A Guided Program for Final-Year Students to Launch Their Cybersecurity Career – Weekends only – 100% offline
✅ 1. Program Structure & Timeline: CYBERPATH 2026
Duration: 6 Months (ideal for final-year students from Aug 2025 to Jan 2026)
Format: Blended (Live + Self-paced) with Weekend (Offline on Saturdays & Sundays) & Bootcamps
Hours Required: ~20 hours/week (10h self-paced + 10h offline sessions)
📘 Module-wise Curriculum:
🔹 Module 1: Cyber Foundations (Month 1)
Goal: Build solid understanding of networking, Linux, and basic security
Week | Topics Covered |
---|---|
W1 | Introduction to InfoSec, Pentesting & CIA Triad |
W2 | Networking Basics: OSI Model, TCP/IP, DNS, Ports |
W3 | Linux for Hackers – CLI, File System, Bash Commands |
W4 | Virtual Lab Setup (Kali, OWASP JuiceShop, DVWA) |
Outcomes:
- Students will run basic recon on their lab setups
- Ready for online labs (TryHackMe Pre-Security Path)
🔹 Module 2: Web Hacking Essentials (Month 2)
Goal: Learn OWASP Top 10 vulnerabilities and test on real labs
Week | Topics Covered |
---|---|
W1 | Web Architecture, HTTP, HTML/JS Basics |
W2 | XSS, SQLi, IDOR, CSRF |
W3 | Security Misconfiguration, Broken Auth, Session Mgmt |
W4 | PortSwigger Academy Labs (Beginner + Intermediate) |
Outcomes:
- Students document their first 5 vulnerability walkthroughs
- GitHub repo or blog setup for documentation
🔹 Module 3: Scripting & Automation (Month 3)
Goal: Automate recon, write scripts, and understand exploit basics
Week | Topics Covered |
---|---|
W1 | Python Basics for Pentesters |
W2 | Bash for automation, Nmap scripting |
W3 | Intro to Exploit Dev (Buffer Overflows) |
W4 | Metasploit & Payloads, Netcat, Reverse Shells |
Outcomes:
- Create 2 custom Python/Bash scripts for recon or brute-forcing
- Submit as part of GitHub portfolio
🔹 Module 4: Advanced Web Exploitation (Month 4)
Goal: Go deeper into real-world vulnerabilities and exploit chaining
Week | Topics Covered |
---|---|
W1 | Advanced XSS (DOM, Stored), Bypassing Filters |
W2 | Advanced SQLi, SSRF, Authentication Bypass |
W3 | IDOR, Race Conditions, Logic Flaws |
W4 | Live Capture the Flag (CTF) + Blog Writeup |
Outcomes:
- Publish 1 advanced bug walkthrough (e.g., IDOR+Privilege Escalation chain)
🔹 Module 5: Network & System Pentesting (Month 5)
Goal: Learn internal network attack paths and privilege escalation
Week | Topics Covered |
---|---|
W1 | Nmap, SMB/FTP Enumeration, Hydra, Netcat |
W2 | Privilege Escalation (Linux/Windows) using LinPEAS/WinPEAS |
W3 | Password Cracking (John, Hashcat) |
W4 | Full Internal Pentest Simulation & Reporting |
Outcomes:
- Write internal pentest report for lab targets
- Resume-ready reporting experience
🔹 Module 6: Job Readiness + Specialized Topics (Month 6)
Goal: Prepare for certification, job interviews, and final showcase
Week | Topics Covered |
---|---|
W1 | Report Writing (CVSS, Executive Summary) |
W2 | Resume Building, LinkedIn Profile, Mock Interviews |
W3 | Certifications Prep (eJPT, Pentest+) |
W4 | Final Showcase: Live Demo + Portfolio Presentation |
Outcomes:
- Publish a complete penetration test report on GitHub
- Participate in at least 1 mock interview or CTF challenge
🏁 Bonus Track (Optional):
- Mobile Security (Android Basics + Frida)
- Wireless Hacking (Aircrack-ng)
- Cloud Security (AWS IAM enumeration, S3 bucket testing)
✅ 2. Eligibility, Delivery Mode & Certification Path for CYBERPATH 2026
🎓 Eligibility Criteria
Criteria | Details |
---|---|
Academic Year | Final-year UG students (graduating in 2026) |
Background | Any stream with interest in Cybersecurity (preferably CSE, IT, ECE) |
Prerequisites | Basic computer usage, willingness to learn Linux, networking fundamentals |
Selection Mode | Institution nominations / Direct enrollment / Referrals / Open for all |
🧑🏫 Delivery Mode Options
Blended Learning Model (Most Practical & Scalable)
Component | Mode | Notes |
---|---|---|
Live Sessions | Weekly live lectures or recorded videos | Led by industry mentors |
Hands-on Labs | Self-paced with guided assignments | Hosted on TryHackMe / PortSwigger / DVWA / local VMs |
Mentorship Clinics | Monthly Q&A and project walkthroughs | Mentors review progress, guide the milestones |
Assignments | Weekly practical tasks (scripting, exploitation, reporting) | Reviewed via GitHub |
Weekend Bootcamps | Optional deep-dive sessions (Hackathons, CTFs) | 3-4 hours monthly, hybrid or physical |
Career Coaching | Mock Interviews, Resume Clinics, Portfolio Reviews | Month 5 onwards |
🏅 Certification Pathways
Students will be encouraged to pursue ONE industry-relevant certifications mapped to their learning level.
