0% found this document useful (0 votes)
12 views16 pages

FRCD - 6m With Soc

The Front Runner Cyber Security Diploma (FRCD) is a 6-month program offering hands-on training in cybersecurity skills, including ethical hacking and incident response, suitable for both beginners and professionals. It provides pathways to industry certifications and includes dedicated placement assistance, mentorship, and practical labs. The program aims to prepare students for various job roles in cybersecurity with competitive salary potentials.

Uploaded by

anbukarthik40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views16 pages

FRCD - 6m With Soc

The Front Runner Cyber Security Diploma (FRCD) is a 6-month program offering hands-on training in cybersecurity skills, including ethical hacking and incident response, suitable for both beginners and professionals. It provides pathways to industry certifications and includes dedicated placement assistance, mentorship, and practical labs. The program aims to prepare students for various job roles in cybersecurity with competitive salary potentials.

Uploaded by

anbukarthik40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Front

Runner
Cyber
Security Beyd future

Diploma
6 Months

DD
NT
URREE
EC- Council
U
A
A S
S S
S
M
E ESE
AC
PL DRIV
Authorised Training Center
Program
Overview
The 6-month Front Runner Cyber Security Diploma (FRCD) provides intensive,
hands-on training in key cybersecurity skills. Combining real-world practice, AI tools,
and expert mentorship, it covers ethical hacking, security operations, incident
response, forensics, and threat intelligence. The program prepares students for
industry certifications, suitable for beginners and professionals aiming for career
advancement.

Duration: 6 Months Mode: Online | Offline | Hybrid

Front Runner Cyber Security Diploma (FRCD)


Certifications Advanced SOC Analyst (ASA)
Certified Security Tester (CST)

EC Council CEH (Certified Ethical Hacker) v13 AI Lite


Certifications CEH (Certified Ethical Hacker) v13 AI Elite
(Optional) CSA (Certified SOC Analyst)

Dedicated
100% Placement
Assistance 18
Hrs
Placement
Training

What Assured
18
Industry

makes Placement
Drives Hrs
Experts
Sessions
this course
stand out? Lifelong
Mentorship 400+ Virtual
Labs
Certified Ethical Hacker ( CEH v13 AI ) (Optional)
The Certified Ethical Hacker (CEH v13 AI) program focuses on identifying
vulnerabilities in IT systems through ethical hacking techniques, exploitation
strategies, and system protection measures. This program emphasizes both
theoretical and practical insights, preparing students to perform security audits,
penetration tests, and vulnerability assessments across various domains.

Advanced SOC Analyst (ASA) Program


The Advanced SOC Analyst (ASA) program is the first step to joining a Security
Operations Center (SOC). It is designed for both current and aspiring Tier I and
Tier II SOC analysts to develop proficiency in performing entry-level and
intermediate-level security operations.

Certified Security Tester (CST) Program


The Certified Security Tester (CST) program is a comprehensive security testing
certification designed to equip students with advanced skills in network
security, vulnerability assessment, and penetration testing. Students will gain
practical exposure through hands-on labs, security assessments, and
industry-standard tools, ensuring they are prepared to handle real-world
security challenges.

Foundation Modules
Cybersecurity fundamentals, AI applications in
security, and risk management.

Curriculum Core Skills


snapshot Network security, cryptography, vulnerability
assessment, and threat analysis.

Hands-On Training
Mastering industry-leading tools such as
Metasploit, Nmap, Wireshark, Burp Suite,
and Ettercap.

Capstone Project
Apply skills to solve real-world cybersecurity
challenges and conduct security audits.
Job Roles & Potential Salary

SOC Analyst Cybersecurity


(Tier I & II) Analyst
India Global India Global
₹ 4 LPA $ 60,000 ₹ 6 LPA $ 75,000
to to to to
₹ 9 LPA $ 120,000 ₹ 12 LPA $ 130,000

Threat Intelligence Digital Forensic


Analyst Investigator
India Global India Global
₹ 8 LPA $ 90,000 ₹ 7 LPA $ 80,000
to to to to
₹ 16 LPA $ 150,000 ₹ 15 LPA $ 140,000

Incident Response Security


Specialist Consultant
India Global India Global
₹ 7 LPA $ 85,000 ₹ 10 LPA $ 100,000
to to to to
₹ 14 LPA $ 140,000 ₹ 20 LPA $ 160,000

Placement Assistance
How It Works:
Throughout the course, receive practical training, including;

01 Self-Introduction
Training
Resume Building
Workshops
Multiple Mock Interviews:
HR-Level and Technical-Level

LinkedIn
Career Guidance Optimization Group Grooming
Sessions Training Discussions Sessions

Networking Opportunities
02 Connect with industry leaders, alumni, and peers.

