CTE V1.0 L2 Cyber Tactics & Defense Expert – Level 2

Training Overview

 This intermediate-level course expands upon foundational cybersecurity knowledge, equipping participants with deeper technical skills in cyber defense and ethical exploitation. Through advanced hands-on labs and real-world scenarios, students will simulate attacks and defenses, analyze vulnerabilities, and learn to counteract modern cyber threats. An Industrial Internship Opportunity for 3 months after the successful completion of the Course

Learning Objectives:

  • Level 1 plus
  • Incident Response % Detection
  • Threat Landscape, Attack & Counter Measures
  • Threat Intelligence & Hunting
  • SOC Components and its Architecture
  • Network Security Solutions
  • Conduct advanced network reconnaissance and exploitation using industry-standard
  • Identify, exploit, and mitigate security vulnerabilities in systems and
  • Perform post-exploitation activities such as privilege escalation and
  • Harden systems and networks against known attack
  • Apply threat hunting and basic incident response
  • Understand adversarial tactics, techniques, and procedures (TTPs) based on frameworks like MITRE ATT&CK.

Topics Covered:

  • Incident Response % Detection
  • Threat Landscape, Attack & Counter Measures
  • Threat Intelligence & Hunting
  • SOC Components and its Architecture
  • Advanced Network & System Reconnaissance
  • Web Application Vulnerabilities (OWASP Top 10)
  • Exploitation Frameworks VAPT (e.g., Metasploit, Empire)
  • Privilege Escalation Techniques (Windows/Linux)
  • Lateral Movement & Pivoting Strategies
  • Real-World Exploitation Labs (CTF-Style Challenges)
  • Defense-in-Depth and Secure Architecture
  • Threat Hunting Basics and Indicators of Compromise (IoCs)
  • Log Analysis and Basic Incident Response
  • Plus 3 months Industrial Internship Programme 3 Months

Format:

  • Instructor-led hands-on training (in-person or virtual)
  • Heavily lab-based with simulated red blue team exercises
  • Final practical assessment or Capture-the-Flag (CTF) challenge

Target Audience:

  • Security analysts and IT professionals with basic cybersecurity experience
  • Graduates of Cyber Defense & Ethical Exploitations Level 1
  • Aspiring penetration testers and SOC team members
  • Red and blue team trainees

Prerequisites:

  • Completion of Level 1 or equivalent knowledge, or any network /application Security knowledge
  • Familiarity with basic command-line tools (Linux and/or Windows)
  • Understanding of networking, operating systems, and basic threat concepts

Duration:

  • 240 Hours (flexible based on delivery format) plus internship

Deliverables

Course Completion Certificates  

Candidate Eligibility for Level 2

 Candidate/Students may participate in Cyber Tactics – Level 2 Training by choosing either one of the options as follows Option 1 – If the student/candidate has no prior knowledge in cybersecurity they can join a 6 months program starting from Level 1

Minimum Requirements

Final-year undergraduates or graduates or postgraduates or Diploma in:
  • Cybersecurity
  • Information Technology
  • Computer Science or a related field
Option 2 – If they opt for a direct Level 2 program, they should meet the following conditions:

Minimum Requirements:

  1. Completion of Level 1 training (or equivalent coursework/projects) or any similar
  2. Technical know-how foundation in:
  • Strong Networking and system administration
  • Knowledge and understanding of Cyber attack methods and defensive tools