playbooks
MONTH 3
30 Days15 Topics

Ethical Hacking

Topics Covered

  • Passive and active footprinting of target networks
  • DNS, WHOIS, port scanning, and enumeration
  • OSINT collection using automated tools
  • Service and vulnerability scanning across live systems
  • Banner grabbing, SMB enumeration, and SNMP analysis
  • Exploiting misconfigurations and weak services
  • Password cracking, privilege escalation, and backdoor setup
  • Exploiting Windows and Linux vulnerabilities in lab
  • Buffer overflow simulation and reverse shells
  • OWASP Top 10 hands-on (SQLi, XSS, CSRF, etc.)
  • Exploiting insecure APIs and misconfigured servers
  • Web defacement and security patching lab
  • Data exfiltration and persistence techniques
  • Rootkit detection and malware cleanup
  • Drafting vulnerability reports for stakeholders

Tools & Technologies

Kali Linux
Nmap
Metasploit Framework
Burp Suite
OWASP ZAP
Hydra
Nikto
DirBuster
John the Ripper
Hashcat

Hands-on Projects

  • Perform a full penetration test on a simulated enterprise environment
  • Conduct vulnerability scanning and generate a structured CVSS-based report
MONTH 4
30 Days16 Topics

Penetration Testing

Topics Covered

  • Scoping, engagement rules, and documentation
  • Target profiling and attack surface mapping
  • Manual and automated testing workflows
  • Advanced network exploitation using custom payloads
  • Exploiting firewalls, routers, and misconfigured DNS
  • Pivoting, tunneling, and lateral movement in enterprise labs
  • Deep web app exploitation with Burp Suite Pro
  • API hacking and fuzzing
  • SSRF, XXE, and command injection labs
  • Wi-Fi attacks: WPA2 cracking, evil twin, de-auth attacks
  • Testing IoT devices for firmware and API weaknesses
  • Coordinated Red vs Blue team exercise
  • Data exfiltration, stealth, and post-exploitation control
  • Compromise detection by Blue Team SOC
  • CVSS scoring and professional reporting
  • Creating management-level and technical reports

Tools & Technologies

Kali Linux
Metasploit
Burp Suite Pro
Nmap
Nessus
Cobalt Strike
Empire
Responder
Wireshark
OWASP ZAP
Aircrack-ng

Hands-on Projects

  • Conduct a full Red Team simulation with lateral movement and data exfiltration
  • Perform wireless penetration testing and IoT security assessment
MONTH 5
30 Days15 Topics

AWS & Azure Core

Topics Covered

  • Create and configure AWS & Azure accounts
  • Manage IAM users, groups, and roles
  • Set up billing, quotas, and cost monitoring
  • Launch and secure EC2 instances & Azure VMs
  • Configure EBS, S3, Blob storage, and snapshots
  • Attach and encrypt storage volumes
  • Design and deploy VPCs, subnets, and route tables
  • Configure VPN, NAT Gateway, and Load Balancers
  • Set up private connectivity between AWS & Azure
  • Implement role-based access and policies
  • Integrate MFA and conditional access
  • Audit permissions and API usage
  • Manage infrastructure using CLI & SDKs
  • Deploy multi-resource templates with Terraform and CloudFormation
  • Configure CloudWatch, Azure Monitor, and alerts

Tools & Technologies

AWS Console
Azure Portal
AWS CLI
Azure CLI
Terraform
CloudFormation
CloudWatch
Azure Monitor
VS Code

Hands-on Projects

  • Build a multi-tier application infrastructure across AWS and Azure
  • Deploy auto-scaling web applications with load balancing and monitoring
MONTH 6
30 Days15 Topics

AWS & Azure Security

Topics Covered

  • Enforce least-privilege IAM policies
  • Apply role separation and cross-account access control
  • Configure Azure AD Conditional Access and MFA
  • Build secure VPC architectures with firewalls and NACLs
  • Configure Security Groups and Azure NSGs
  • Enable private endpoints and restrict public exposure
  • Encrypt S3 buckets, Blob storage, and EBS volumes
  • Manage KMS keys and secret rotation
  • Apply DLP (Data Loss Prevention) policies
  • Configure AWS GuardDuty, CloudTrail, and Security Hub
  • Enable Azure Defender and Sentinel for threat analytics
  • Create alerts and automated incident workflows
  • Run AWS Config and Azure Policy audits
  • Identify misconfigurations and generate compliance reports
  • Automate remediation scripts

