In this course, students will learn the fundamental concepts, tools, and techniques that power modern cybersecurity operations. Students will explore real-world attacks and defenses, gaining hands-on experience with network monitoring, incident response, digital forensics, and security automation.
By the end of the program, students will understand how to detect, analyze, and respond to cyber threats — the same skills used daily by Security Operations Center (SOC) analysts and cybersecurity professionals.
The Software Development Pathway will cover the following topics:
Foundations of Cybersecurity
- Core security principles and terminology
- Understanding assets, vulnerabilities, and threats
- Security frameworks and compliance (NIST, ISO 27001)
- Networking fundamentals for security professionals
Threats, Attacks, and Defense
- Phishing, malware, and social engineering
- Endpoint and network hardening
- Firewall configuration and defense-in-depth
- Incident detection and containment
Incident Response and Forensics
- Incident response lifecycle
- Analyzing network traffic with Wireshark
- Memory and disk forensics using Autopsy and Volatility
- Writing technical and executive incident reports
Security Operations and Automation
- STEM operations using ELK Stack
- Log analysis and alert tuning
- Vulnerability scanning with Nessus/OpenVAS
- Python scripting for automation and log parsing
Advanced Topics
- Ethical hacking and penetration testing fundamentals
- Zero Trust architecture and network segmentation
- Threat intelligence and OSINT (Shodan, Maltego)
- Continuous monitoring and security policy development
Projects Suited for the cybersecurity pathway
Incident Response Simulation
Investigate a simulated ransomware attack on a fictional company. Students analyze PCAPs, logs, and forensic artifacts to identify the infection vector, scope, and impact. Deliverables include a full incident report and executive summary.
Network Defense Lab
Design and secure a small enterprise network using firewalls, hardening techniques, and vulnerability scans. Students demonstrate how to detect and mitigate attacks in real time.
SOC Dashboard and SIEM Analytics
Configure an ELK stack to collect and visualize security logs. Students build dashboards to monitor suspicious activity, detect brute-force attempts, and create alerts for potential intrusions.
Phishing Analysis and Awareness Campaign
Perform a phishing simulation, analyze results, and create an awareness plan for employees. This project combines social engineering analysis with practical defensive communication.