Sample Certification | Ideal Time | Relevance |
---|---|---|
TryHackMe Certificate of Completion | Month 2 | Showcases learning path completion |
eJPT (Junior Penetration Tester) | Month 4–6 | Entry-level exam with hands-on lab focus |
CompTIA PenTest+ | Month 5 or later | Good for students applying in compliance-focused orgs |
Burp Suite Certified Practitioner | Month 6 or later | Web-focused – strong portfolio booster |
🎓 CYBERPATH Completion Certificate (Issued by BCBUZZ / CYBERXPERTZ / SHEGUARDS)
Upon successfully completing:
- Minimum 80% attendance in sessions
- All module assignments
- 1 final project + GitHub portfolio
The certificate will:
- Endorse practical skills covered
- Be co-branded (if partnered with college or industry)
- Include mentor endorsements (optional)
✅ 3. Engagement Models: Industry, Mentorship & Guest Sessions for CYBERPATH 2026
To ensure real-world relevance, employability, and visibility of the CYBERPATH 2026 program, structured external engagement is essential.
🧠 A. Mentor Engagement Model
Role | Description |
---|---|
Lead Mentor(s) | Experienced Ethical Hackers / Red Teamers who conduct core sessions or weekend bootcamps. Ideally from your own team or partner orgs. |
Lab Mentors / TA | 1–2 lab assistants per cohort to help with day-to-day issues, GitHub reviews, feedback. Final-year interns can assist. |
Mock Interview Panel | Mentors or volunteers from the community (CTF players, bug bounty hunters, or working professionals). |
Portfolio Reviewers | Offer 10–15 min portfolio audits to give career suggestions and improvement feedback. |
✅ 4. Placement-Readiness Plan for CYBERPATH 2026
To ensure your students are job-ready, we’ll build a strong project + portfolio + certification + interview funnel. This structure gives them visibility and credibility with recruiters.
🧳 A. GitHub Portfolio Building
Every student should graduate with a professional GitHub profile containing:
Item | Description |
---|---|
✅ Repo 1: Lab Walkthroughs | DVWA, JuiceShop, TryHackMe rooms (e.g., OWASP Top 10) |
✅ Repo 2: Scripting Projects | Custom recon scripts, automation tools (Python/Bash) |
✅ Repo 3: Final Pentest Report | Simulated end-to-end test of a vulnerable app with screenshots, findings, CVSS scores, and remediation |
✅ Repo 4: Writeups | XSS/IDOR/SQLi with description, PoC, and fix recommendations |
✅ README | Clear descriptions, links to published blogs, contact info |
📝 B. Resume and LinkedIn Optimization
Resume Structure:
- Header: Contact info + GitHub + LinkedIn
- Profile Summary: “Final-year student trained in Ethical Hacking & Pentesting under CYBERPATH 2026…”
- Technical Skills: Tools, protocols, platforms (Burp, Nmap, Metasploit, Linux, Python, etc.)
- Projects: Lab exploits, CTF writeups, scripts (with GitHub links)
- Certifications: eJPT, TryHackMe paths, Burp Suite Practitioner (if completed)
LinkedIn Strategy:
- Optimize profile headline: “Final Year Cybersecurity Student | Pentester | eJPT Aspirant | GitHub: github.com/username”
- Showcase certificates, blogs, project links
- Weekly activity: Share lab completions, posts from mentors, or Cybersecurity articles
💼 C. Interview & Placement Preparation
Phase | Activity | Outcome |
---|---|---|
Mock Interviews | Conducted by mentors or professionals | Familiarity with real interview patterns |
Technical Drills | Questions like “Explain SQLi exploitation” or “How does a reverse shell work?” | Clear articulation |
Scenario-based Exercises | Given a test lab, write a short report | Job simulation |
Resume Clinics | 1-on-1 reviews by career coach or mentor | Final edits + ATS-friendly format |
Job Tracking Sheet | Shared Excel/Notion board with roles, dates, follow-ups | Organized application process |
🧲 D. Placement Channels & Strategy
Channel | Approach |
---|---|
Partner Companies | Pitch top-performing candidates for internship or freelance roles |
LinkedIn Campaigns | Run “#HireFromCyberpath” hashtag with project highlights and alumni testimonials |
Alumni Referrals | Early cohorts can refer new graduates into their companies |
Freelance Start | Encourage students to bid for freelance VAPT |
Startup Internship Portal | Hosted short internships for qualified students to gain client-facing experience |
🏁 Final Milestone: Placement Day or CyberShowcase
- Live Zoom or Physical Event
- Each student/team presents:
✅ Their portfolio
✅ Lab walkthrough
✅ Final pentest project - Digital badges for those who complete 100% of tasks
Enrollment Fees:
Actual cost of the Program: Rs. 20000
Early registration : Rs. 9999
(Last date : 7th Aug, 2025)
How to register for the program:
Step 1: Pay the Fee to below account & keep the Transaction Number & Screenshot Handy
Account Name : BCBUZZ TECHNOLOGIES PRIVATE LIMITED
ACCOUNT Number: 23510200001676
Type : Current Account
Bank : Federal Bank, Sundarapuram, Coimbatore
IFSC : FDRL0002351
(Payment can be made from UPI -> Pay account number option)
Step 2: Please email the Transaction ID / Screenshot / Student ID card / Name & Contact Number to below email ID:
accounts@bcbuzz.io