Tools & Technologies

AWS GuardDuty
AWS Security Hub
CloudTrail
Azure Defender
Microsoft Sentinel
Prisma Cloud
Wiz
Check Point CloudGuard

Hands-on Projects

  • Harden a multi-cloud infrastructure using GuardDuty & Defender
  • Implement security monitoring and auto-remediation policies
MONTH 7
30 Days14 Topics

Automation & SOC Tools

Topics Covered

  • Architecture of SOC and SIEM workflows
  • Log collection, parsing, and correlation setup
  • Understanding TTPs using MITRE ATT&CK
  • Deploy Splunk Enterprise Security and QRadar
  • Ingest data from cloud, network, and endpoint sources
  • Build dashboards for live alerting and event visualization
  • Automate alert triage using Cortex XSOAR or Phantom
  • Integrate SIEM data with playbooks
  • Write Python scripts for API-based threat enrichment
  • Develop YARA rules and Sigma signatures
  • Create correlation searches and anomaly detection logic
  • Build SOC runbooks for phishing and ransomware attacks
  • Assign severity, prioritize incidents, and track tickets
  • Automate response actions such as IP blocking or user isolation

Tools & Technologies

Splunk Enterprise Security
IBM QRadar
Microsoft Sentinel
Cortex XSOAR
Wazuh
ELK Stack
Python
YARA
Sigma

Hands-on Projects

  • Build a fully functional SOC using Splunk and Wazuh
  • Automate phishing detection and response using SOAR workflows
MONTH 8
30 Days19 Topics

Final Capstone Projects & Placement

Topics Covered

  • Deploy and manage Proxmox and VMware ESXi clusters
  • Create and snapshot virtual machines with resource optimization
  • Build and run containerized applications with Docker
  • Work with Dockerfiles, images, registries, and vulnerability scanning
  • Deploy multi-node Kubernetes clusters with security policies
  • Manage pods, deployments, RBAC, ConfigMaps, and Secrets
  • Deploy Prisma Cloud and Wiz for multi-cloud visibility
  • Integrate CrowdStrike Falcon and SentinelOne for EDR
  • Implement Zero Trust policies and conditional access
  • Build ML-based threat detection using Python & TensorFlow
  • Red Team: Conduct controlled exploitation with Metasploit and custom payloads
  • Blue Team: Detect intrusions, isolate compromised assets, restore services
  • Perform incident response, triage, evidence collection, and containment
  • Combine all modules: networking, Linux, cloud, SOC, and automation
  • Simulate ransomware, phishing, and insider threat attacks
  • Create executive summary, incident timeline, and remediation reports
  • CCNA, CEH, CompTIA Security+, AZ-500, AWS Security certification prep
  • Resume writing, LinkedIn optimization, and mock interviews
  • Access to placement drives and partner company interviews

Tools & Technologies

Docker
Kubernetes
Proxmox
VMware ESXi
Prisma Cloud
Wiz
CrowdStrike Falcon
Splunk
Metasploit
Python
Terraform
Ansible
GitHub

Hands-on Projects

  • Deploy microservices architecture using Docker and Kubernetes with security baseline
  • Execute Red Team vs Blue Team exercise with full incident response lifecycle
  • Complete full-scale enterprise cyber defense capstone project
  • Pass certification mock exams and participate in placement interview drives

Industry Certifications Covered

Prepare for leading industry certifications throughout the program

CCNA
Beginner
CompTIA Security+
Beginner
CEH
Advanced
AZ-500
Advanced
AWS Security
Advanced

Start Your Cybersecurity Journey Today

Join India's most comprehensive Cloud Security & Cybersecurity training program

Enroll Now via the contact page