COLLABORATION WITH


Cyber Security & Ethical Hacking


Enrolled Students:- 150+
Resume Shortlisted:- 40+
Got Hired:- 10+
Life time access for customized Dashboard
Earn program completion and Internship completion certificate


Career Options

  1. Network Security Engineer
  2. Cyber Security Analyst
  3. Chief Security Manager
  4. Chief Information Security Officer
  5. Information Security Analyst
  6. Ethical Hacker

What will you learn?

  1. Introduction to Cybersecurity.
  2. Introduction to Ethical Hacking
  3. Learn about Log and its types.
  4. Different methods to prevent the system from hacking.
  5. Introduction to Network Security

Skills Gained



  1. Proficiency in identifying and assessing vulnerabilities in computer systems and networks.

  2. Skills in using ethical hacking methodologies to identify and fix security weaknesses before malicious hackers exploit them.
  1. Competence in using a variety of security tools, such as penetration testing tools, firewalls, and intrusion detection systems.

  2. Knowledge of incident response procedures and digital forensics techniques to investigate and respond to security incidents.


PROGRAM LESSONS

Chapter 1 Networking : Introduction To Networking
  • 1.1. TYPES OF NETWORKS
  • 1.2. BASIC TERMINOLOGIES
  • 1.3. OSI MODEL
  • 1.4. PROTOCOLS
  • 1.5. COMMON PROTOCOLS AND PORTS
Chapter 2. Linux : INSTALLING KALI LINUX
  • 2.1 LINUX BASIC COMMANDS
  • 2.2 INTERMEDIATE COMMANDS
  • 2.3 LINUX DIRECTORY & FILE PERMISSIONS
  • 2.4 LINUX UTILITIES
Chapter 3. Introduction to Ethical Hacking:
  • 3.1 Information Security Overview
  • 3.2 Cyber Kill Chain Concepts
  • 3.3 Hacking Concepts
  • 3.4 Ethical Hacking Concepts
  • 3.5 Information Security Controls
  • 3.6 Information Security Laws and Standards
Chapter 4.Footprinting and Reconnaissance
  • 4.1 Footprinting Methodology
  • 4.2 Footprinting through Search Engines
  • 4.3 Footprinting through Web Services
  • 4.4 Footprinting through Social Networking Sites
  • 4.4 Website Footprinting
  • 4.5 Email Footprinting
  • 4.6 Whois Footprinting
  • 4.7 DNS Footprinting
  • 4.8 Network Footprinting
Chapter 5. Scanning Networks
  • 5.1 Network Scanning Concepts
  • 5.2 Scanning Tools
  • 5.3 Host Discovery
  • 5.4 Port and Service Discovery
  • 5.5 OS Discovery
  • 5.6 Scanning Beyond IDS and Firewall
Chapter 6. Enumeration
  • 6.1 Enumeration Concepts
  • 6.2 NetBIOS Enumeration
  • 6.3 SNMP Enumeration
  • 6.4 LDAP Enumeration
  • 6.5 NTP and NFS Enumeration
  • 6.6 SMTP and DNS Enumeration
Chapter 7. System Hacking
  • 7.1 System Hacking Concepts
  • 7.2 Gaining Access
  • 7.3 Cracking Passwords
  • 7.4 Vulnerability Exploitation
  • 7.5 Escalating Privileges
  • 7.6 Maintaining Access
  • 7.7 Executing Applications
  • 7.8 Hiding Files
Chapter 8. Denial-of-Service
  • 8.1 DoS/DDoS Concepts
  • 8.2 DoS/DDoS Attack Techniques
  • 8.3 Botnets
  • 8.4 DDoS
  • 8.5 Case Study
  • 8.6 DoS/DDoS Attack Tools
Chapter 9. Evading IDS, Firewalls, and Honeypots
  • 9.1 IDS, IPS, Firewall, and Honeypot Concepts
  • 9.2 IDS, IPS, Firewall, and Honeypot Solutionss
  • 9.3 Evading IDS
  • 9.4 IDS/Firewall Evading Tools
  • 9.5 Detecting Honeypots
  • 9.6 IDS/Firewall Evasion Countermeasures
Chapter 10. Hacking Web Applications
  • 10.1 Web App Concepts
  • 10.2 Web App Threats
  • 10.3 Web App Hacking Methodology
  • 10.4 Footprint Web Infrastructure
  • 10.5 Analyze Web Applications
  • 10.6 OWASP TOP 10
Chapter 11. Hacking Wireless Networks
  • 11.1 Wireless Concepts
  • 11.2 Wireless Encryption
  • 11.3 Wireless Threats
  • 11.4 Wireless Hacking Methodology
  • 11.5 Wireless Hacking Tools
  • 11.6 Bluetooth Hacking
  • 11.7 Wireless Countermeasures
Chapter 12. Hacking Mobile Platforms
  • 12.1 Mobile Platform Attack Vectors
  • 12.2 Hacking Android OS
Chapter 13. Cryptography
  • 13.1 Cryptography Concepts
  • 13.2 Encryption Algorithms
  • 13.3 Cryptography Tools
  • 13.4 Public Key Infrastructure (PKI)
  • 13.5 Email Encryption
  • 13.6 Disk Encryption
Check Curriculum


PROJECT

Design
Scanning using OWASP ZAP

OWASP ZAP Scans: Analyzing systems for vulnerabilities.

Content
System Hacking

System Hacking: Understanding and breaching system security..


Design
Keylogger

Keylogger: Tracking and recording keystrokes.

Content
Scanning for Open ports and Attacking

Port Scanning Attacks: Identifying and exploiting open ports.


PRICING PLANS

Standard Plan

Rs. 1999

+18% GST
  • Program Duration : 2 month
  • 2 Major Projects
  • 30+ Hours of content
  • Internship Offer Letter
  • Internship Completion Certificate
  • Program Completion Certficate
  • Fee is applicable only for the platform
Student Choice

Rs. 2699

+18% GST
  • Program Duration : 3.5 months
  • 25+ Hours of Content
  • 4 Projects
  • Live Sessions During Project Execution & Training
  • Microsoft Certification
  • Internship Offer Letter
  • Internship Completion Certificate
  • Project Report
  • Fee is applicable only for the platform and Microsoft certification examination

Sample Certificate