Invite a friend, they save 10% instantly Plus redeem Amazon vouchers after their enrollment.
Cyber Security Engineer — Master’s Course
Course Preview
Course Materials

Course Features

Duration Self-paced
Level Beginner
Language English
Mode Online
Cybersecurity

Cyber Security Engineer — Master’s Course

Master practical Cybersecurity: networking & protocols, DNS/LAN/WAN, OSPF/BGP, security tooling (Nmap, Snort, tcpdump, Wireshark), vulnerability scanning (Nessus/OpenVAS), OWASP & web security (Burp Suite), IBM Security overview, HIDS/HIPS & IDS/IPS, Active Directory hardening, SIEM setup, cloud security (Azure/AWS), GitHub & collaboration, database security (SSMS/MySQL, AWS RDS), reporting (Word/Excel), Visio diagrams, DNS/DHCP hardening, VPNs, incident response, soft skills, and a real capstone. Includes 1:1 mentorship and mock interview prep.

Last updated December 2025
Next cohort starts Oct 1st
$1,200.00 $1,500.00
Save 20% - Limited Time Offer!

Become a job-ready Cyber Security Engineer. Learn to protect networks, systems, and data using industry-standard methods across networking, security tools, vulnerability assessment, monitoring, cloud, and incident response.

  • Networking & Protocols: TCP/IP, IPv4, VPN, HTTP/HTTPS; DNS, LAN/WAN; routing with OSPF & BGP
  • Security Tooling: Nmap, Snort, tcpdump, Wireshark; vulnerability scans with Nessus & OpenVAS
  • Web & App Security: OWASP practices; Burp Suite; IBM Security tools overview
  • Defense & Identity: HIDS/HIPS & IDS/IPS; hardening Active Directory
  • Monitoring: SIEM concepts, setup, and configuration
  • Cloud & Infra: Security in Azure & AWS; VPNs; DNS/DHCP hardening
  • Data & Reporting: Database security (SSMS/MySQL, AWS RDS); documentation & reports in Word/Excel; network diagrams in Visio
  • Professional: collaboration (SharePoint/Confluence/GitHub), incident response planning, communication & problem-solving, and mock interview preparation

Finish with a capstone security project applying assessments, controls, monitoring, and reporting to a real-world scenario.

1:1 Personalized Mentorship
Mock Interview Preparation
Networking & Protocols (TCP/IP, IPv4, VPN, HTTP/HTTPS)
DNS, LAN/WAN, OSPF & BGP
Nmap, Snort, tcpdump, Wireshark
Nessus & OpenVAS vulnerability scans
OWASP & Burp Suite web security
HIDS/HIPS & IDS/IPS
Active Directory security
SIEM setup & configuration
Azure & AWS security practices
GitHub, SharePoint & Confluence collaboration
Database security (SSMS/MySQL, AWS RDS)
MS Word/Excel reporting; Visio diagrams
DNS/DHCP hardening; VPN implementation
Incident response planning & handling
Capstone project
Cyber Security Overview
Roles & Responsibilities
Why Security Matters
Core Concepts & Terms
TCP/IP Model
IPv4 Addressing & Subnetting
VPN & Secure Communication
HTTP vs HTTPS
DNS Basics
LAN & WAN Concepts
OSPF: Interior Routing
BGP: Basics
Network Scanning with Nmap
Intrusion Detection with Snort
Packet Capture with tcpdump
Traffic Analysis with Wireshark
Nessus: Setup & Scans
OpenVAS: Setup & Scans
Interpreting Vulnerability Reports
Core Impact: Penetration Testing
Burp Suite: Web Security Testing
OWASP Security Practices
IBM Security Tools Overview
HIDS/HIPS Overview
Network IDS/IPS
Deploying Detection & Prevention
AD Basics & Threats
Hardening Active Directory
Admin & Monitoring Practices
SIEM Concepts & Value
Setting Up & Configuring SIEM
Use Cases & Dashboards
Azure Security Practices
AWS Security Tools & Best Practices
Cloud Security Architecture Overview
SQL Server (SSMS): Security Basics
MySQL: Users, Roles & Policies
Securing Databases in AWS RDS
MS Word: Security Reporting
MS Excel: Findings & Metrics
Effective Security Analytics
Visio Basics for Network Diagrams
Documenting Topologies & Controls
Perimeter & Internal Controls
Monitoring & Hardening Playbooks
OWASP Top 10 Overview
Implementing HTTPS & TLS
Common Web Vulns & Mitigations
Securing DNS Servers
Best Practices for DHCP Security
VPN Designs & Choices
Implementing & Testing VPNs
Incident Response Plan
Team Roles & Responsibilities
Steps in Incident Handling
Analyzing Security Incidents
SharePoint & Confluence
GitHub for Security Projects
Effective Communication
Critical Thinking & Problem Solving
Defining Scope & Objectives
Security Assessments & Controls
Implementing Measures & Monitoring
Presenting Outcomes & Reporting
Project: Capstone: Cyber Security Project