Cybersecurity
Complete 26-Week Cybersecurity Bootcamp

Become a Professional Cybersecurity Expert

Master network security, ethical hacking, penetration testing, and security operations with 40+ hands-on projects. Learn to protect organizations from cyber threats. No prior experience required.

26
Weeks
40+
Projects
150+
Hours
20+
Tools

What is Cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and data from digital attacks. It's a critical field that defends against cybercriminals, ensures business continuity, and protects sensitive information in our increasingly connected world.

Cybersecurity encompasses:

  • Network Security: Protecting networks from intruders with firewalls, IDS/IPS, and monitoring.
  • Ethical Hacking: Identifying vulnerabilities before malicious hackers can exploit them.
  • Security Operations: Monitoring, detecting, and responding to security incidents 24/7.
3.4M
Unfilled jobs globally
$50k+
Starting salary
35%
Job growth rate
$100k+
Average salary

Why Learn Cybersecurity?

10 compelling reasons to start your cybersecurity journey today

Massive Demand

3.4 million unfilled cybersecurity jobs globally. Companies desperately need talent.

High Salaries

Entry-level positions start at $50k+, experienced professionals earn $100k+.

Job Security

Cyber threats never stop. Security professionals are always needed.

Make a Difference

Protect people, data, and organizations from real harm.

Constant Challenge

New threats emerge daily - you'll always be learning and adapting.

Diverse Career Paths

Work in any industry: finance, healthcare, government, tech.

Global Opportunities

Work anywhere in the world. Cybersecurity is needed everywhere.

Ethical Hacking

Get paid to think like an attacker and find vulnerabilities.

Future-Proof

Digital transformation means security needs will only grow.

What You Can Protect

With cybersecurity skills, you can defend organizations across all sectors

Corporate Networks
Cloud Infrastructure
Databases
Mobile Devices
Endpoints
Wireless Networks
Healthcare Systems
Financial Data
Web Applications
IoT Devices
Automotive Systems
Aviation Security
Satellite Comms
Industrial Control
Employee Data
Intellectual Property

The Complete Roadmap

Follow this proven path to become a professional cybersecurity expert

Phase 1Weeks 1-6

Foundations

NetworkingOS SecurityCryptographyRisk Management
Phase 2Weeks 7-12

Offensive Security

Ethical HackingWeb SecurityWirelessMalware Analysis
Phase 3Weeks 13-18

Defensive Security

Incident ResponseCloud SecuritySOCForensics
Phase 4Weeks 19-26

Advanced & Career

Red TeamingDevSecOpsCertificationsPortfolio

26-Week Curriculum

Week-by-week breakdown of your learning journey with 40+ projects

26 Weeks • 40+ Projects
1

Cybersecurity Fundamentals

Project: Project 1: Security Risk Assessment

Understand the core concepts of cybersecurity and the threat landscape.

Topics Covered

  • What is Cybersecurity? - CIA triad (Confidentiality, Integrity, Availability)
  • Threat Landscape - malware, phishing, DDoS, social engineering
  • Security Domains - network security, application security, cloud security, IoT security
  • Cyber Kill Chain - reconnaissance, weaponization, delivery, exploitation
  • Risk Management - assessment, mitigation, acceptance
  • Security Frameworks - NIST, ISO 27001, CIS Controls

Project: Project 1: Security Risk Assessment

Conduct a basic security risk assessment for a small business

Asset inventoryThreat identificationRisk scoringMitigation recommendations
2

Networking Fundamentals

Project: Project 2: Network Traffic Analysis

Master networking concepts essential for cybersecurity.

Topics Covered

  • OSI Model - 7 layers, protocols at each layer
  • TCP/IP Stack - IPv4, IPv6, TCP, UDP, ICMP
  • Network Devices - routers, switches, firewalls, proxies
  • Subnetting - CIDR, VLSM, network segmentation
  • DNS Deep Dive - record types, resolution process, security issues
  • Wireshark Basics - packet capture, filters, analysis

Project: Project 2: Network Traffic Analysis

Capture and analyze network traffic to identify patterns

Packet captureProtocol analysisTraffic filteringReport findings
3

Operating System Security

Project: Project 3: System Hardening Script

Secure Windows and Linux operating systems.

Topics Covered

  • Windows Security - permissions, UAC, event viewer, Group Policy
  • Linux Security - file permissions, sudo, SELinux, AppArmor
  • User Account Management - principle of least privilege
  • Patch Management - update strategies, vulnerability patching
  • System Hardening - removing unnecessary services, secure configurations
  • Logging and Monitoring - event logs, syslog, auditd

Project: Project 3: System Hardening Script

Create a script to harden a Linux/Windows server

User hardeningService disablingFirewall rulesSecurity baseline
4

Cryptography

Project: Project 4: File Encryption Tool

Understand encryption, hashing, and cryptographic protocols.

Topics Covered

  • Symmetric Encryption - AES, DES, 3DES, modes of operation
  • Asymmetric Encryption - RSA, ECC, Diffie-Hellman
  • Hash Functions - MD5, SHA-1, SHA-256, collision resistance
  • Digital Signatures - signing, verification, certificates
  • PKI Infrastructure - CAs, certificates, chain of trust
  • TLS/SSL - handshake, certificates, secure communication

Project: Project 4: File Encryption Tool

Build a command-line tool to encrypt and decrypt files

AES encryptionPassword-based key derivationFile integrity checkSecure deletion
5

Ethical Hacking Fundamentals

Project: Project 5: Network Scanner

Learn the methodology and ethics of penetration testing.

Topics Covered

  • Ethical Hacking Methodology - reconnaissance, scanning, exploitation
  • Legal Framework - laws, permissions, scope, reporting
  • Reconnaissance Techniques - passive, active, OSINT
  • Scanning Tools - Nmap, masscan, vulnerability scanners
  • Enumeration - service enumeration, user enumeration
  • Vulnerability Assessment - identifying, classifying vulnerabilities

Project: Project 5: Network Scanner

Build a network scanner to discover hosts and services

Host discoveryPort scanningService detectionOS fingerprinting
6

Web Application Security

Project: Project 6: Web Vulnerability Scanner

Identify and exploit web application vulnerabilities.

Topics Covered

  • OWASP Top 10 - injection, broken authentication, XSS, CSRF
  • SQL Injection - UNION-based, error-based, blind, time-based
  • Cross-Site Scripting (XSS) - reflected, stored, DOM-based
  • Cross-Site Request Forgery (CSRF) - attacks and defenses
  • File Upload Vulnerabilities - malicious file uploads
  • Burp Suite - proxy, scanner, repeater, intruder

Project: Project 6: Web Vulnerability Scanner

Create a tool to scan for common web vulnerabilities

SQL injection detectionXSS detectionDirectory enumerationReport generation
7

Wireless Network Security

Project: Project 7: WiFi Security Audit

Secure and test wireless networks.

Topics Covered

  • WiFi Security Protocols - WEP, WPA, WPA2, WPA3
  • Wireless Attacks - deauth attacks, evil twin, KRACK
  • Aircrack-ng Suite - packet capture, cracking
  • Bluetooth Security - vulnerabilities, BlueBorne
  • RFID/NFC Security - cloning, relay attacks
  • Wireless Defense - IDS, rogue AP detection

Project: Project 7: WiFi Security Audit

Audit a wireless network for security weaknesses

Network discoveryEncryption analysisClient enumerationSecurity recommendations
8

Malware Analysis

Project: Project 8: Malware Sandbox

Analyze and understand malicious software.

Topics Covered

  • Malware Types - viruses, worms, trojans, ransomware, rootkits
  • Static Analysis - examining code without execution
  • Dynamic Analysis - running malware in sandbox
  • Reverse Engineering - disassemblers, debuggers, decompilers
  • Persistence Mechanisms - registry, startup folders, services
  • Indicators of Compromise - IoCs, YARA rules

Project: Project 8: Malware Sandbox

Set up a sandbox environment for malware analysis

Isolated environmentBehavior monitoringNetwork simulationAnalysis report
9

Incident Response

Project: Project 9: Incident Response Playbook

Respond to security incidents effectively.

Topics Covered

  • Incident Response Lifecycle - preparation, detection, containment
  • Digital Forensics - acquisition, analysis, preservation
  • Evidence Handling - chain of custody, documentation
  • Containment Strategies - isolation, segmentation, shutdown
  • Eradication and Recovery - removing threats, restoring systems
  • Post-Incident Analysis - lessons learned, reporting

Project: Project 9: Incident Response Playbook

Create an incident response playbook for common scenarios

Ransomware responseData breach responseMalware outbreakCommunication templates
10

Cloud Security

Project: Project 10: Cloud Security Audit

Secure cloud environments (AWS, Azure, GCP).

Topics Covered

  • Shared Responsibility Model - provider vs customer responsibilities
  • AWS Security - IAM, S3 buckets, security groups, VPC
  • Azure Security - RBAC, NSGs, Key Vault
  • Cloud Misconfigurations - exposed storage, open ports
  • Cloud Security Tools - ScoutSuite, Prowler, CloudSploit
  • Container Security - Docker, Kubernetes security

Project: Project 10: Cloud Security Audit

Audit an AWS/Azure environment for security issues

IAM analysisStorage permissionsNetwork configurationCompliance checks
11

Identity and Access Management

Project: Project 11: MFA Implementation

Manage identities and control access to resources.

Topics Covered

  • Authentication Methods - passwords, MFA, biometrics, certificates
  • Authorization Models - RBAC, ABAC, PBAC
  • Single Sign-On (SSO) - SAML, OAuth, OIDC
  • Directory Services - Active Directory, LDAP
  • Privileged Access Management - PAM solutions
  • Identity Governance - access reviews, certification

Project: Project 11: MFA Implementation

Implement multi-factor authentication for a web application

TOTP setupBackup codesRemember deviceAdmin enforcement
12

Security Operations Center (SOC)

Project: Project 12: SIEM Dashboard

Monitor and defend networks in real-time.

Topics Covered

  • SOC Functions - monitoring, triage, escalation
  • SIEM Tools - Splunk, ELK Stack, QRadar
  • Log Analysis - correlation, anomaly detection
  • Threat Intelligence - feeds, indicators, threat hunting
  • Alert Triage - prioritization, investigation
  • Playbooks - standard operating procedures

Project: Project 12: SIEM Dashboard

Set up a SIEM dashboard for security monitoring

Log ingestionAlert rulesVisualizationsIncident tracking
13

Penetration Testing

Project: Project 13: Full Pen Test Report

Conduct professional penetration tests.

Topics Covered

  • Pen Testing Methodology - PTES, OWASP, OSSTMM
  • External Pen Testing - internet-facing assets
  • Internal Pen Testing - insider threat simulation
  • Web Application Pen Testing - deep dive
  • Mobile App Pen Testing - iOS, Android
  • Report Writing - executive summaries, technical findings

Project: Project 13: Full Pen Test Report

Conduct a penetration test and write a professional report

Scope definitionVulnerability findingsExploitation stepsRemediation advice
14

Compliance and Governance

Project: Project 14: Compliance Checklist

Understand regulatory requirements and security frameworks.

Topics Covered

  • GDPR - data protection, privacy rights, fines
  • HIPAA - healthcare security, privacy rules
  • PCI DSS - payment card industry standards
  • ISO 27001 - information security management
  • NIST Cybersecurity Framework - core functions
  • Audit Preparation - evidence collection, interviews

Project: Project 14: Compliance Checklist

Create a compliance checklist for a specific regulation

Control mappingEvidence requirementsGap analysisRemediation plan
15

Social Engineering

Project: Project 15: Phishing Simulation

Understand and defend against human-based attacks.

Topics Covered

  • Social Engineering Principles - influence, manipulation
  • Phishing Attacks - email, SMS, voice (vishing)
  • Pretexting - creating believable scenarios
  • Baiting and Tailgating - physical security
  • Security Awareness Training - employee education
  • Phishing Simulations - testing and metrics

Project: Project 15: Phishing Simulation

Create and run a phishing simulation campaign

Email templatesLanding pagesTrackingTraining materials
16

Digital Forensics

Project: Project 16: Forensic Investigation

Investigate digital crimes and recover evidence.

Topics Covered

  • Forensics Process - identification, preservation, analysis
  • Disk Forensics - file systems, deleted files, carving
  • Memory Forensics - RAM analysis, volatility
  • Network Forensics - PCAP analysis, flow data
  • Mobile Forensics - iOS, Android extraction
  • Forensic Tools - Autopsy, FTK, EnCase, Volatility

Project: Project 16: Forensic Investigation

Investigate a simulated security breach

Evidence acquisitionTimeline reconstructionMalware identificationFindings report
17

Red Teaming

Project: Project 17: Red Team Simulation

Simulate advanced adversaries to test defenses.

Topics Covered

  • Red Team vs yellow Team - objectives, differences
  • Advanced Persistence - C2 infrastructure, evasion
  • Lateral Movement - pivoting, pass-the-hash
  • Privilege Escalation - Windows, Linux techniques
  • Defense Evasion - AMSI bypass, logging bypass
  • Cobalt Strike - beaconing, payloads

Project: Project 17: Red Team Simulation

Plan and execute a red team exercise

Attack scenariosC2 setupLateral movementReport
18

DevSecOps

Project: Project 18: Secure CI/CD Pipeline

Integrate security into the development lifecycle.

Topics Covered

  • DevSecOps Principles - shift left, automation
  • SAST (Static Analysis) - code scanning
  • DAST (Dynamic Analysis) - runtime testing
  • SCA (Software Composition Analysis) - dependency scanning
  • CI/CD Security - pipeline hardening
  • Infrastructure as Code Security - Terraform, CloudFormation

Project: Project 18: Secure CI/CD Pipeline

Implement security scanning in a CI/CD pipeline

SAST integrationDAST integrationDependency scanningCompliance checks
19

IoT Security

Project: Project 19: IoT Security Assessment

Secure Internet of Things devices and networks.

Topics Covered

  • IoT Architecture - devices, gateways, cloud
  • IoT Protocols - MQTT, CoAP, Zigbee, Z-Wave
  • IoT Vulnerabilities - default passwords, firmware
  • IoT Hacking - hardware hacking, radio attacks
  • IoT Defense - segmentation, updates, monitoring
  • Industrial IoT (IIoT) - SCADA, PLC security

Project: Project 19: IoT Security Assessment

Assess the security of a smart home device

Firmware analysisNetwork trafficMobile app testingCloud API testing
20

Blockchain Security

Project: Project 20: Smart Contract Audit

Understand security in blockchain and cryptocurrencies.

Topics Covered

  • Blockchain Basics - consensus, transactions, blocks
  • Smart Contract Security - reentrancy, overflow
  • Cryptocurrency Security - wallets, exchanges
  • 51% Attacks - mining concentration risks
  • DeFi Security - flash loans, oracle manipulation
  • Auditing Smart Contracts - tools, methodology

Project: Project 20: Smart Contract Audit

Audit a smart contract for vulnerabilities

Code reviewVulnerability scanningTest casesAudit report
21

Threat Hunting

Project: Project 21: Threat Hunt

Proactively search for threats in networks.

Topics Covered

  • Threat Hunting Methodology - hypothesis, investigation
  • Data Sources - logs, network flows, endpoints
  • Indicators of Attack (IoA) - behavior patterns
  • Threat Intelligence Integration - context enrichment
  • Hunting Tools - osquery, GRR, Velociraptor
  • Automation - scheduled hunts, alerts

Project: Project 21: Threat Hunt

Conduct a threat hunt for specific TTPs

Hypothesis creationData collectionPattern analysisFindings report
22

Zero Trust Architecture

Project: Project 22: Zero Trust Design

Implement zero trust security models.

Topics Covered

  • Zero Trust Principles - never trust, always verify
  • Micro-segmentation - network isolation
  • Identity-Centric Security - identity as perimeter
  • Zero Trust Network Access (ZTNA) - beyond VPN
  • Zero Trust Implementation - maturity model
  • Case Studies - Google BeyondCorp

Project: Project 22: Zero Trust Design

Design a zero trust architecture for an organization

Asset inventoryIdentity strategyNetwork segmentationImplementation roadmap
23

Security Automation

Project: Project 23: Security Automation Bot

Automate security tasks with scripts and tools.

Topics Covered

  • Python for Security - automation scripts
  • SOAR (Security Orchestration) - playbook automation
  • API Integration - connecting security tools
  • Automated Remediation - response actions
  • Security Bots - Slack bots, email automation
  • Workflow Automation - Tines, Zapier for security

Project: Project 23: Security Automation Bot

Create a bot to automate security tasks

Alert processingEnrichmentResponse actionsNotifications
24

Security Awareness Training

Project: Project 24: Training Module

Develop and deliver security training programs.

Topics Covered

  • Training Program Design - audience, content, delivery
  • Phishing Awareness - simulations, metrics
  • Password Security - best practices, tools
  • Physical Security - access, tailgating
  • Remote Work Security - VPN, home networks
  • Measuring Effectiveness - metrics, surveys

Project: Project 24: Training Module

Create a security awareness training module

Content developmentInteractive elementsKnowledge checksTracking
25

Cybersecurity Certifications

Project: Project 25: Certification Study Plan

Prepare for industry certifications.

Topics Covered

  • Certification Overview - CompTIA Security+, CEH, CISSP, OSCP
  • Exam Strategies - study plans, practice tests
  • CompTIA Security+ - domains, objectives
  • CEH (Certified Ethical Hacker) - modules, labs
  • CISSP - 8 domains, experience requirements
  • OSCP (Offensive Security) - lab, exam format

Project: Project 25: Certification Study Plan

Create a study plan for a specific certification

Domain breakdownStudy resourcesPractice scheduleLab exercises
26

Capstone Project & Career Preparation

Project: Project 26-40: Capstone Projects (Choose 15)

Build a portfolio-ready project and prepare for security job interviews.

Topics Covered

  • End-to-End Security Project - real-world scenario
  • Portfolio Development - showcasing skills
  • Resume Writing - highlighting security experience
  • Interview Preparation - technical questions, scenarios
  • Job Search Strategy - roles, companies, networking
  • Continuous Learning - staying current

Project: Project 26-40: Capstone Projects (Choose 15)

Select and build 15 additional projects from the list below

Real-world scenariosProfessional toolsPortfolio readyIndustry feedback

40+ Security Projects

Build an impressive portfolio with projects of all difficulty levels

Security Operations Center (SOC) Setup

Advanced

Build a mini SOC with monitoring tools

Vulnerability Scanner

Advanced

Create a custom vulnerability scanner

Password Manager

Intermediate

Build a secure password manager app

SSO Implementation

Advanced

Implement Single Sign-On for apps

Biometric Authentication

Intermediate

Add biometric login to an app

File Integrity Monitor

Intermediate

Monitor file changes for tampering

WiFi Deauth Detector

Intermediate

Detect deauthentication attacks

Webcam Surveillance Detector

Advanced

Detect unauthorized camera access

Ransomware Simulator

Advanced

Simulate ransomware for training

yellowtooth Sniffer

Intermediate

Scan for yellowtooth devices

Secure QR Generator

Beginner

Generate encrypted QR codes

Code Obfuscator

Intermediate

Obfuscate Python/JavaScript code

Port Scanner Pro

Intermediate

Advanced port scanner with service detection

Network Mapper

Intermediate

Visual network mapping tool

Phishing Email Analyzer

Intermediate

Analyze email headers for phishing

Dark Web Monitor

Advanced

Monitor dark web for credentials

Database Encryption Tool

Intermediate

Encrypt sensitive database fields

Cloud Security Scanner

Advanced

Scan cloud buckets for exposures

Malware Sandbox

Advanced

Run malware in isolated environment

Rootkit Detector

Advanced

Detect rootkit infections

Mobile Security Scanner

Intermediate

Scan apps for permissions

Security Camera System

Intermediate

IP camera security assessment

Car Hacking Simulation

Advanced

Simulate CAN bus attacks

Medical Device Security

Advanced

Assess medical device security

Physical Access System

Intermediate

Design secure access control

Privilege Auditor

Intermediate

Audit user privileges

Security Awareness Calendar

Beginner

Monthly security tips tool

Secure File Sharing

Advanced

Encrypted file sharing app

Supply Chain Security

Advanced

Assess supply chain risks

Pet Tracker Security

Intermediate

Test pet tracker vulnerabilities

Smart Agriculture Security

Advanced

Secure farming IoT devices

Bike Sharing Security

Intermediate

Test bike sharing app security

Event Ticketing Security

Intermediate

Secure ticket validation

Smart Bar System

Intermediate

Secure IoT bar system

Smart Mirror Security

Advanced

Test smart mirror vulnerabilities

Smart Watch Security

Advanced

Test wearable security

Smart Home Security

Intermediate

Secure smart home devices

Drone Security

Advanced

Test drone vulnerabilities

Space Systems Security

Advanced

Satellite communication security

Crypto Wallet Security

Advanced

Secure cryptocurrency wallet

Plus 26 weekly projects = 40+ total security projects

Tools You'll Master

Industry-standard security tools and platforms

Kali Linux
Metasploit
Nmap
Wireshark
Burp Suite
Splunk
Snort
ELK Stack
Autopsy
Volatility
AWS Security
Git
Python
Docker
John the Ripper
Hashcat

Ready to Defend the Digital World?

Join our Cybersecurity bootcamp and get access to our career support team. We'll help you prepare for certifications, build your portfolio, and connect with top companies hiring security professionals.

Frequently Asked Questions

Everything you need to know about our cybersecurity course

Cybersecurity is the practice of protecting systems, networks, programs, and data from digital attacks, damage, or unauthorized access. It encompasses a wide range of practices, technologies, and processes designed to safeguard confidentiality, integrity, and availability of information. Cybersecurity professionals defend against threats like malware, ransomware, phishing, hacking, and data breaches, working to ensure that organizations can operate safely in an increasingly digital world.

Ready to Start Your Security Journey?

Join 2,500+ students who have transformed their careers with Yelocode.