
Cybersecurity
Step into the world of digital defense with a program designed to shape the next generation of cybersecurity leaders. Gain the skills to detect threats, secure systems, and protect data in an increasingly connected world. Whether you’re starting your tech career or looking to specialize, this program will prepare you for one of the most in-demand roles in the tech industry.
🗓 Starting Date: December 1st, 2025
Learn, Protect, and Lead
1Who is this program for?
This specialization is ideal for:
- For developers or IT professionals ready to specialize in cybersecurity and boost their tech careers.
- Already familiar with programming (Python, C, JavaScript), data structures, and algorithms.
- Comfortable with system administration basics (Linux, networking, scripting).
- Want to specialize in cybersecurity to boost their professional profile.
🔥 If you’re ready to protect what matters, lead with confidence, and stand at the front lines of digital defense, this is your next move.
2After this program you will be able to:
- Detect and respond to real-world cyber threats.
- Protect networks, systems, and applications.
- Build secure infrastructures and enforce best practices.
- Apply for roles like Security Analyst or Network Security Engineer.
3Requirements
Before joining the Cybersecurity program, candidates must meet certain technical and motivational requirements to ensure success throughout the training.
- Basic programming and IT knowledge (Python, systems, networks)
- Motivation to grow in the cybersecurity field
- Pass a technical quiz and interview
If you’re new to coding, we recommend starting with our Software Development Program to build the right foundation before diving into advanced topics.
- For developers or IT professionals ready to specialize in cybersecurity and boost their tech careers.
Curriculum
Master Cybersecurity from Day One! Learn how to protect, hack, and investigate systems with hands-on training in network security, ethical hacking, reverse engineering, and more.
Module 1
- Introduction To Cyber Security
- Networking Introduction - reading
- Linux Security Basics
- Passive Reconnaissance
- Active Reconnaissance
- Packets and Frames - reading
- Nmap Live Host Discovery
- Wireshark Basics
- Web Fundamentals
- OWASP Top 10
- BurpSuite-Fundamentals
- SQL,noSQL Injection
- Content Discovery
- Upload Vulnerability
- Cryptography Basics
- Permissions, SUD & SGID
- Mandatory Access Control
- Protocols & Servers
- Offensive vs Defensive Security
- Forensic Ethics & Methodologies
Module 2
- Nmap Advanced Port Scans
- Insecure Direct Object Reference
- File Inclusion
- Command Injection (CVE-2021-44228
- Explained)
- Buffer Overflow
- Web Application Fast Incident Response
- Web Application Forensics
- Nmap Post Port Scan & Scripting
- Server-Side Request Forgery
- Understanding vulnerabilites-Reading
- Understanding vulnerabilites-Exploitation
- CVE, CWE, and NVD
- Nessus
- Ruby Scripting (Cyber)
- Metasploit-basics
- Metasploit-Scripting
- Advanced Web Attack Techniques
- Active Directory - Fundamentals
- Active Directory - Enumeration
- Active Directory - Exploitation
- Active Directory - Forensics
- Active Directory -Hardering
Module 3
- What the shell?
- Linux Privilege Escalation
- Windows Privilege Escalation
- Acces Presistence Techniques
- Reverse Engineering Fundamentals
- Static Analysis in Reverse Engineering
- Dynamic Analysis in Reverse Engineering
- Malware Analysis in Reverse Engineering
- Mobile Application Fundamentals and Security
- Static Analysis In Mobile Security
- Dynamic analysis In Mobile Security
- Ethics in Cybersecurity
- ISO 2700X
- NIST
- General Data Protection & Privacy
Certifications
Discover the certifications you can earn in each module:
Module 1
Network Security Basics
CompTIASecurity+
/eJPT
Linux Security
CompTIA
Linux+
Module 2
Certified Ethical Hacker
(CEH)
Network Security Advanced
CompTIA
Network+
Cisco
CCNA
Web Application Security Advanced
Certified Web
Application Penetration
Tester (GWAPT)
Module 3
Offensive Security Certified Profession al (OSCP)
Offensive Security Certified Web (OSWE)
Windows Active Directory Security
GIAC Certified WindowsSecurity
Administrator (GCWN)
Reverse Engineering
Certified Reverse Engineering Analyst
(CREA)
Cybersecurity Laws & Ethics
Certified Information Privacy
Professional (CIPP)
Offensive Security Certified Expert (OSCE)
Certified Information Systems Security
Professional (CISSP)
Ready to take the next step in your tech career?
Copyright © Coderise.org a non-profit - Coderise International