top of page

    Cybersecurity Operation Bootcamp

    The training program is structured across 10 comprehensive modules.

    Each participant will engage in an intensive boot camp format, focused heavily on practical, skills-based training. The modules incorporate a variety of learning methods to provide a dynamic and interactive experience, designed to foster contemporary and professional expertise.

    Learners will be equipped to apply and integrate these skills into real-world work environments, particularly in roles such as cybersecurity analyst and cloud application security specialist.

    Some learning outlines are attached here:

    • Learning Canvas

     

     

     

     

     

     

     

     

     

    • Case Studies Map

    • Classwork Role Play

    • Computer Lab
       

    Syllabus as below:

    • Identity and Access Management (IAM) in Cloud Platforms  
      • Configure and audit IAM policies across AWS, Azure, and GCP with MFA, least privilege, and role-based access.

    • Network Security and Application Security Configuration  
      • Design secure virtual networks, set up network firewalls, application programming interface gateway and analyse traffic flows using advance analytic tools on API interactions.

    • SIEM Integration and Log Analysis 
      • Deploy cloud-native or third-party SIEMs (e.g. Sentinel, Splunk) to ingest logs, apply correlation rules, and practice triage.
    • Malware Analysis and Endpoint Protection 
      • Detonate malware samples in cloud sandboxes, extract indicators of compromise (IOCs), and configure EDR/XDR integrations.
    • Cloud Threat Simulation and Response
      • Launch attacks using simulation tools (e.g. Atomic Red Team) and analyse detections in SOC tooling, mapped to MITRE ATT&CK framework.

    • Vulnerability Scanning and Assessment
      • Perform scans with cloud-supported tools (e.g. Qualys, Nessus) and prioritize remediations based on National Vulnerability Database (NVD) and relevant commentary (e.g. CVSS score).

    • Policy and Risk Management Lab
      • Draft and apply cloud-specific policies aligned to Australian regulations (ASD Essential Eight), Payment Card Industry Data Security Standard (PCIDSS) and CompTIA-relevant risk controls.

    • Incident Response and Playbook Development
      • Simulate incidents (e.g. credential leak, unauthorized access) and execute automated playbooks using SOAR platforms.

    • Cloud Forensics & Evidence Collection
      • Use snapshots, audit logs, and metadata to trace attacker movement and preserve evidence for post-incident review, reconstruct attack path using tools like Postman.

    • SOC Analyst Cloud Simulation 
      • Monitor and triage alerts, classify incidents, contextualise and correlation of events, document findings, and present after-action reports under time pressure.

    Module 9.2 Learning Canvas.png
    Bootcamp.png

    Contact Us

    Tel. +61 405 406 303

    © 2025 by Innovate and Generate. Powered and secured by Wix

    bottom of page