The job-launch course for analysts who already passed Security+. A self-paced, 12-module program with hands-on labs using the tools real analysts use, a dual-track resume framework (SOC L1 + Vulnerability Analyst), and an optional coaching add-on with 1:1 calls and async resume + lab review.
Sec+ is the prerequisite. Same curriculum either way — pick whether you want 1:1 coaching alongside it.
The full 12-module curriculum and lab environment, on your time. Lifetime access — go as fast or as slow as you need. Best for self-starters who want the content and the labs.
Everything in Self-Paced plus 1:1 coaching — four 45-minute calls scheduled around your progress, and 90 days of async resume and lab review. You're not doing this alone.
Every lab uses real tools and AI techniques employers actually look for. You build a portfolio while you learn.
Capture live packets, apply ML anomaly detection to flag suspicious flows
Build ML correlation rules in Splunk to auto-detect attack patterns in real logs
Train a Python scikit-learn classifier to distinguish benign from malicious binaries
Build an NLP model that classifies phishing emails with 95%+ accuracy
Attack and defend LLM-based tools; document prompt injection vulnerabilities
Use Isolation Forest in Python to detect outliers in network traffic datasets
Profile normal user behavior and trigger AI alerts on insider threat patterns
Build automated IR playbooks using AI orchestration to cut MTTR by 60%
AWS CloudTrail + AI threat detection — spot privilege escalation in real time
Analyze deepfake audio/video samples and build detection workflows
Run Nessus scans then use AI to prioritize CVEs by exploitability and business impact
Kerberoasting, Pass-the-Hash attacks + AI-powered detection and response
Generate certs, analyze TLS connections, and use AI to detect certificate anomalies
Implement microsegmentation + AI policy enforcement in a virtual enterprise network
Embed SAST, DAST, and AI code review into a GitHub Actions CI/CD pipeline
Build a Python tool that pulls OSINT feeds and uses NLP to surface critical IOCs
AI-driven password strength modeling + hashcat GPU cracking and defense strategies
Use SHAP and LIME to explain ML model decisions — critical for SOC analyst buy-in
AI-assisted cryptanalysis lab + quantum threat modeling and post-quantum algorithms
Full SOC workflow: AI-assisted alert triage, threat hunting, and escalation decisions
Each module has a clear theme, a hands-on lab, and a portfolio-grade deliverable you can show in interviews. Self-paced — go as fast or as slow as you need.
How a real SOC works (L1 / L2 / L3, escalation, MTTA/MTTR). First Splunk SPL investigation. First Nessus authenticated scan.
Build your home SOC: Sysmon with SwiftOnSecurity config, Wazuh manager + Elastic stack. Validate with Atomic Red Team.
L1 alert-queue workflow. Triage 5 real alerts across two SIEMs. SPL ↔ KQL translation. Write triage notes L2 actually reads.
Headers + SPF/DKIM/DMARC. any.run interactive sandbox. End-to-end phishing case with IOCs harvested and containment plan.
EDR vs AV vs XDR — what actually matters. CrowdStrike Falcon + MDE investigation. Volatility 3 memory triage.
Reading a PCAP like an analyst. Beaconing detection. Zeek conn.log pivoting. End-to-end network intrusion investigation.
Authenticated scans, CVSS × KEV × asset criticality prioritization, and the Top-15 remediation report engineering actually uses.
OWASP Top 10 for analysts. OWASP ZAP + Burp Community + Trivy. DevSecOps-style triage of staging vulns.
ATT&CK Navigator coverage maps. MISP threat intel feeds. Draft a Sigma rule to close a detection gap.
AWS GuardDuty + CloudTrail + Athena for cloud SOC. BloodHound for Active Directory attack-path mapping.
The PICERL framework in practice. Solo IR runbook walkthrough. End-to-end case in TheHive + Cortex SOAR.
SOC + Vuln Analyst resumes. STAR-IR interview framework. Capstone simulation. Portfolio + applications plan.
Real reviews from real students — posted publicly on LinkedIn.
Stories from students taught by Bonifacio Capuyan — CISM, CISA, CSA, CAD, CIS-VR.
Try CyberSec Pro Academy for 30 days. Go through the lessons. Do the labs. Use the community. If you don't feel like this is the best investment you've made in your career — email us and we'll refund every penny. No questions asked.
We can offer this because we know what happens when people actually go through the program. They don't leave.
Start the self-paced course, add coaching if you want a guide alongside, or grab the free "After Sec+" guide. Sec+ is the prerequisite — bring the cert, leave with the job.
Questions? Email us directly: info@cybersecproacademy.org