Direct Recruiter Visibility

03 Students connect directly with recruiters through placement drives, industry


collaborations, and networking sessions

Placement Assistance
04 Secure your dream job with our 100% Placement Assistance and vast industry network.
Why Choose
Techbyheart?
Techbyheart is dedicated to shaping
the cybersecurity leaders of tomorrow. GLOBAL INSPiRATiON
With this program, you’ll benefit from: AWARDS 2023
Best cybersecurity startup of the year

HIGHEST GLOBAL INDIAN


RATINGS INSPIRATION ICON
ON GOOGLE AWARDS 2023 AWARDS 2023

4.9 STARS BEST


CYBERSECURiTY
BEST
CYBERSECURiTY
STARTUP STARTUP
OF THE YEAR OF THE YEAR

INDIAN ICON AWARDS 2023


Best cybersecurity startup of the year

300+
WORKSHOPS
50+ 45+
VALUE ADDED
& SEMINARS HACKATHON COURSES

200+
ASSOCIATED
1 lakhs + 100%
STUDENTS PLACEMENT
COLLEGES SERVED ASSISTANCE CYBER SECURiTY TRAiNiNG
FOR POLiCE OFFiCiALS

Letter of Appreciation from Kerala Police


Our
Student
Achievers

Placed with

38 Lakhs
@ Applied Materials, Inc.,
Canada
Leona Antony

Josy Georgi Arya Joeal Akhil Rajendran Shilpa


@ Amazon @ TCS @ UST Global @ EY - India @ EC Council

Arun Sona Papachan Sreenath Anna Maria Snehal Bole


@ EY - India @ Wipro @ UST Global @ Accenture @ Digitalage

Muhammed Faizal Farha Alungal Aadhil Muhammed Manu T Mohan Deeptha


@ Way 11 Technologies @ Secureinteli @ UST Global @ Testhouse @ Aptener Mechatronics

Famina V P Swathy Vishnupriya Anjali Sam K Chacko


@ Secureinteli @ Smartgrid @ Zerofox @ Zerofox @ Speridian Technologies
Dhanukrishna Emmanuel Senaji Shaun Emmanuel Thanveer Anju Varghese
@ HCL @ Cognizant @ Utthunga Technologies @ Mindfire - Dubai @ UST Global

Naif Nizami Muhammed Mujthaba Roshin Shamseena Soorya Kiran


@ Avanzo @ Avanzo @ Timenet Solutions @ Avanzo @ Zerofox

Megha Sneha Rahul Raj Amjad Samuel Thomas


@ IGF Technologies @ Smartgrid @ Avanzo @ Cybersecit @ Empower

Labeebudeen Ammu Jerin Johnson Angel Joseph Varsha


@ Turbolab @ St Teresa's College @ Value Mentor @ Goodman ME Groups @ Zacco

Anjaly Indu Rajan Akshay Aavin Sarbin Radhika


@ Zerofox @ Utthunga Technologies @ Encyb Security Services @ Timenet Solutions @ Alibi Global

…and many more!


Bridging
Academia
& Industry

At Techbyheart, monthly industry sessions are an integral part of our


commitment to preparing students for real-world challenges. These sessions,
conducted in collaboration with industry leaders, provide invaluable insights into
current trends, operational practices, and professional culture.

Program
Features

Direct engagement with experts


Students interact with industry professionals
through in-person or online sessions.

Interactive Q&A
Every session includes a 30-minute Q&A
segment to address student queries.

Industry-focused insights
Sessions are tailored to align with the latest
developments in cybersecurity and related fields.

Multiple locations
Sessions are accessible at all branches
of Techbyheart.
Our
Success
Stories

Techbyhert had guided me into


transforming my novice curiosity
into a skilled professional
Josy Georgi
@ Amazon

The trainers exhibited excellence in delivering


The training in the vulnerability assessment
and security testing in an engaging format.
Deeptha
@ Aptener Mechatronics

Techbyhert deserves sincere thanks


for playing a key role in my journey to
a rewarding career In cybersecurity.
Famina V P
@ Secureinteli

Watch
success
stories
English Malayalam International Multilingual
Module-wise
Curriculum

Certified Ethical Hacker (CEH)


Module 01 Introduction to AI, ML, and Python Basics

Basics of ethical hacking, security controls, and key concepts.

Module 02 Footprinting and Reconnaissance

Techniques and tools for gathering information before attacks.

Module 03 Scanning Networks

Network scanning techniques and countermeasures.

Module 04 Enumeration

Methods for extracting user info, network services, and countermeasures.

Module 05 Vulnerability Analysis

Identifying security loopholes and testing tools.

Module 06 System Hacking

Techniques for exploiting system vulnerabilities and hiding tracks.

Module 07 Malware Threats

Types of malware, analysis methods, and countermeasures.

Module 08 Sniffing

Techniques to discover network vulnerabilities and defense

Module 09 Social Engineering

Types of malware, analysis methods, and countermeasures.


Module 10 Denial-of-Service

DoS/DDoS attack methods and protective tools.

Module 11 Session Hijacking

Techniques for identifying and securing network sessions.

Module 12 Evading IDS, Firewalls, and Honeypots

Methods for bypassing security systems and strengthening defenses.

Module 13 Hacking Web Servers

Methods for bypassing security systems and strengthening defenses.

Module 14 Hacking Web Applications

Web app attack methods and countermeasures.

Module 15 SQL Injection

SQL injection techniques and countermeasures.

Module 16 Hacking Wireless Networks

Encryption types, threats, and wireless security tools.

Module 17 Hacking Mobile Platforms

Android/iOS hacking methods and security tools.

Module 18 IoT Hacking

IoT/OT attack methods and security solutions.

Module 19 Cloud Computing

Cloud security concepts, tools, and countermeasures.

Module 20 Cryptography

Encryption algorithms, PKI, disk encryption, and cryptanalysis tools.


Advanced SOC Analyst (ASA)
Module 01 Security Operations and Management

Security Management SOC Workflow


Security Operations Components of SOC
Security Operations Center (SOC) Types of SOC Models
Need of SOC SOC Implementation
SOC Capabilities Challenges in the
SOC Operations Implementation of SOC

Module 02 Understanding Cyber Threats, Tactics, & Attack Methodology

Cyber Threats Network, Host, and Application


Intent-Motive-Goal Level Attacks
Tactics-Techniques-Procedures Cyber Threat Indicators of
(TTPs) Compromise (IoCs)
Opportunity-Vulnerability-Weakness Hacking Methodologies

Module 03 Incidents, Events, and Logging

Log, Event, and Incident Typical Log Format


Typical Log Sources Local Logging
Need of Log Centralized Logging
Logging Requirements Centralized Logging Challenges
Module 04 Incidents, Events, and Logging

Security Information and Event SIEM Deployment


Management (SIEM) Incident Detection with SIEM
Need of SIEM Use Case Examples for Different
Typical SIEM Capabilities Incident Levels
SIEM Architecture and Its Handling Alert Triaging and
Components Analysis

Module 05 Enhanced Incident Detection with Threat Intelligence

Cyber Threat Intelligence (CTI) Integration of Threat Intelligence


Types of Threat Intelligence into SIEM
Threat Intelligence-driven SOC Threat Intelligence Use Cases for
Benefits of Threat Intelligence to Enhanced Incident Response
SOC Analyst Enhancing Incident Response by
Threat Intelligence Use Cases for Establishing SOPs for Threat
SOC Analyst Intelligence

Module 06 Incident Response

Incident Response Responding to Different Security


SOC and IRT Collaboration Incidents (Network, Application,
Incident Response (IR) Process Email, Insider, Malware)
Overview

Certified Security Tester (CST)

Networks & IT Infrastructure Deep Packet Inspection


Linux for Hackers IDS, IPS, WAF and Firewalls
Cybersecurity 101 Malware and Metasploit
Anonymity and VPN Web Application Security
Open Source Intelligence Wireless Security
Art of Scanning VAPT Project
Cybersecurity
Tools Covered

Maltego Recon-ng Metasploit

Nmap Shodan Burp Suite

Ettercap Splunk Alien Vault OTX

Virtual Labs
NASA
Hall of fame
Our proud students

Sayooj Gadha Aadhil Aishwarya Anzil Sidhikh Adwaitha

Amitha Ridhin Anshid Jithin Harshika Shalin Adharsh

Vijay Muhsina Akshay Anwar Samjeed Abijith Aswin Praveen

Cyber
Security
Analysts Adith Sinan Sreejith Rohith Azad Shazin

Bug Bounties
Our students

Gopikrishnan Goutham Jeeshma Kiran Kumar Abi Aduaith Neena

Aslam Sayooj Aswin Praveen Rahul Raj Mubin Roshin Faizal


Ready
to start your
journey?

KOCHI TRIVANDRUM CHENNAI


1st Floor, Kohinoor Building, 2nd Floor, TC 25/1135, 7th floor, Temple tower
Temple Road, Elamkulam PO, Plamood, Pattom P.O, Annasalai, Tamil Nadu
Kadavanthra, Kochi Trivandrum-695004 600035

BANGALORE KOTTAKKAL
No:88, 5th Block, Above MDC Bank,
Koramangala Industrial Layout, Near Bus stand +91 75 9385 9385
Near Jyoti Nivas College, Kottakkal,
Bangalore - 560095 Malappuram

UAE UK
M108, Al Hilal Bank building 128 City Road, [email protected]
Al Qusais-2, Dubai, UAE London ECIV 2NX www.techbyheartacademy.com

Beyd future

You might also like