×
Events
Knowledgebase
Cyber Security (Ethical Hacking)
Back To Courses
Introduction to Cyber Security & Ethical Hacking
5 Lessons
What is Cyber Security?
Importance of Ethical Hacking in the Digital World
Understanding Hackers: Black Hat, White Hat & Grey Hat
Types of Cyber Attacks and Threats
Overview of Cyber Laws and Ethical Hacking Standards
Networking Fundamentals
5 Lessons
Basics of Computer Networks
OSI and TCP/IP Models Explained
IP Addressing, Subnetting & DNS
Network Devices (Routers, Switches, Firewalls, etc.)
Packet Analysis using Wireshark
Operating Systems for Hacking
5 Lessons
Introduction to Windows & Linux Security
Using Kali Linux for Penetration Testing
Command Line Basics (Windows CMD & Linux Terminal)
Installing and Configuring Virtual Machines (VMware, VirtualBox)
Setting up a Safe Lab Environment for Practice
Footprinting and Reconnaissance
5 Lessons
Information Gathering Techniques
WHOIS, DNS, and IP Tracing Tools
Social Engineering Basics
Google Dorking and OSINT (Open Source Intelligence)
Target Profiling and Vulnerability Identification
Scanning and Enumeration
5 Lessons
Network Scanning using Nmap & Advanced Scanners
Identifying Live Systems and Open Ports
Detecting Vulnerabilities and Services
Banner Grabbing and OS Fingerprinting
Automating Scans with Tools like Nessus and OpenVAS
System Hacking & Exploitation
5 Lessons
Understanding System Vulnerabilities
Password Cracking Techniques (Online & Offline)
Privilege Escalation Methods
Keyloggers and Rootkits (Awareness & Prevention)
Clearing Logs and Covering Tracks (Ethical Demonstrations)
Malware Analysis & Defense
5 Lessons
What is Malware? Types of Malware (Virus, Worm, Trojan, etc.)
Malware Detection and Removal Tools
Sandbox Analysis & Reverse Engineering Basics
Ransomware Attacks and Defense Techniques
Endpoint Protection & Antivirus Bypass Awareness
Web Application Hacking
5 Lessons
Understanding Web Architecture
SQL Injection, XSS (Cross-Site Scripting), CSRF
File Inclusion & Command Injection Attacks
Session Hijacking & Cookie Manipulation
Web Application Scanning using Burp Suite & OWASP ZAP
Wireless Network Hacking
4 Lessons
Understanding Wi-Fi Security (WEP, WPA, WPA2)
Capturing and Cracking Wireless Passwords
Rogue Access Points and Evil Twin Attacks
Wireless Network Defense and Security Hardening
Mobile and IoT Hacking
4 Lessons
Android & iOS Vulnerabilities
Mobile Application Security Testing
IoT Device Security Risks
Tools for Mobile and IoT Penetration Testing
Cloud & Email Security
4 Lessons
Basics of Cloud Computing Security
Common Cloud Threats and Misconfigurations
Email Spoofing, Phishing, and Spamming Techniques
Secure Email Practices and Authentication Protocols
Digital Forensics & Incident Response
4 Lessons
Basics of Digital Forensics
Tracing Cyber Crimes and Collecting Evidence
Log Analysis and File Recovery
Incident Detection, Response, and Reporting
Cyber Security Tools & Frameworks
4 Lessons
Top Security Tools: Nmap, Metasploit, Wireshark, Burp Suite, Aircrack-ng
Understanding OWASP Top 10 Vulnerabilities
Security Frameworks: ISO 27001, NIST, CIS Controls
SIEM Tools Introduction (Splunk, QRadar Basics)
Penetration Testing Projects
4 Lessons
Planning and Performing a Penetration Test
Real-World Simulation Projects
Vulnerability Assessment Report Writing
Final Presentation & Evaluation
Career & Certification Guidance
4 Lessons
Preparing for Certifications (CEH, CompTIA Security+, OSCP)
Freelancing and Bug Bounty Programs
Building a Professional Cyber Security Portfolio
Resume and Interview Preparation
Tools Covered
2 Lessons
Kali Linux, Nmap, Metasploit, Wireshark, Burp Suite, Aircrack-ng, Hydra, Nessus, John the Ripper, OWASP ZAP, Social Engineering Toolkit (SET)
And Much More
Add to cart
Category:
Subcategory: