Topics for this course
Cyber Security : Module 1
-
Section 1 : Introduction to Ethical hacking
-
Why we need cybersecurity
-
Ethical Hacking vs Cyber Security
-
Phases Of Hacking
-
Types of Hackers
-
CIA Triad
-
Info Sec Controls
-
DAD Triad
-
Zero Trust
-
Non Redpudiation
-
AAA of Security
-
Gap Analysis
-
Complaince Standards
-
Cybersecurity Terminologies
-
Creating Virtual Lab
-
Enabling Virtualization in BIOS
-
Downloading Virtual Lab Tools
-
Installing VMware workstation player
-
Installing and configuring Kali Linux
-
Installing and configuring Metasploitable 2
-
Installing and configuring Windows VM
-
Testing VM Lab
-
Section 2 : Introduction to Networking
-
Objectves of Networking
-
How Data Travels
-
Types of Networks
-
Understanding IP Addresses
-
Role of IP Addresses
-
Understanding NAT
-
Understanding Ports
-
Understanding Services
-
Ports and Services
-
Protocols and OSI Model
-
Protocols and TCP IP Model_backup
-
Understanding DNS
-
Online Anonymity and VPN
-
Hands on Using VPN
-
Anonymity tools Proxy
-
Hands on Using Proxy
-
TOR The Onion Router
-
Hands on Using TOR
-
Quiz
Module 2
-
Introduction Passive Info Gathering
-
Using Whois
-
Using Builtwith
-
Reverse IP Lookup
-
Subdomain Finder
-
Footprinting Social Media
-
People Finder Tools
-
Using Archive.org
-
Have I been pawned
-
Temp Mail
-
Spoofing Emails
-
Tracing Emails
-
Fake ID Generator
-
Google Dashboard
-
Google Dorks
-
Default Passwords
-
Intro to NMAP
-
NMAP Scanning Multiple IPs-1
-
NMAP Scanning Multiple IPs-2
-
Active Scanning
-
Nmap storing output
-
NMAP Scanlist
-
Zenmap for Windows
Module 3
-
Section A : Understanding Vulnerabilities
-
Memory Injection Buffer Overflow
-
Race Conditions
-
Preventing Race Conditions
-
Malicious Updates
-
OS Vulnerabilities
-
SQL Injections
-
XSS Vulnerabilities
-
Hardware Vulnerabilities
-
VM Vulnerabilities
-
Cloud Vulnerabilities
-
Mitigating Cloud Vulnerabilities
-
Supply Chain Vulnerabilities
-
Mitigating Supply Chain Vulnerabilities
-
Cryptographic Vulnerabilities
-
Mitigating Cryptographic Vulnerabilities
-
Misconfiguration Vulnerabilities
-
Mitigating Misconfiguration Vulnerabilities
-
Mobile Device Vulnerabilities
-
Mitigating Mobile Device Vulnerabilities
-
Zero Day Vulnerabilities
-
Vulnerability Management
-
Vulnerability Assessment
-
Types of VA
-
Vulnerability Management Life cycle
-
Vulnerability Assessment Pre-Engagement Process
-
Vulnerability Assessment Post-Engagement Process
-
Vulnerability Scanning
-
Application Security Scanning
-
Threat Feeds
-
Penetration Testing
-
Bug Bounty Programs
-
False Positives False Negatives
-
Creating and Maturing vuln assessment program
-
Implementing Infrastructure Vuln Management Lifecyle
-
Implementing Application Vuln Management Lifecyle
-
Implementing Cloud Vuln Management Lifecyle
-
Implementing Overall Vuln Management Lifecyle
-
Common Industry Challenges
-
Best Practices
-
Case Study Mature VM Program
-
Case Study Immature VM Program
-
Lessons Learnt
-
Patch Management, Updates, Hotfixes
-
Section B : Understanding CVSS Score
-
Understanding CVE
-
Hands on CVE Analysis
-
Understanding CWE
-
Accessing Vulnerability Databases
-
Mitre Attack Framework
-
National Vulnerability Database
-
OWASP TOP 10
-
SANS Top 25
-
Information gathering for Endpoints
-
How Information gathering for Endpoints Helps
-
Information gathering tools for Endpoints
-
Section C : Using MBSA Tool for Windows Vulnerability Assessment
-
Using Pen test Tool for Online Web Application VA
-
Installing Nessus Vulnerability Assessment Tool
-
Using Nessus for Host Discovery
-
Using Nessus for Basic Network Vulnerabilities Scan
Module 4
-
Introduction to Web Applications
-
Hacking Web Applications
-
Textboxes in Web Applications
-
Parameter Tampering
-
Hand On Parameter Tampering
-
What is command Injection
-
Hands On command Injection
-
Understanding Reflected XSS Attacks
-
Understanding Stored XSS Attacks
-
Introducing Burpsuite
-
Configuring Burpsuite
-
Using Burpsuite for session hijackings
-
Intro to Database and SQL
-
Understanding SQL Injections
-
Intro to Authentication Bypass
-
Understanding How Authentication Bypass Works
-
Hands on Simple Authentication Bypass
-
Intro to SQLMap
-
Hands on SQLMap
-
Preventing SQL attacks
Module 5
-
Introduction to Password Hacking and Steganography
-
Types of Steganography
-
Image Steganography
-
Image Steganography Hands on using Quick Stego
-
Image Steganography Hands on using OpenStego
-
Image Steganography Hands on using Online Stego
-
Mobile Steganography Tools
-
Audio Steganography
-
Keyloggers
-
Defense against Keyloggers
-
Software Keyloggers
-
Introduction to Spyware
-
Hands on Using Spytech Spyware
-
Defending against spyware
-
Password Cracking Techniques
-
Password Cracking Attacks
-
Understanding Hashes and SAM
-
Using Rockyou.txt
-
Using Rockyou.txt in Kali Linux
-
Using Cewl tool for dictionary
-
