Untitled Page 1713866610408-dummyasset

Ultimate Security Analyst + 90 Days Security Challenge(Basic to Pro)

Elevate your career in cybersecurity with these 13+ courses and 8 real-world projects to land your first security job or upskill confidently.

What are you going to learn?

1: Introduction to Cybersecurity

This course encompasses the basics of SOC, Processes, roles, responsibilities, career paths, etc

2: IT Networking

This course talks about basics of Networking such as OSI, TCP/IP, Router, Switches, Firewall etc

3: Server and Cloud Fundamentals

This course covers understanding of Windows server, Active directory, Linux and AWS cloud.


4: Security Fundamentals

This course talks about basic security concepts, Cryptography and important terms.


5: Hands-on with Splunk SIEM

This course focuses on Intro to Splunk, setting up Splunk Lab, Types of Splunk queries, Splunk Use cases etc

7: Phishing Analysis

This course focuses on Intro to Splunk, setting up Splunk Lab, Types of Splunk queries, Splunk Use cases etc

9: Network Investigation

This course focuses on Intro to Splunk, setting up Splunk Lab, Types of Splunk queries, Splunk Use cases etc

11: Vulnerability Management

This course focuses on Intro to Splunk, setting up Splunk Lab, Types of Splunk queries, Splunk Use cases etc

6: Threat Intelligence

Learn about threat intelligence techniques, MITRE ATT&CK etc

8: Endpoint Investigation

This course includes intro to Digital forensics, incident response process, windows forensics etc

10: Malware Analysis

This course includes intro to Digital forensics, incident response process, windows forensics etc

12: Penetration Testing Basics

This course includes intro to Digital forensics, incident response process, windows forensics etc

That's not All!
Lets take a look at  90 Days Security Projects(Basics to Pro)

Project#1

Security Investigation of Ubuntu Machine using Splunk

This challenge includes five practical tasks involving Splunk setup, attack simulation, investigation, and incident response, with one assignment for each task.


Project#3

Security Investigation on Ubuntu Machine using ELK SIEM

This challenge includes practical tasks using ELK SIEM for investigating security incidents on Ubuntu systems, with one assignment for each task.

Project#5

Malware Traffic Analysis using Wireshark

This challenge includes practical tasks for identifying and analyzing malware traffic patterns using Wireshark, with one assignment per task.


Project#7

Practical Threat Hunting on Windows

This challenge includes practical tasks for threat hunting and investigation using Osquery, with one assignment for each task.


Project#2

Security Investigation of Windows Machine using Splunk

This challenge involves practical tasks on investigating Windows security events with Splunk, including analysis and incident response, with one assignment per task.

Project#4

Security Investigation of Windows Machine using ELK SIEM

This challenge focuses on analyzing security events on Windows machines using ELK SIEM, with practical tasks and one assignment per task.


Project#6

Practical Threat Hunting on Linux

This challenge involves practical threat hunting tasks using Velociraptor to identify security threats, with one assignment per task.


Project#8

Web App Penetration testing

This challenge include exploiting vulnerabilities of different vulnerable applications like bWAPP, OWASP Mutillidae, DVWA etc

Who is it for?

Don’t just take our word for it

This program completely changed the game for me! The hands-on challenges and real-world tasks gave me the confidence I needed to land my first SOC Analyst role. The video lessons were simple to follow, and the weekly Q&A sessions were a lifesaver for clearing my doubts. If you're serious about cybersecurity, this is the way to go!

Sayantan ChandraSOC Analyst

I’ve been working as a SOC Analyst for a while, but this program took my skills to the next level. The practical exercises, like investigating threats with Splunk and ELK SIEM, felt just like the real thing. I even impressed my manager by applying what I learned to a live incident. This course is gold for anyone in the field!

Ajay Sharma
Security Analyst

Switching to cybersecurity felt overwhelming at first, but this program made it so much easier. The step-by-step guidance was spot on, and the weekly Q&A sessions really helped me stay on track. The challenges were tough but rewarding, and now I feel ready to make the leap into cybersecurity.

Airish Shashidharan
SOC Analyst

I’ve taken other courses before, but nothing comes close to this one. The hands-on projects, like analyzing malware traffic with Wireshark and exploring tools like Velociraptor, were so immersive. It’s perfect for anyone who’s serious about growing their skills and making a real impact in cybersecurity.

Taylor Pierce
Helpdesk Engineer

The weekly Q&A calls were such a highlight for me – the instructors were super approachable and really knew their stuff. The challenges, especially the AWS Cloud Security Investigation, were eye-opening. I’ve gained so much confidence, and I know I’m ready to tackle any SOC role now

Casey James
Security Engineer

I had no idea where to start with cybersecurity until I found this program. The way it was structured – starting with the basics and moving to real-world challenges – made learning so much fun. By the end, I felt equipped with the skills and confidence to finally go after my dream career in cybersecurity!

