Skip to main content
EventsHackathons

Security

Secure the Digital Frontier with Ethical Hacking & Defense

Duration
20-30 wks
Modules
5 total
Careers
6 paths
Mentors
4 experts

Prerequisites

Linux Command Line
Basic Networking
Programming Fundamentals
Understanding of Web Technologies

Learning Path

Module 01
2-3 weeks

Security Fundamentals

Understand core security concepts, CIA triad, and threat landscapes.

CIA TriadThreat ModelingRisk AssessmentSecurity PoliciesCompliance
Module 02
3-4 weeks

Network Security

Master network protocols, firewalls, IDS/IPS, and network monitoring.

WiresharkNmapFirewallsVPNIDS/IPSPacket Analysis
Module 03
4-5 weeks

Web Application Security

Find and exploit web vulnerabilities: XSS, SQLi, CSRF, and more.

SQL InjectionXSSCSRFBurp SuiteOWASP ZAPAPI Security
Module 04
4-5 weeks

Penetration Testing

Conduct ethical hacking engagements with professional methodology.

Kali LinuxMetasploitPrivilege EscalationPost-ExploitationReporting
Module 05
3-4 weeks

Security Engineering

Build secure systems, implement DevSecOps, and security automation.

SIEMDevSecOpsSecurity AutomationIncident ResponseThreat Intelligence

Career Paths

Penetration Tester
Security Engineer
SOC Analyst
Security Architect
Bug Bounty Hunter
CISO

Expert Mentors

Rahul Sasi

Rahul Sasi

Security Researcher

Priyanka Bose

Priyanka Bose

Penetration Tester

Varun Sharma

Varun Sharma

SOC Analyst at Microsoft

Ananya Reddy

Ananya Reddy

Bug Bounty Hunter

Begin Your
Evolution

Join the most elite community of engineers. We provide the roadmap, you provide the grind.

Enter The Arena