0 (0 Ratings)

Cyber Security

Course Duration: 3h
Enrolled:1

Topics for this course

Cyber Security : Module 1

  • Section 1 : Introduction to Ethical hacking
  • Why we need cybersecurity
  • Ethical Hacking vs Cyber Security
  • Phases Of Hacking
  • Types of Hackers
  • CIA Triad
  • Info Sec Controls
  • DAD Triad
  • Zero Trust
  • Non Redpudiation
  • AAA of Security
  • Gap Analysis
  • Complaince Standards
  • Cybersecurity Terminologies
  • Creating Virtual Lab
  • Enabling Virtualization in BIOS
  • Downloading Virtual Lab Tools
  • Installing VMware workstation player
  • Installing and configuring Kali Linux
  • Installing and configuring Metasploitable 2
  • Installing and configuring Windows VM
  • Testing VM Lab
  • Section 2 : Introduction to Networking
  • Objectves of Networking
  • How Data Travels
  • Types of Networks
  • Understanding IP Addresses
  • Role of IP Addresses
  • Understanding NAT
  • Understanding Ports
  • Understanding Services
  • Ports and Services
  • Protocols and OSI Model
  • Protocols and TCP IP Model_backup
  • Understanding DNS
  • Online Anonymity and VPN
  • Hands on Using VPN
  • Anonymity tools Proxy
  • Hands on Using Proxy
  • TOR The Onion Router
  • Hands on Using TOR
  • Quiz

Module 2

Module 3

Module 4

Module 5

Module 6

Module 7

Module 8

Module 9

Description

This Ethical Hacking and Cybersecurity course provides a complete practical and theoretical foundation in modern information security. Learners start with cybersecurity fundamentals, ethical hacking concepts, and security principles, then move into networking, anonymity, reconnaissance, vulnerability assessment, and penetration testing. The course emphasizes hands-on labs using Kali Linux, Metasploitable, Windows VMs, and industry tools like Nmap, Nessus, Burp Suite, and SQLMap. It covers web, mobile, cloud, malware, Wi-Fi, and social engineering attacks, along with defense, compliance, and best practices. By the end, students gain real-world skills to identify, exploit, and mitigate security risks responsibly.

What I will learn?

  • Understand ethical hacking concepts, cybersecurity principles, attack methodologies, and defensive strategies used by professionals across real-world environments.
  • Build and manage a complete virtual hacking lab using Kali Linux, Windows, Metasploitable, and security testing tools.
  • Perform network scanning, reconnaissance, anonymity techniques, and information gathering using Nmap, proxies, VPNs, and TOR.
  • Identify, assess, and manage vulnerabilities using CVE, CVSS, Nessus, vulnerability management lifecycles, and industry frameworks.
  • Exploit and secure web applications against SQL injection, XSS, authentication bypass, command injection, and session hijacking attacks.
  • Understand malware, trojans, ransomware, password cracking, steganography techniques, and implement effective detection and removal strategies.
  • Analyze mobile, Wi-Fi, social engineering threats and apply security hardening, compliance standards, and real-world cybersecurity best practices.
Free
Free access this course

Target Audience

  • Students seeking a career in ethical hacking and cybersecurity.
  • IT professionals wanting to upgrade security and penetration testing skills.
  • Network administrators responsible for securing organizational infrastructure.
  • Software developers interested in application security and vulnerability prevention.
  • Cybersecurity beginners looking for structured, hands-on practical learning.
  • Bug bounty hunters aiming to understand vulnerabilities and exploitation techniques.
  • System administrators managing servers, networks, and operating systems securely.
  • Technology enthusiasts curious about hacking, defense, and digital security.

Requirements

  • Basic understanding of computers, operating systems, and internet usage.
  • A laptop or desktop capable of running virtual machines smoothly.
  • Willingness to learn cybersecurity concepts ethically and responsibly.
  • Stable internet connection for tool downloads and online research.