Password Strength
-
Hacking Passwords with John the Ripper
-
Hacking Documents Passwords Online
-
Understanding Rainbow Tables
Module 6
-
Introduction to Malware
-
Why are Malware Created
-
How are Malware Spread
-
Types of Malware
-
Types of Virus
-
Boot Sector Virus
-
Macro Virus
-
Program Virus
-
Multipartite Virus
-
Encrypted Virus
-
Stealth Viruses
-
Armored Virus
-
Hoax Virus
-
worm virus
-
Backdoor
-
Logic Bomb
-
Ransomware
-
Grayware
-
Spyware
-
Rootkits
-
SPAM and SPIM
-
Bloatware
-
Trojan Horse
-
Why Create Trojan
-
Types of Trojans
-
Trojan Kits
-
RAT – Remote Access Trojan
-
RAT Kits
-
Fileless Malware
-
Virus Creation Tools
-
Simple Batch Virus Ex1
-
Adding Shutdown Virus to Startup
-
Creating Fork Bomb Virus
-
Creating Application Flood Virus
-
Creating Infinite Folders Virus
-
Creating Virus With JPS Virus Maker
-
Creating Virus With Bhavesh Virus Maker
-
Symptoms of virus and malware
-
Detecting Viruses
-
Removing Malware
-
Hands on Malware Detection
Module 7
-
Introduction to Social Engineering
-
Impact of Social Engineering Attacks
-
Effectiveness of Social Engineering
-
Insider Threats
-
Impersonation
-
Identity Theft
-
Identity Theft Countermeasures
-
Deep Fakes
-
Phishing
-
Phishing Examples
Module 8
-
-
OWASP Top 10 Mobile Risks
-
Types of Mobile Security
-
Traffic Security
-
Barrier Security
-
IMEI Number
-
Lost Mobile Phone
-
Hands On Find My Device
-
Hands On IMEI Tracker
-
Hands On Lost Stolen Mobile
-
Mobile Malware
-
Mobile Rooting
-
MDM
-
MDM Key Features
-
Popular MDM Solutions
-
LAB setup for Android Payload Hacking
-
Hands On Android Payload Part 1
-
Hands On Android Payload Part 2
-
Hands On Android Payload Part 3
-
Hands On Android Payload Part 4
-
Mobile Hardening
Module 9
-
Wifi Network Concepts
-
Benefits of Wifi
-
Wifi Network Concepts
-
Wifi Encryptions
-
Wifi Attack Vectors
-
What is MAC Address
-
Hands On MAC Spoofing In Windows
-
Hands On MAC Spoofing In Kali Linux
-
Hands On Sniffing WIFI Traffic Part 1
-
Hands On Sniffing WIFI Traffic Part 3
Description
This Ethical Hacking and Cybersecurity course provides a complete practical and theoretical foundation in modern information security. Learners start with cybersecurity fundamentals, ethical hacking concepts, and security principles, then move into networking, anonymity, reconnaissance, vulnerability assessment, and penetration testing. The course emphasizes hands-on labs using Kali Linux, Metasploitable, Windows VMs, and industry tools like Nmap, Nessus, Burp Suite, and SQLMap. It covers web, mobile, cloud, malware, Wi-Fi, and social engineering attacks, along with defense, compliance, and best practices. By the end, students gain real-world skills to identify, exploit, and mitigate security risks responsibly.
What I will learn?
- Understand ethical hacking concepts, cybersecurity principles, attack methodologies, and defensive strategies used by professionals across real-world environments.
- Build and manage a complete virtual hacking lab using Kali Linux, Windows, Metasploitable, and security testing tools.
- Perform network scanning, reconnaissance, anonymity techniques, and information gathering using Nmap, proxies, VPNs, and TOR.
- Identify, assess, and manage vulnerabilities using CVE, CVSS, Nessus, vulnerability management lifecycles, and industry frameworks.
- Exploit and secure web applications against SQL injection, XSS, authentication bypass, command injection, and session hijacking attacks.
- Understand malware, trojans, ransomware, password cracking, steganography techniques, and implement effective detection and removal strategies.
- Analyze mobile, Wi-Fi, social engineering threats and apply security hardening, compliance standards, and real-world cybersecurity best practices.
Free
Free access this course
-
LevelIntermediate
-
Total Enrolled1
-
Duration3 hours
-
Last UpdatedJanuary 13, 2026
-
CertificateCertificate of completion
Hi, Welcome back!
Tags
Target Audience
- Students seeking a career in ethical hacking and cybersecurity.
- IT professionals wanting to upgrade security and penetration testing skills.
- Network administrators responsible for securing organizational infrastructure.
- Software developers interested in application security and vulnerability prevention.
- Cybersecurity beginners looking for structured, hands-on practical learning.
- Bug bounty hunters aiming to understand vulnerabilities and exploitation techniques.
- System administrators managing servers, networks, and operating systems securely.
- Technology enthusiasts curious about hacking, defense, and digital security.
Requirements
- Basic understanding of computers, operating systems, and internet usage.
- A laptop or desktop capable of running virtual machines smoothly.
- Willingness to learn cybersecurity concepts ethically and responsibly.
- Stable internet connection for tool downloads and online research.