Training on “Cyber Security & Ethical Hacking”
Duration: 4 Months
| Course Outline |
| Lesson | Topic in Details |
| Ethical Hacking – Introduction | What is meant by Hacking? Who can be a Hacker? What should be the skills of a Hacker Hackers are their intention Why Hacking Who & Why – At Risk of Hacking? Effects of Computer Hacking What is Ethical about Hacking? Ethical Hacking career Assignment |
| Networking Foundation for Hacker | Introduction Google dorks Internet protocol IP Addresses MAC Addresses TCP, UDP, and the Three-Way Handshake Common Ports and Protocols The OSI Model What are Networks and what is Networking Network Topology Subnetting Assignment |
| Login Page Injection | SQL Injection Concepts Types of SQL Injection SQL Injection Methodology Evasion Techniques SQL Injection Countermeasures WAF Bypass (Live practice) Assignment |
| OSINT | Open-Source Intelligence Live OSINT project Tracking of a target person Subdomain Collecting Information from Email Header Email Tracking Tools Assignment |
| Building an Ethical Hacking Lab | What is Virtual Machine Virtual Machine Install And Setup How To Setup Kali Linux On Virtual Machine How To Setup Metasploitable On VM Kali Linux vs. Other Linux distributions Assignment |
| Kali Linux | Exploring Kali Linux Benefits of Kali Linux Navigating the File System Sudo Overview Users and Privileges Common Network Commands Viewing, Creating, and Editing Files Starting and Stopping Services Installing and Updating Tools Scripting with Bash Tools for Footprinting, Tools for Scanning Tools for Sniffing What is meant by Metasploit framework A Metasploit framework to outbreak Windows machines A Metasploit framework to outbreak Android devices NMAP Assignment |
| Foot printing/ Reconnaissance /Information gathering | Foot Printing- Definition Importance and purpose of Foot Printing Identifying Our Target E-Mail Address Gathering with Hunter.io Utilizing theharvester Range of IP Address Details of domain registration DNS information Subdomains of the domains services running on the server Traceroute analysis Identifying Website Technologies Assignment |
| Content Management System | Website Development (Live Project) WordPress Wp Exploit (Live) Install WordPress In cPanal Using Softaculous App Instal XAMPP on Local Server(PC) Install Wordpross On The Local Server Introducing To WordPress Admin panal Instal A Powerfull Plugin For Security Detect Malware Manually and Clean them Assignment |
| LFI/RFI/RCE | What is LFI/RFI/RCE Website Security, Measuring website quality Web Server security, cPanel Assignment |
| Cross site request forgery | Cross Site Scripting (XSS) Social Engineering Phishing Social Media account recovery process. Fb / Gmail Account Security and Disable concept. Assignment |
| Malware Threats | Malware and APT Concepts Fileless Malware Concepts Al-based Malware Concepts Malware Analysis Malware Countermeasures Assignment |
| Denial-of-Service | Denial-of-Service What is a Denial-of-Service Attack? What Is Distributed Denial of Service Attacks? DoS/DDoS Concepts DoS/DDoS Attack Techniques DoS/DDoS Attack Countermeasures What is a Trojan? File Extension Viruses Pen Testing for Trojans and Backdoors Penetration Testing for Virus All Possible Passwords Cracking Method Password Guessing Default Password Session Hijacking Assignment |
| Hacking Wireless Network | Wireless Concepts Wireless Encryption Wireless Threats Different kinds of wireless networks Finding a Wi-Fi network Using local authentication Kinds of Wi-Fi authentications Different methods of Wi-Fi encryption Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools software and hardware tools and techniques essential to crack Wi-Fi networks WEP WPA WPAT Assignment |
| Firewalls, Honeypots | Intrusion Detection System(IDS) and Honeypots What is meant by Firewall? What are the various operations of a Firewall? What is meant by IDS Operation of IDS SPAN Intrusion Detection tools What is meant by a Honeypot Various Honeypot tools Different Honeypot detection tools Types of Honeypots Assignment |
| Cryptography | Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Cypher Language Assignment |
| Report Writing & Career Advice | Common Legal Documents Pentest Report Writing Reviewing a Real Pentest Report Career Advice Assignment |
| Outsourcing in Fiverr / Upwork: | What is Fiverr & Upwork? What type of work would suit you? How create a GIG and Sell it? Fiverr freelancing support. Order and Payment Dollar payout process Assignment |
| Outsourcing in Hackerone and Bugcroud | Outsourcing in Hackerone and Bugcroud How to Hackerone and Bugcroud First Bug Report in Hackerone and Bugcroud Assignment |
| Exam | Mid Exam & Final Exam |
| Thesis | Compulsory |
| Viva | Attend Compulsory |
| Internship | 24 Days |
Mark distribution (Full Marks 200)
Assignment: 20
Obedient to teachers: 10
Supportive to course mate: 20
Mid exam: 30
Viva : 20
Thesis: 50
Attendance: 20
Final written exam : 30
Minimum 50% Number along with Thesis, Internship & Final Exam have completed to avail the Certificate.