About This Course
Step into the world of enterprise security and modern cyber defense with this hands-on professional program. Designed for real infrastructure environments, this track teaches you how organizations secure their networks, servers, identities, cloud platforms, and users against modern attacks.
Prerequisites
- Completion of Track 3 & 4 or equivalent infrastructure experience
- Strong understanding of networking and system administration
- Familiarity with firewalls and basic security concepts
What You'll Learn
Understand enterprise security fundamentals: CIA triad, threat landscape, attack surfaces, and security controls.
Implement firewall, IDS/IPS, VLAN segmentation, DMZ, and VPN security in real environments.
Harden Windows & Linux servers with policies, encryption, SELinux/firewalld, and patch management.
Configure secure identity environments using AD, Azure AD, MFA, Conditional Access, and RBAC.
Master SOC workflows including log analysis, correlation, alerting, and incident lifecycle handling.
Run vulnerability assessments using Nmap, OpenVAS, Nessus; build mitigation and risk registers.
Learn cloud security tools like AWS GuardDuty, Security Hub, CloudTrail, and Azure Security Center.
Understand governance frameworks including ISO 27001, NIST CSF, GDPR, and policy documentation.
Apply Zero Trust principles, micro-segmentation, SASE, and modern security architecture.
Build a full enterprise security strategy as a capstone project combining Firewall + IAM + SIEM + Compliance.
10 key skills covered
6 Months intensive training
100% Job-ready curriculum
Course Curriculum
10 modules • 55 lectures
01
Security Foundation & Threat Landscape
6 lectures
What is Enterprise Security?
The CIA Triad (Confidentiality, Integrity, Availability)
Common Threat Types (Phishing, Malware, Ransomware, Insider Threats)
Attack Surface & Vulnerability Concepts
Security Controls (Preventive, Detective, Corrective)
Hands-On: Identify Security Gaps in a Sample Network
02
Network & Perimeter Security
6 lectures
Firewalls: Concepts, NAT, ACLs
IDS/IPS: Intrusion Detection & Prevention Systems
VLAN Segmentation & DMZ Architecture
VPN Security (IPSec, SSL)
pfSense / FortiGate Firewall Configuration
Hands-On: Build a Secure DMZ + VPN Lab
03
Endpoint & Server Security
5 lectures
Hardening Workstations & Servers
Windows Security Policies, BitLocker, Group Policy Controls
Linux Hardening (SELinux, firewalld, Fail2Ban)
Patch Management Strategy
Hands-On: Secure a Windows Server + Linux VM
04
Identity & Access Management (IAM)
5 lectures
Role-Based Access Control (RBAC)
Active Directory Security Best Practices
Azure AD Security Features (MFA, Conditional Access, Identity Protection)
Least Privilege Principle & Audit Policies
Hands-On: Configure Secure IAM on Azure AD
05
SOC Operations & SIEM Tools
5 lectures
What is a SOC (Security Operations Center)?
SIEM Fundamentals (Logs, Correlation, Alerts)
Tools Overview: Splunk, Wazuh, Graylog, Security Onion
Incident Response Lifecycle (NIST Framework)
Hands-On: Deploy Wazuh and Analyze Real Logs
06
Vulnerability Management & Risk Assessment
6 lectures
Vulnerability vs Threat vs Risk
VA/PT Process Overview
Tools: Nmap, OpenVAS, Nessus (Intro)
Patch and Mitigation Workflow
Risk Register & Prioritization
Hands-On: Run Network Scan & Create Risk Report
07
Cloud & Virtualization Security
6 lectures
Shared Responsibility Model in Cloud
AWS Security Tools (GuardDuty, Security Hub, CloudTrail)
Azure Security Center
VM Snapshot Security & Encryption
Backup and DR Security Controls
Hands-On: Audit a Cloud Environment Using Security Hub
08
Security Governance & Compliance
6 lectures
Security Policies, SOPs, and Governance Layers
ISO 27001 Controls Overview
NIST Cybersecurity Framework (CSF)
GDPR & Data Privacy Concepts
Documentation Templates: Policy, SLA, Security Checklist
Hands-On: Create a Mini Security Policy Set
09
Zero Trust Architecture & Modern Defense
5 lectures
Why Perimeter-Based Security Fails
Zero Trust Principles (Verify, Never Trust, Always Monitor)
Micro-Segmentation & Identity-Aware Proxy
SASE (Secure Access Service Edge) Model
Hands-On: Design a Zero Trust Network Layout
10
Incident Response & Capstone Project
5 lectures
Incident Response Phases (Detect → Contain → Recover → Review)
Security Forensics & Root Cause Analysis
Real Case Studies: Ransomware & Insider Breach
Final Project: Build Security Strategy for a 3-Tier Infrastructure
Include Firewall, IAM, SIEM, and Compliance Layers
Who Should Join This Course
Track 3 & Track 4 graduates aiming to step into L2/L3 security engineering roles.
System, Network, or Cloud Engineers ready to specialize in security and threat defense.
IT Service Desk or Technical Support Engineers who want to move beyond L1 roles.
Professionals working in NOC/operations who want to progress into SOC environments.
BPO professionals with tech process experience wanting a high-growth cybersecurity career.
Non-coding IT aspirants who want to work in defense, monitoring, and security operations.
Individuals pursuing roles like Security Analyst, SOC Analyst, Firewall Engineer, or VA/PT Analyst.
Anyone preparing for future paths like Security Architect, Compliance Lead, or Cyber Defense Specialist.
No IT background? No problem – we start from basics!
Course Description
This program gives you the practical foundation needed to:
- ¢ Detect, analyze, and mitigate security threats in real SOC workflows
- ¢ Configure firewalls, DMZ architectures, VPN tunnels, and IDS/IPS systems
- ¢ Harden Windows/Linux servers and enforce enterprise security baselines
- ¢ Use SIEM tools like Wazuh, Splunk, Graylog, and Security Onion for log monitoring
- ¢ Perform vulnerability scans, generate reports, and build remediation plans
- ¢ Secure cloud resources using AWS and Azure security tools
- ¢ Apply frameworks such as ISO 27001, NIST, GDPR, and Zero Trust for compliance-based environments
From the very first modules, you'll work with live firewall systems, SIEM dashboards, cloud security tools, and IAM platforms — giving you real operational experience, not just theory.
By the end of this program, you will be capable of building a complete security strategy for a 3-tier enterprise infrastructure, including: Firewall policies, Secure IAM, SIEM monitoring, Vulnerability mitigation, and Compliance documentation.
This track opens doors to cybersecurity roles across IT, cloud, and enterprise infrastructure and prepares you for high-demand roles in India and abroad.