Curriculum
- 40 Sections
- 256 Lessons
- 18 Weeks
Expand all sectionsCollapse all sections
- Module 01:Foundation of Cyber Security & Ethical Hacking12
- 1.1Information Security Overview & Understanding Cyber Security
- 1.2Hacking Methodologies and Frameworks
- 1.3Hacking Concepts
- 1.4Ethical Hacking Concepts
- 1.5Information Security Controls
- 1.6CIA Triad
- 1.7AAA Model
- 1.8TCP 3-Way Handshake Process
- 1.9Threat, Vulnerability, Risk
- 1.10Types of Attack (Malware, Phishing, DoS)
- 1.11Quiz for Foundation of Cyber Security & Ethical Hacking0 Questions
- 1.12Project / Assignment for Foundation of Cyber Security & Ethical Hacking
- Module 02: Foundation of Networking14
- 2.1What is networking? Types of Networking
- 2.2OSI Layer and OSI Attack
- 2.3IP Class, IP Types
- 2.4PAN, LAN, MAN, WAN
- 2.5Components of Networking
- 2.6Architecture of Networking
- 2.7Network Topology
- 2.8Network Media
- 2.9Overall Computer System
- 2.10Network Devices (Router, Switch, Firewall)
- 2.11TCP, UDP, DNS, DHCP, ARP
- 2.12Network Ports and Protocols
- 2.13Quiz for Foundation of Networking
- 2.14Project / Assignment for Foundation of Networking
- Module 03: Ethical Hacking Lab Setup & Virtualization14
- 3.1Virtualization overviewCopy
- 3.2How to create a Virtual MachineCopy
- 3.3Overview of Lab setupCopy
- 3.4Requirements of Lab SetupCopy
- 3.5Download VMware Workstation & Oracle Virtual BoxCopy
- 3.6Download Kali Linux, Nessus, Acunetix & BurpsuiteCopy
- 3.7Download Mobexler for Mobile Application Testing
- 3.8Complete Cyber Security lab Setup
- 3.9Install and Setup Nessus
- 3.10Install and Setup Acunetix
- 3.11Install and Setup Burp Suite
- 3.12Quiz for Ethical Hacking Lab Setup & Virtualization0 Questions
- 3.13Install and Setup Mobexler and MobSF
- 3.14Project / Assignment for Ethical Hacking Lab Setup & Virtualization
- Module 04: Kali Linux for Cyber Security & Hacking9
- 4.1Overview of Kali Linux
- 4.2Commands of kali Linux
- 4.3Practicing of kali Linux
- 4.4Linux File System & Commands
- 4.5User & Permission Management
- 4.6Linux Update & Upgradations
- 4.7How to Download & Install Cyber Security tools in Kali Linux
- 4.8Quiz for Kali Linux for Cyber Security0 Questions
- 4.9Project / Assignment for Kali Linux for Cyber Security
- Module 05 : Information Gathering, Footprinting & ReconnaissancePart 01: Active & Passive Information Gathering10
- Module 06 : Information Gathering, Footprinting & ReconnaissancePart 2: Active & Passive Information Gathering7
- Module 07: Network Enumeration9
- 7.1Service Enumeration
- 7.2Port & Protocols Enumeration
- 7.3Software Version Enumeration
- 7.4Operating System Enumeration
- 7.5Enumeartion through nmap
- 7.6Enumeartion through Nikto
- 7.7Enumeartion through NmapAutomator (Advanced Technology)
- 7.8Quiz for Network Enumeration0 Questions
- 7.9Project / Assignment for Network Enumeration
- Module 08: Vulnerability Assessment9
- 8.1Vulnerability Assessments Concepts
- 8.2Vulnerability Assessments on Server by Nessus
- 8.3Vulnerability Assessments on Web Application by Acunetix
- 8.4Vulnerability Assessment Methodology
- 8.5Vulnerability Scanning Techniques
- 8.6Types of Vulnerabilities
- 8.7Vulnerability Assessment Tools
- 8.8Quiz for Vulnerability Assessment0 Questions
- 8.9Project / Assignment for Vulnerability Assessment
- Module 09: Vulnerability Assessments Reporting12
- 9.1Vulnerability Assessments Report Generate
- 9.2Vulnerability Assessments Report Analysis
- 9.3Introduction to VA Reporting
- 9.4Report Structure & Documentation Standards
- 9.5Vulnerability Classification & Severity Rating
- 9.6Scope, Methodology & Assumptions
- 9.7Remediation & Recommendation Writing
- 9.8Report Presentation & Communication
- 9.9Writing Technical Findings
- 9.10Make a Professional Vulnerability Assessments Report for Client
- 9.11Quiz for Vulnerability Assessments Report0 Questions
- 9.12Project / Assignment for Vulnerability Assessments Report
- Module 10: Web Application Overview & Directory Traversal Attacks15
- 10.1HTTP vs HTTPS
- 10.2TCP and UDP
- 10.3Web Server and Application Concept
- 10.4How to Secure Web Application
- 10.5Web Application Hacking Methodology
- 10.6Web Application Threat
- 10.7Discussion on Directory Traversal
- 10.8Directory Traversal Attack by Dirsearch
- 10.9Directory Traversal Attack by Dirbuster
- 10.10Directory Traversal Attack by Gobuster
- 10.11Directory Traversal Attack by FFuf
- 10.12Wordlist for Directory Traversal Attacks
- 10.13Perform Nikto Attack
- 10.14Quiz for Web Application Overview & Directory Traversal Attacks0 Questions
- 10.15Project / Assignment for Web Application Overview & Directory Traversal Attacks
- Module 11: Brute force Attack, Dictionary, Wordlist, Intruder Attack7
- 11.1Discussion on Brute force Attack, Dictionary, Wordlist, Intruder Attack
- 11.2How create a password wordlist
- 11.3How to create a user wordlist
- 11.4Perform Brute force attack and Intruder attack
- 11.5Password and User Cracking through Hydra Attack
- 11.6Quiz for Brute force Attack, Dictionary, Wordlist, Intruder Attack0 Questions
- 11.7Project / Assignment for Brute force Attack, Dictionary, Wordlist, Intruder Attack
- Module 112: SQL Injection AttackAutomated SQLi Attack7
- Module 13: SQL Injection Attack (Manual Testing)6
- Module 14: XSS (Cross-Site Scripting) Attack3
- Module 15: DOS/DDOS Attack7
- Module 16: Mobile Application Security Testing9
- 16.1Mobile Platform Attack Vectors
- 16.2Mobile Security Guidelines
- 16.3Mobile Security tools
- 16.4Mobile Application Security Testing through Mobexler
- 16.5Mobile Application Security Testing through MobSF
- 16.6How to protect Mobile Application from Hacking
- 16.7Mobile Application Security Testing Report Analysis
- 16.8Quiz for Mobile Application Security Testing0 Questions
- 16.9Project / Assignment for Mobile Application Security Testing
- Module 17: CSRF (Cross-Site Request Forgery)0
- Module 18: Perform FTP, Telnet & SSH Attack on Server10
- 18.1Discussion on Metasploit Framework
- 18.2Hacking Methodology
- 18.3Perform FTP Attack
- 18.4Perform SSH Attack
- 18.5Perform Telnet Attack
- 18.6How to Protect from FTP Attack
- 18.7How to Protect from SSH Attack
- 18.8How to Protect from Telnet Attack
- 18.9Quiz for Metasploit framework and Perform FTP, Telnet & SSH Attack0 Questions
- 18.10Project / Assignment for Metasploit framework and Perform FTP, Telnet & SSH Attack
- Module 19: Perform Samba, HTTP Attack on Server6
- Module 20: Malware Analysis10
- Module 21: Familiar with Top Cyber Security Tools9
- 21.1Installing & Configuration Burp Suite tools
- 21.2How to use Burpsuite
- 21.3Setup Proxy with Burpsuite
- 21.4How to use Metasploit framework
- 21.5Nessus, Acunetix, Nmap, Nmap Automator
- 21.6Mobexler & MobSF
- 21.7Kali Linux, Merasploit etc.
- 21.8Quiz for Cyber Security Tools0 Questions
- 21.9Project / Assignment for Cyber Security Tools
- Module 22: Man-in-The Middle Attack6
- Module 23: Session Hijacking and SQL Login Bypass Attack6
- Module 24: LFI (Local File Inclusion)9
- Module 25: Liver Server Hacking5
- Module 26: Social Engineering Attack8
- Module 27: TryHackMe, Vulnhub, Hack the Box5
- Module 28: Cryptography10
- 28.1Cryptography Concepts
- 28.2Plaintext & Ciphertext
- 28.3Symmetric and Asymmetric Algorithm
- 28.4Digital Certificate & Digital Signature
- 28.5C-I-Authenticity
- 28.6Hardware Security Module (HSM)
- 28.7Public key & private Key
- 28.8Encryption & decryption process
- 28.9Quiz for Cryptography0 Questions
- 28.10Project / Assignment for Cryptography
- Module 29: Physical and Environmental Security of Data Center6
- Module 30: ICT Security Policy & IT Audit6
- Module 31: Incident Response & Cyber Laws7
- Module 32: Freelancing (Part 01)4
- Module 33: Prepare & Set Up Freelancing Profile & PortfolioFreelancing Part 025
- Module 34: Bug Bounty5
- Module 35: Freelancing and Bug Bounty Hunting: Finding Clients / Opportunities4
- Module 36: Internship, Job Preaparation and Placement5
- Final Exam3
- Thesis paper Writing for Cyber Security & Ethical hacking3
- Graduation Day0
- Call for Internship & Job Placement0
Hacking Methodologies and Frameworks
Next