Welcome to CyberSecWings | New batches starting soon | Enroll now for best offers | Contact us for course details  โ€ข  Welcome to CyberSecWings | New batches starting soon | Enroll now for best offers | Contact us for course details  โ€ข 

Login

๐Ÿ”

Expand each block to see topics. Start here sets job-market context; modules 1โ€“6 build technical foundations; modules 7โ€“10 cover the Pre-Sales journey.

Start here โ€” How to get a job in cybersecurity (market view)
  • Types of roles in the market โ€” common cybersecurity job families and what employers expect.
  • Growing roles in the market โ€” high-demand areas and skill trends.
  • Average packages & demand โ€” realistic ranges and how demand varies by role, location, and experience.
  • Getting job-ready before college completion โ€” pathways: internships, projects, certifications, and how to align early with hiring signals.

Technical foundation

1 Network Fundamentals
  • What is a Network?
  • Types of Networks (LAN, WAN, MAN)
  • OSI Model (7 Layers)
  • TCP/IP Model
  • IP Addressing (IPv4, IPv6)
  • Subnetting (basic + practical)
  • MAC Address vs IP Address
  • DNS, DHCP, NAT
  • Ports & Protocols (HTTP, HTTPS, FTP, SSH, etc.)

Network Devices

  • Router
  • Switch
  • Firewall
  • IDS/IPS
2 Security Fundamentals
  • Authentication vs Authorization
  • Encryption Basics (Symmetric vs Asymmetric)
  • Hashing (MD5, SHA)
  • VPN Concepts
  • Firewalls (Types & Working)
3 Security Tools
  • Wireshark (Packet Analysis)
  • Nmap (Network Scanning)
  • Burp Suite (Web Testing Basics)
  • Metasploit (Intro)
  • Nessus / OpenVAS (Vulnerability Scanning)
  • EDR
  • Firewall
3-a SOC Analyst Skills
  • What is SOC?
  • Security Monitoring
  • Log Analysis
  • Alert Handling
  • Incident Detection
  • Use Cases & Correlation
3-b Incident Response & Handling
  • Incident Lifecycle
  • Detection โ†’ Analysis โ†’ Containment โ†’ Eradication โ†’ Recovery
  • Real-world scenarios
  • Reporting & Documentation
3-c Hands-on Labs / Projects (Must Have)
  • Network scanning lab
  • Packet capture analysis
  • Log investigation (SIEM)
  • Simulated SOC environment
  • Incident response scenario

Pre-Sales Excellence

4 Phase 1 โ€” The Technical Architecture
  • Identity & Access
  • Cloud Security
  • Data Protection
  • SecOps
  • AppSec & APIs
4-a Phase 2 โ€” RFP & Proposal Engineering
  • RFP anatomy โ€” analysing technical eligibility, SLA requirements, and functional compliance.
  • Compliance mapping โ€” translating product features into RBI guidelines, GDPR, ISO 27001, and NIST controls.
  • The technical annexure โ€” drafting detailed high-level designs (HLD).
  • Commercial strategy โ€” navigating QCBS (Quality-Cost Based Selection) and spotting hidden TCO (Total Cost of Ownership).
4-b Phase 3 โ€” The Strategic Pitch
  • Discovery mastery โ€” using the NEADS framework (Needs, Expectations, Authority, Delivery, Satisfaction) to surface client pain.
  • The 5-minute whiteboard โ€” live-drawing architecture from a “broken state” to a “secure state.”
  • Value-based selling โ€” moving from feature lists to risk quantification (e.g. potential loss vs. solution cost).
  • Executive storytelling โ€” pitching cyber resilience (not only “cyber security”) to the board.
4-c Final phase โ€” Are you ready for the market?
  • Mock RFP
  • Solution design & compliances
  • Presentation
Ask CyberBo
CYBERSECWINGS AI ×
Powered by clickiya.com ยท AI Assistant