Sec+ to Hired — Be SOC- and Vulnerability-Analyst-Ready at Your Own Pace.

The job-launch course for analysts who already passed Security+. A self-paced, 12-module program with hands-on labs using the tools real analysts use, a dual-track resume framework (SOC L1 + Vulnerability Analyst), and an optional coaching add-on with 1:1 calls and async resume + lab review.

🎓 Sec+ Required (Prerequisite)
🔬 Hands-On SOC + Vuln Labs
🤖 AI Tutor Included
📚 Dual Track: SOC + Vuln Analyst
💰 30-Day Money-Back Guarantee
👨‍💻 Optional 1:1 Coaching

Two Tiers — Pick the One That Fits You

Sec+ is the prerequisite. Same curriculum either way — pick whether you want 1:1 coaching alongside it.

📘
Self-Paced

Self-Paced

The full 12-module curriculum and lab environment, on your time. Lifetime access — go as fast or as slow as you need. Best for self-starters who want the content and the labs.

  • All 12 modules unlocked immediately on purchase
  • Full hands-on lab environment (Splunk, Sentinel, Nessus, OWASP ZAP, TheHive, more)
  • 25 prebuilt SOC + vulnerability-management scenarios
  • CyberSecPro AI Tutor (Claude-powered)
  • Dual-track resume framework: SOC L1 + Vulnerability Analyst I
  • Lifetime access including curriculum updates
🧑‍💻
Most Popular

Self-Paced + Coaching

Everything in Self-Paced plus 1:1 coaching — four 45-minute calls scheduled around your progress, and 90 days of async resume and lab review. You're not doing this alone.

  • Everything in Self-Paced
  • 4 × 45-min 1:1 coaching calls (resume, LinkedIn, mock interview, career strategy)
  • 90 days of async resume + lab review — send work, get feedback within 48 hours
  • Direct email access to the founder during your 90-day window
  • Custom job-search game plan you keep after the coaching window closes

20 AI Cybersecurity Labs

Every lab uses real tools and AI techniques employers actually look for. You build a portfolio while you learn.

L01

Wireshark + AI Traffic Analysis AI

Capture live packets, apply ML anomaly detection to flag suspicious flows

L02

AI-Powered SIEM (Splunk) AI

Build ML correlation rules in Splunk to auto-detect attack patterns in real logs

L03

Malware Classification with ML AI

Train a Python scikit-learn classifier to distinguish benign from malicious binaries

L04

Phishing Detection with NLP AI

Build an NLP model that classifies phishing emails with 95%+ accuracy

L05

AI Red Team — Prompt Injection AI

Attack and defend LLM-based tools; document prompt injection vulnerabilities

L06

Network Anomaly Detection AI

Use Isolation Forest in Python to detect outliers in network traffic datasets

L07

Behavioral Analytics (UEBA) AI

Profile normal user behavior and trigger AI alerts on insider threat patterns

L08

AI Incident Response Automation AI

Build automated IR playbooks using AI orchestration to cut MTTR by 60%

L09

Cloud Security AI Monitoring AI

AWS CloudTrail + AI threat detection — spot privilege escalation in real time

L10

Deepfake & Social Engineering Defense AI

Analyze deepfake audio/video samples and build detection workflows

L11

Vulnerability Triage with AI (Nessus) AI

Run Nessus scans then use AI to prioritize CVEs by exploitability and business impact

L12

Active Directory Attack & AI Defense AI

Kerberoasting, Pass-the-Hash attacks + AI-powered detection and response

L13

PKI & OpenSSL Security Lab AI

Generate certs, analyze TLS connections, and use AI to detect certificate anomalies

L14

Zero-Trust Architecture Simulation AI

Implement microsegmentation + AI policy enforcement in a virtual enterprise network

L15

DevSecOps Pipeline Security AI

Embed SAST, DAST, and AI code review into a GitHub Actions CI/CD pipeline

L16

AI Threat Intelligence Aggregator AI

Build a Python tool that pulls OSINT feeds and uses NLP to surface critical IOCs

L17

Password Intelligence Lab AI

AI-driven password strength modeling + hashcat GPU cracking and defense strategies

L18

Explainable AI in Security (XAI) AI

Use SHAP and LIME to explain ML model decisions — critical for SOC analyst buy-in

L19

Cryptographic Attack Simulation AI

AI-assisted cryptanalysis lab + quantum threat modeling and post-quantum algorithms

L20

AI SOC Analyst Simulation AI

Full SOC workflow: AI-assisted alert triage, threat hunting, and escalation decisions

12 Modules to Job-Ready

Each module has a clear theme, a hands-on lab, and a portfolio-grade deliverable you can show in interviews. Self-paced — go as fast or as slow as you need.

Module 1

SOC + Vuln 101 — The Analyst Mindset

How a real SOC works (L1 / L2 / L3, escalation, MTTA/MTTR). First Splunk SPL investigation. First Nessus authenticated scan.

Module 2

Endpoint Telemetry — Sysmon + Wazuh + ELK

Build your home SOC: Sysmon with SwiftOnSecurity config, Wazuh manager + Elastic stack. Validate with Atomic Red Team.

Module 3

SIEM Triage — Splunk + Microsoft Sentinel KQL

L1 alert-queue workflow. Triage 5 real alerts across two SIEMs. SPL ↔ KQL translation. Write triage notes L2 actually reads.

Module 4

Phishing Investigation

Headers + SPF/DKIM/DMARC. any.run interactive sandbox. End-to-end phishing case with IOCs harvested and containment plan.

Module 5

EDR + Memory Forensics

EDR vs AV vs XDR — what actually matters. CrowdStrike Falcon + MDE investigation. Volatility 3 memory triage.

Module 6

Network Forensics — Wireshark + Zeek

Reading a PCAP like an analyst. Beaconing detection. Zeek conn.log pivoting. End-to-end network intrusion investigation.

Module 7

Vulnerability Management — Nessus + Qualys

Authenticated scans, CVSS × KEV × asset criticality prioritization, and the Top-15 remediation report engineering actually uses.

Module 8

Web App + Container Scanning

OWASP Top 10 for analysts. OWASP ZAP + Burp Community + Trivy. DevSecOps-style triage of staging vulns.

Module 9

MITRE ATT&CK + Threat Intel

ATT&CK Navigator coverage maps. MISP threat intel feeds. Draft a Sigma rule to close a detection gap.

Module 10

Cloud + Identity Security

AWS GuardDuty + CloudTrail + Athena for cloud SOC. BloodHound for Active Directory attack-path mapping.

Module 11

Incident Response — PICERL + TheHive

The PICERL framework in practice. Solo IR runbook walkthrough. End-to-end case in TheHive + Cortex SOAR.

Module 12

Career Launch — Resume + Interview + Capstone

SOC + Vuln Analyst resumes. STAR-IR interview framework. Capstone simulation. Portfolio + applications plan.

What Students Say

Real reviews from real students — posted publicly on LinkedIn.

Stories from students taught by Bonifacio Capuyan — CISM, CISA, CSA, CAD, CIS-VR.

★★★★★
"I was lucky enough to have been partnered with Bon when I was enrolled in my cybersecurity bootcamp. His expertise helped guide me as I navigated through the course. He was patient and readily available to answer any questions that may arise. Bon's techniques were valuable in my journey and I was able to finish the program ahead of time. Great mentor, highly recommended!"
★★★★★
"Bon is awesome at what he does! and is very knowledgeable overall with a lot of experience variety in cybersecurity! He was my mentor for my cybersecurity boot camp from April 2023 through September 2023 and helped me with whatever questions I had or needed and also led me to other things such as creating a roadmap/ideas and advice that will help me break into the Cyber industry! Glad I can reach out to him for any questions or guidance I may have."
★★★★★
"Bon is an amazing resource in the Cybersecurity industry. Having him as a mentor for me showed his aptitude and familiarity with Cybersecurity and all of its facets. Learning from him was a wonderful experience as he explained different systems as well as the process one takes to get into the industry and how to better oneself. His enthusiasm in teaching this subject ignited a passion in me for the same industry and keeps me motivated. Bon is one person I'll always make sure to come back to for any questions and help."
★★★★★
"I had the honor of having Bon as my mentor during my USF Cybersecurity Bootcamp from Dec–May 2023. Bon was amazing in many ways. He is very knowledgeable about all aspects in the field, which made it very easy for him to address any of my questions and/or concerns. Our meetings were always on time and worth my while. He was always eager to help out with technical issues, cyber questions, and was complementary when he noticed I was doing well. I most definitely recommend Bon for any mentoring position! He is patient and knows how to explain what is needed to be accomplished."
★★★★★
"Bon has been more than a mere mentor of mine for the past six months — he has been a great help. He always takes the time out to ensure that I grasp the different concepts and topics regardless of the level of difficulty or amount of time required. He is always available, extremely reliable and dedicated to my success. He is evidently very versed in the Cybersecurity field and I am certain that my experience as a student in this bootcamp was so smooth because I had him in my corner."
★★★★★
"I was mentored in Cyber Security and my experience was fantastic! He knows his stuff!"
🛡️

30-Day Money-Back Guarantee

Try CyberSec Pro Academy for 30 days. Go through the lessons. Do the labs. Use the community. If you don't feel like this is the best investment you've made in your career — email us and we'll refund every penny. No questions asked.

We can offer this because we know what happens when people actually go through the program. They don't leave.

Ready to launch your security career?

Start the self-paced course, add coaching if you want a guide alongside, or grab the free "After Sec+" guide. Sec+ is the prerequisite — bring the cert, leave with the job.

Download Free Guide Self-Paced — $497 Self-Paced + Coaching — $997

Questions? Email us directly: info@cybersecproacademy.org