Cyber Security

Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems. strong cybersecurity strategy can provide a good security posture against malicious attacks designed to access, alter, delete, destroy or extort an organization’s or user’s systems and sensitive data. Cybersecurity is also instrumental in preventing attacks that aim to disable or disrupt a system’s or device’s operations.

About Program

This 4 months cyber security course is developed for students with little to absolutely no IT experience. Keeping this in mind, the course will provide you how to provide protection of internet-connected systems such as hardware, software and data from cyberthreats.. You will explore hacking and anti hacking concepts that are fundamentals to secure systems.

Features Of This Program

Onsite/Remote program

We are providing in-campus and online classes to make it easier for Students.

Interview Preperations

After Techinal knowledge Special interview preperation sessions will be held to prepare for the job.

i

Assignments

Each class will be followed by a quiz to assess   your learning.

Marketing Assistance

we will market our students after compeleting the course.

lifetime access

You will get lifetime access to LMS where presentations, quizzes, installation guide & class recordings are available.

Internship Program

We do arrange intership oppertunity for our students to get confident knowledge as a Tester.

Salary Packages

80,000 – 150,000 USD

Who Can Attend This Course ?

Beginners

 who do not have prior IT background and wish to jump on an exciting new career in IT.

Basic Knowledge

Who are currently learning or working as a IT professional can join to learn advance level of cyber security.

Professionals

Who currently have development skills but want to join cyber security field can join this course to be a professional in cyber security.

No IT Background Required

Course Content
Module 1 – Introduction to cyber security

Lecture 1: – What is Hacking
Lecture 2: – What is Ethical Hacking
Lecture 3: – Types of Hackers
Lecture 4: – White Hat Hacker
Lecture 5: – Black Hat Hackers
Lecture 6: – Grey Hat Hackers
Lecture 7: – Script Kiddies
Lecture 8: – Hacktivists
Lecture 9: – Spy Hackers
Lecture 10: – Cyber Terrorists
Lecture 11: – Vulnerability
Lecture 12: – Exploit
Lecture 13: – Remote Exploit
Lecture 14: – Local Exploit
Lecture 15: – Zero-day
Lecture 16: – Zero-day vulnerability
Lecture 17: – Zero-day Exploit
Lecture 18: – Brute force attack
Lecture 19: – Phishing
Lecture 20: – Remote access
Lecture 21: – Payload
Lecture 22: – Information Gathering
Lecture 23: – Active Information Gathering
Lecture 24: – Passive Information Gathering
Lecture 25: – Scanning
Lecture 26: – Gaining Access
Lecture 27: – Maintaining Access
Lecture 28: – Covering Tracks
Lecture 29: – Viruses & Worms
Lecture 30: – Trojan Horse
Lecture 31: – Spyware
Lecture 32: – Adware
Lecture 33: – Backdoor
Lecture 34: – Rootkits
Lecture 35: – Ransomware
Lecture 36: – What is Penetration Testing
Lecture 37: – Types of Penetration Testing
Lecture 38: – What is white box Penetration Testing
Lecture 39: – What is Black Box Penetration testing
Lecture 40: – Introduction to Linux OS
Lecture 41: – Social Engineering
Lecture 42: – Google hacking using google dorks

Module 2 - Lab Setup
  1. Lab Setup and Configuration

    Lecture 43: – What is Virtual Machine
    Lecture 44: – What is VMware
    Lecture 45: – What is Virtual Box
    Lecture 46: – Install VMware
    Lecture 47: – Install Kali Linux
    Lecture 48::- Install Windows OS

Module 3 - System Hacking

 

Lecture 49: – Vulnerability Scanning using Nessus
Lecture 50:- Exploit using Metasploit
Lecture 51:- Network Scanning using Nmap
Lecture 52:- Windows 10 Hacking
Lecture 53:- Windows 10 UAC Bypass

Module 4 - Social Engineering
  1. Lecture 54:- Phishing Attack
    Lecture 55: Setoolkit usages
    Lecture 56: RAT (Remote Access Trojan)
    Lecture 57: Using RAT hack Systems
    Lecture 58: NGROk usages
    Lecture 59: Android Phone Hacking

Module 5 - Wifi Hacking
  1. Lecture 60: Wifi Encryption
    Lecture 61: Hack Wifi Access Point
    Lecture 62: Dos Attack
    Lecture 63: DDOS Attack

Module 9 – Web Application Pentesting

Lecture 64: How Web Application Works
Lecture 65: Request and Response
Lecture 66: Installing Scanner (Acuntix, Netsparker) Scanning
Lecture 67: Website Basic
Lecture 68: OWASP Top 10
Lecture 69: What is Sql-Injection?
Lecture 70: Types of Sql-Injection
Lecture 71: Live Demo on Sql-Injection
Lecture 72: What is XSS
Lecture 73: Types of XSS
Lecture 74: Live Demo on XSS All types
Lecture 75: What is HTML Injection
Lecture 76: Live Demo on HTML Injection
Lecture 78: What is Directory Listing
Lecture 79: Live Demo on Directory Listing
Lecture 80: What is Broken Authentication
Lecture 81: – Live Demo on Broken Authentication
Lecture 82: – What is Tamper data?
Lecture 83: – Live Demo on Tamper Data on Ecommerce site
Lecture 84: – What is Web Shell
Lecture 85: – Hack Web-Server Using Web-Shell

Module 10 - Interview Preparation

After successfull Completion of Course and examination. We prepare candidate for Interview.

Special Interview Preparation Sessions

  • ASession No. 1 – Cyber Security
  • ASession No. 2 – Lab Setup
  • ASession No. 3 – System Hacking
  • ASession No. 4 – Web Hacking
  • ASession No. 5 – Wifi Hacking

Pin It on Pinterest