Amol Patekar
SOC Analyst

What would you get?

QnA Sessions

Resolve your query with our mentor on wide
range of topics such as

  • Lab Set up Issue
  • Career Guidance
  • Technical challenges
  • Implementation issue

asset
asset

90 Days Security Projects

You will get all the resources to complete your 90-day security challenger including

  • Lab Manual from github
  • Recorded videos
  • Sample log files
  • Many more

Live Group Chat 

Resolve your query with our mentor on wide
range of topics such as

  • Lab Set up Issue
  • Career Guidance
  • Technical challenges
  • Implementation issue

asset

Meet your Mentor

Rajneesh Gupta

Cybersecurity Consultant and Author

Rajneesh Gupta is a seasoned cybersecurity expert with 11 years of experience specializing in open-source security, security monitoring, cloud security, security audit and red teaming exercises. He has played a pivotal role in building and automating Security Operation Centers (SOC) for hundreds of businesses globally, conducting security audits, and guiding on frameworks and compliances. A CISA-certified professional, Rajneesh is also passionate about mentoring, having helped numerous individuals kickstart their careers in cybersecurity.

He is the author of "Hands-on with Cybersecurity and Blockchain," showcasing his expertise in the field. Outside of work, Rajneesh enjoys spending time in hill stations and playing volleyball



Get certified

Elevate your cybersecurity career with our Ultimate Security analyst course, designed specifically for IT professionals ready to make their mark as security analysts.


  • Enhance Professional Credibility
  • Unlock Career Opportunity
  • Increase earning Potential
  • Expand Professional network

Enroll Now

What roles will you be prepared for?

SOC Analyst-1

To understand from the experts get your hands on exclusive real life case studies.

SOC Analyst-2

Specializes in addressing and mitigating cybersecurity incidents, conducting forensic analysis to understand the breach and prevent future attacks

Security Engineer

Designs, builds, and maintains security solutions to protect against cyber threats, including firewalls, anti-virus software, and encryption technologies.

Threat Hunter

Specialized in proactive threat hunting using different hypothesis, MITRE ATT&CK framework etc

Security Analyst

Responsible for Security operations, vulnerability management and some level of offensive security activities too.

DFIR Engineer

Responsible for Digital forensics of endpoint. server, cloud and performing incident response to mitigate threats.

Exclusive bonuses for Free

Community Access

Get access to my private exclusive streams and community group today.

worth₹2,999

3 Case Studies

To understand from the experts get your hands on exclusive real life case studies.

worth₹2,999

Community Access

Get access to my private exclusive streams and community group today.

worth₹2,999

3 Case Studies

To understand from the experts get your hands on exclusive real life case studies.

worth₹2,999

Community Access

Get access to my private exclusive streams and community group today.

worth₹2,999

3 Case Studies

To understand from the experts get your hands on exclusive real life case studies.

worth₹2,999

FAQs

What are these 90 Days Security Challenge?

These projects are a comprehensive real-world, scenario-based  & hands-on experience with tools and techniques used by Security Analysts. Participants will work on real-world scenarios to strengthen their security investigation and threat-hunting skills.


Who is this challenge suitable for?

This challenge is ideal for aspiring Security Analysts, IT professionals transitioning into cybersecurity, or anyone wanting to enhance their skills in security operations, investigation, and threat detection..


What will I learn from this capstone projects?

You will learn how to investigate security incidents, analyze traffic, conduct threat hunting, automate security operations, and enhance your skills in both on-premise and cloud environments using industry-leading tools.


Can I join if I’m already working as a Security Analyst?

Yes, this challenge is perfect for Security Analysts looking to sharpen their skills and gain practical experience with new tools and techniques in the field.

Will I receive a certificate after completing the challenge?

Yes, upon successful completion of the 90-day challenge, you will receive a certificate recognizing your achievements and demonstrating your newly acquired skills.

Is the challenge self-paced or instructor-led?

The challenge is self-paced, allowing participants to progress according to their own schedule. However, we offer support through a community forum and regular live Q&A sessions.


What kind of support is available for these projects?

You will have access to a community forum, where you can ask questions, share insights, and collaborate with other participants. Additionally, there will be periodic live Q&A sessions for direct interaction with instructors.

What are the system requirements for the challenge?

The system requirements for the challenge are an Intel Core i7 or AMD equivalent processor, 16 GB RAM (32 GB recommended), 100 GB SSD storage, and Windows 10/11 or Ubuntu 20.04/22.04 LTS with virtualization enabled and a stable internet connection.