- **Course Duration:** 3 Months
- **Schedule:** Weekly live sessions + Assignments and practical exercises
- **Key Learning Outcomes:**
- **Be fully prepared for job interviews and real-world challenges.**
WHAT WE COVER IN 3 MONTHS:
Month 1: Foundations of Cybersecurity & Ethical Hacking
Theory Topics:
- Need for Cybersecurity
- CIA Triad
- Security Architecture & Governance
- Security Auditing
- Regulations & Frameworks
- Types of Hackers, Phases of Ethical Hacking
- Introduction to MITRE ATT&CK & Cyber Kill Chain
Hands-On:
- Foot printing a website manually and via tools
- Domain info using WHOIS, TheHarvester, nslookup, dig
- Tools: WHOIS, nslookup, Recon-ng, theHarvester, Sublist3r
Theory Topics:
- What is Linux, Origins, Distros
- File System Hierarchy
- Important directories (/etc, /bin, /var, etc.)
- Sudo, Root, Permissions
Hands-On:
- Commands: ls, cd, mkdir, touch, cp, mv, rm, cat, nano, vim, chmod, chown
- Permission & Ownership practice
- Tools: Kali Linux Terminal
Theory Topics:
- Types: Symmetric, Asymmetric
- Hash Functions
- Digital Signatures
- PKI, Attacks on cryptosystems
Hands-On:
- Generate SHA-256, MD5 Hashes
- Sign files using GPG
- Validate digital signatures
- Tools: openssl, gpg, hashcat
Theory Topics:
- OSI & TCP/IP Models
- Network Architecture
- Network Scanning & Enumeration
- Common Network Attacks
Hands-On:
- Network path tracing
- DNS Lookup and Reverse Lookup
- Network scanning (Nmap)
- Packet sniffing with Wireshark
- Tools: Nmap, Wireshark, Netstat, Traceroute, DNSenum
Month 2: Attacks, Vulnerabilities & Web Security
Theory Topics:
- Web Server & Application Architecture
- OWASP Top 10 Web Attacks
- Patch Management
Hands-On:
- Capture Session ID using Burp Suite
- Perform LFI on bWAPP
- Identify vulnerable endpoints
- Tools: Burp Suite, OWASP ZAP, bWAPP, DVWA
Theory Topics:
- Authentication vs Authorization
- Access Administration, Password Security
- Identity Theft & Prevention
Hands-On:
- Grant/restrict permissions in Linux
- Create phishing website simulation
- Analyze phishing indicators
- Tools: Linux Terminal, Gophish, URLScan, WHOIS