By Rajneesh Gupta
Elevate your career in cybersecurity with this 90 Days Challenge, covering 9 Challenges(~40 Hands-on Tasks) to upskill yourself.
Reserve a seat before Dec 31, 2024 to unlock Bonuses worth ₹1200
Security Investigation of Ubuntu Machine using Splunk
This challenge includes five practical tasks involving Splunk setup, attack simulation, investigation, and incident response, with one assignment for each task.
Security Investigation of Windows Machine using Splunk
This challenge involves practical tasks on investigating Windows security events with Splunk, including analysis and incident response, with one assignment per task.
Security Investigation on Ubuntu Machine using ELK SIEM
This challenge includes practical tasks using ELK SIEM for investigating security incidents on Ubuntu systems, with one assignment for each task.
Security Investigation of Windows Machine using ELK SIEM
This challenge focuses on analyzing security events on Windows machines using ELK SIEM, with practical tasks and one assignment per task.
Malware Traffic Analysis using Wireshark
This challenge includes practical tasks for identifying and analyzing malware traffic patterns using Wireshark, with one assignment per task.
Practical Threat Hunting using Velociraptor
This challenge involves practical threat hunting tasks using Velociraptor to identify security threats, with one assignment per task.
Practical Threat Hunting using Osquery
This challenge includes practical tasks for threat hunting and investigation using Osquery, with one assignment for each task.
AWS Cloud Security Investigation with Splunk
This challenge focuses on security investigation tasks for AWS Cloud environments using Splunk, with one assignment per task.
Security Automation with Splunk SOAR
This challenge involves practical tasks for automating security operations using Splunk SOAR, with one assignment for each task.
This course encompasses the basics of SOC, Processes, roles, responsibilities, career paths, etc
This course talks about basics of Networking such as OSI, TCP/IP, Router, Switches, Firewall etc
This course covers understanding of Windows server, Active directory, Linux and AWS cloud.
This course talks about basic security concepts, Cryptography and important terms.
This course focuses on Intro to Splunk, setting up Splunk Lab, Types of Splunk queries, Splunk Use cases etc
To understand from the experts get your hands on exclusive real life case studies.
This course talks about different phishing attacks, working of email systems, email header analysis and use cases etc
This course includes intro to Digital forensics, incident response process, windows forensics etc
This course includes intro to Digital forensics, incident response process, network forensics etc
To understand from the experts get your hands on exclusive real life case studies.
Get access to my private exclusive streams and community group today.
To understand from the experts get your hands on exclusive real life case studies.
Limited spots! Grab yours now!
Cybersecurity Consultant and Author
Rajneesh Gupta is a seasoned cybersecurity expert with 11 years of experience specializing in open-source security, security monitoring, cloud security, security audit and red teaming exercises. He has played a pivotal role in building and automating Security Operation Centers (SOC) for hundreds of businesses globally, conducting security audits, and guiding on frameworks and compliances. A CISA-certified professional, Rajneesh is also passionate about mentoring, having helped numerous individuals kickstart their careers in cybersecurity.
He is the author of "Hands-on with Cybersecurity and Blockchain," showcasing his expertise in the field. Outside of work, Rajneesh enjoys spending time in hill stations and playing volleyball
Elevate your cybersecurity career with our Ultimate Security analyst course, designed specifically for IT professionals ready to make their mark as security analysts.
To understand from the experts get your hands on exclusive real life case studies.
Specializes in addressing and mitigating cybersecurity incidents, conducting forensic analysis to understand the breach and prevent future attacks
Designs, builds, and maintains security solutions to protect against cyber threats, including firewalls, anti-virus software, and encryption technologies.
To understand from the experts get your hands on exclusive real life case studies.
To understand from the experts get your hands on exclusive real life case studies.
To understand from the experts get your hands on exclusive real life case studies.
Get access to my private exclusive streams and community group today.
To understand from the experts get your hands on exclusive real life case studies.
Get access to my private exclusive streams and community group today.
To understand from the experts get your hands on exclusive real life case studies.
Get access to my private exclusive streams and community group today.
To understand from the experts get your hands on exclusive real life case studies.
The challenge is a comprehensive 90-day program that provides hands-on experience with tools and techniques used by Security Analysts. Participants will work on real-world scenarios to strengthen their security investigation and threat-hunting skills.
This challenge is ideal for aspiring Security Analysts, IT professionals transitioning into cybersecurity, or anyone wanting to enhance their skills in security operations, investigation, and threat detection..
You will learn how to investigate security incidents, analyze traffic, conduct threat hunting, automate security operations, and enhance your skills in both on-premise and cloud environments using industry-leading tools.
The challenge is self-paced, allowing participants to progress according to their own schedule. However, we offer support through a community forum and regular live Q&A sessions.
Yes, this challenge is perfect for Security Analysts looking to sharpen their skills and gain practical experience with new tools and techniques in the field.
You will have access to a community forum, where you can ask questions, share insights, and collaborate with other participants. Additionally, there will be periodic live Q&A sessions for direct interaction with instructors.
Yes, upon successful completion of the 90-day challenge, you will receive a certificate recognizing your achievements and demonstrating your newly acquired skills.
The system requirements for the challenge are an Intel Core i7 or AMD equivalent processor, 16 GB RAM (32 GB recommended), 100 GB SSD storage, and Windows 10/11 or Ubuntu 20.04/22.04 LTS with virtualization enabled and a stable internet connection.