Cybersecurity Operation Bootcamp
The training program is structured across 10 comprehensive modules.
Each participant will engage in an intensive boot camp format, focused heavily on practical, skills-based training. The modules incorporate a variety of learning methods to provide a dynamic and interactive experience, designed to foster contemporary and professional expertise.
Learners will be equipped to apply and integrate these skills into real-world work environments, particularly in roles such as cybersecurity analyst and cloud application security specialist.
Some learning outlines are attached here:
-
Learning Canvas
-
Case Studies Map
-
Classwork Role Play
-
Computer Lab
Syllabus as below:
-
Identity and Access Management (IAM) in Cloud Platforms
-
Configure and audit IAM policies across AWS, Azure, and GCP with MFA, least privilege, and role-based access.
-
-
Network Security and Application Security Configuration
-
Design secure virtual networks, set up network firewalls, application programming interface gateway and analyse traffic flows using advance analytic tools on API interactions.
-
-
SIEM Integration and Log Analysis
-
Deploy cloud-native or third-party SIEMs (e.g. Sentinel, Splunk) to ingest logs, apply correlation rules, and practice triage.
-
-
Malware Analysis and Endpoint Protection
-
Detonate malware samples in cloud sandboxes, extract indicators of compromise (IOCs), and configure EDR/XDR integrations.
-
-
Cloud Threat Simulation and Response
-
Launch attacks using simulation tools (e.g. Atomic Red Team) and analyse detections in SOC tooling, mapped to MITRE ATT&CK framework.
-
-
Vulnerability Scanning and Assessment
-
Perform scans with cloud-supported tools (e.g. Qualys, Nessus) and prioritize remediations based on National Vulnerability Database (NVD) and relevant commentary (e.g. CVSS score).
-
-
Policy and Risk Management Lab
-
Draft and apply cloud-specific policies aligned to Australian regulations (ASD Essential Eight), Payment Card Industry Data Security Standard (PCIDSS) and CompTIA-relevant risk controls.
-
-
Incident Response and Playbook Development
-
Simulate incidents (e.g. credential leak, unauthorized access) and execute automated playbooks using SOAR platforms.
-
-
Cloud Forensics & Evidence Collection
-
Use snapshots, audit logs, and metadata to trace attacker movement and preserve evidence for post-incident review, reconstruct attack path using tools like Postman.
-
-
SOC Analyst Cloud Simulation
-
Monitor and triage alerts, classify incidents, contextualise and correlation of events, document findings, and present after-action reports under time pressure.
-




