
CTE V1.0 L2 Cyber Tactics & Defense Expert – Level 2
Training Overview
This intermediate-level course expands upon foundational cybersecurity knowledge, equipping participants with deeper technical skills in cyber defense and ethical exploitation. Through advanced hands-on labs and real-world scenarios, students will simulate attacks and defenses, analyze vulnerabilities, and learn to counteract modern cyber threats. An Industrial Internship Opportunity for 3 months after the successful completion of the CourseLearning Objectives:
- Level 1 plus
- Incident Response % Detection
- Threat Landscape, Attack & Counter Measures
- Threat Intelligence & Hunting
- SOC Components and its Architecture
- Network Security Solutions
- Conduct advanced network reconnaissance and exploitation using industry-standard
- Identify, exploit, and mitigate security vulnerabilities in systems and
- Perform post-exploitation activities such as privilege escalation and
- Harden systems and networks against known attack
- Apply threat hunting and basic incident response
- Understand adversarial tactics, techniques, and procedures (TTPs) based on frameworks like MITRE ATT&CK.
Topics Covered:
- Incident Response % Detection
- Threat Landscape, Attack & Counter Measures
- Threat Intelligence & Hunting
- SOC Components and its Architecture
- Advanced Network & System Reconnaissance
- Web Application Vulnerabilities (OWASP Top 10)
- Exploitation Frameworks VAPT (e.g., Metasploit, Empire)
- Privilege Escalation Techniques (Windows/Linux)
- Lateral Movement & Pivoting Strategies
- Real-World Exploitation Labs (CTF-Style Challenges)
- Defense-in-Depth and Secure Architecture
- Threat Hunting Basics and Indicators of Compromise (IoCs)
- Log Analysis and Basic Incident Response
- Plus 3 months Industrial Internship Programme 3 Months
Format:
- Instructor-led hands-on training (in-person or virtual)
- Heavily lab-based with simulated red blue team exercises
- Final practical assessment or Capture-the-Flag (CTF) challenge
Target Audience:
- Security analysts and IT professionals with basic cybersecurity experience
- Graduates of Cyber Defense & Ethical Exploitations Level 1
- Aspiring penetration testers and SOC team members
- Red and blue team trainees
Prerequisites:
- Completion of Level 1 or equivalent knowledge, or any network /application Security knowledge
- Familiarity with basic command-line tools (Linux and/or Windows)
- Understanding of networking, operating systems, and basic threat concepts
Duration:
- 240 Hours (flexible based on delivery format) plus internship
Deliverables
Course Completion CertificatesCandidate Eligibility for Level 2
Candidate/Students may participate in Cyber Tactics – Level 2 Training by choosing either one of the options as follows Option 1 – If the student/candidate has no prior knowledge in cybersecurity they can join a 6 months program starting from Level 1Minimum Requirements
Final-year undergraduates or graduates or postgraduates or Diploma in:- Cybersecurity
- Information Technology
- Computer Science or a related field
Minimum Requirements:
- Completion of Level 1 training (or equivalent coursework/projects) or any similar
- Technical know-how foundation in: