* Advanced TCP/IP & secure protocols
* Cloud security architecture (AWS, Azure, GCP)
* IAM, encryption, data security policies
* Security & risk management
* Asset security
* Security architecture & engineering
* Communication & network security
* Identity & access management (IAM)
* Security assessment & testing
* Security operations
* Software development security
* Hands-on Labs
* Information systems auditing process
* Governance & management of IT
* IS acquisition, development & implementation
* Operations, maintenance & service management
* Protection of information assets
* Hands-on Labs
* AI-driven threat hunting in SOC environments
* Threat intelligence lifecycle & sources
* Incident response planning & execution
* Vulnerability scanning with Nessus & OpenVAS
* Cloud incident simulation
* SOC threat hunting challenge



