Event details
- August 18–22, 2025 | 2:00 PM – 6:00 PM IST
- Virtual Masterclass
- Microsoft Teams | Certificate Provided
- +91 98190 20274 / 97735 01525
Why You Should Attend?
- ✔ 20 hours of intensive, practical training aligned with NIST, MITRE ATT&CK, and ISO 27035
- ✔ Tailored for professionals working in mature security environments
- ✔ Learn how to optimize SIEM, SOAR, and EDR tools to detect real threats
- ✔ Gain hands-on experience with Splunk, Sysmon, Velociraptor, Atomic Red Team
- ✔ Conduct active threat hunts, forensic analysis, IR simulations, and reporting
- ✔ Improve and operationalize IR playbooks, RCA reports, and executive briefings
- ✔ Delivered by industry-leading experts with deep IR and blue team experience
What You’ll Learn (Agenda) ?
Day 1: Modern Defense Architecture
- Implement Zero Trust & defense-in-depth
- Tune SIEM, SOAR, EDR for maximum visibility
- Lab: Analyze real-world breaches (SolarWinds, MOVEit)
Day 2: Threat Intel & Detection Engineering
- Operationalize CTI (MISP, OpenCTI)
- Write Sigma, YARA, Splunk rules
- Lab: Trace lateral movement via Sysmon + Splunk
Day 3: Incident Response Deep Dive
- Run drills, manage evidence (KAPE, Velociraptor)
- Perform endpoint/network/email forensics
- Simulation: Track phishing to internal compromise
Day 4: Recovery & Postmortem
- Contain and eradicate advanced threats
- Generate RCA & After Action Reports
- Lab: Executive IR reporting & briefing
Day 5: Threat Hunting & Final Assessment
- Live hunt for beaconing, LOLBins, DNS anomalies
- Benchmark IR maturity (NIST/CMMI)
- Capstone: Simulated APT campaign + certification
Who Should Attend?
This training is ideal for professionals who are actively engaged in cybersecurity operations, including:
- Security Operations Center (SOC) Analysts & Engineers
- Incident Response & Digital Forensics Team Members
- IT & Network Administrators with security responsibilities
- Threat Intelligence Analysts
- Cybersecurity Managers & Team Leads
- Blue Team Members and Detection Engineers
- Red Teamers transitioning to Purple Teaming roles
- Compliance & Risk Professionals involved in breach response
- Anyone preparing for a CSIRT or IR leadership role
VARUN PATHAK Cyber Security & Network Consultant
Highly skilled Cyber Security Consultant and Trainer with a proven track record of delivering technical training and conducting security assessments. Strong expertise in network configuration review, vulnerability management, Incident response and compliance. Committed to enhancing IT infrastructure security and ensuring client success
- Accomplished Cyber Security and Network Trainer, delivering 600+ technical hands-on training sessions to diverse clients and institutions globally, empowering over 100,000 participants.
- Proficient in conducting extensive security assessments, utilizing advanced tools such as Nmap,Nessus, Accunetix, Burp Suite, Metasploit, and more. Expertise includes web application and sourcecode review, network configuration analysis, and offering strategic remediation plans.
- Consistently performing regular security analysis of client networks and IT infrastructure, providing valuable advisory on enhancing overall security posture.
- Demonstrated proficiency in patch management and proactive monitoring of backup activities through efficient patch management practices.
- Well-versed in vulnerability management life-cycle, from identification and assessment to reporting and resolution.
- Experienced in reviewing network configurations to ensure optimal performance and swift incident response.
- Notable achievements include designing high-quality Cyber Security e-learning programs for prominent companies, including a Big4 organization, and creating comprehensive CCNA and CCNPe-learning content for multiple clients.
- Zero Trust Network Segmentation for Government Data Center.
- Designed Zero Trust micro-segmentation, replaced legacy firewall rules with identity-aware policies, and implemented real-time user behavior monitoring.
- Cloud Identity Modernization for a Healthcare Provider.
- Migrated LDAP-based authentication to Entra ID with hybrid sync, MFA, and secure on-prem app publishing through Entra Proxy.
Whether you're defending against persistent threats or fine-tuning your detection capabilities, this course provides actionable skills and frameworks to elevate your effectiveness.
