CYBER SECURITY & ETHICAL HACKING TRAINING COURSE

Training Syllabus

Importance of Cyber Security & Ethical Hacking

  • Fundamental Safeguard: Information protection is the cornerstone of cybersecurity, providing the primary defense against a wide range of cyber threats.
  • Data Vitality: In today's digital age, data is a critical asset for organizations and individuals, making its protection imperative for business continuity and personal privacy.
  • Confidentiality, Integrity, and Availability: Information protection ensures the confidentiality of sensitive data, maintains its integrity, and ensures it's available when needed, forming the CIA triad of cybersecurity.
  • Cyber Threats: Cybercriminals continually seek to exploit vulnerabilities in information security. Breaches can result in severe consequences, including financial losses, reputational damage, and legal repercussions.
  • Preventing Data Breaches: Effective information protection measures, such as encryption, access controls, and regular data backups, are essential for preventing data breaches and unauthorized access.
  • Trust Building: Information protection fosters trust in the digital world, both among organizations and between individuals and online services, contributing to a secure and resilient cyberspace.
  • Training Duration: 3 Months
  • Training Fees: ₹3000
  • Certificate: Yes
  • Membership: Lifetime

#1 Computer Basics

  • Basics of Computer System/Peripherals
  • Motherboard Ports & Sockets
  • Machine/Binary {0,1} Language Processing
  • System Software vs Application Software
  • I/O Operations & Devices

#2 Networking Basics

  • Network Topologies
  • LAN/MAN/WAN
  • Client-Server Architecture
  • DNS Server
  • Internet vs Intranet
  • Packets
  • Resource Sharing

#3 Cyber Laws in India

  • Types of Cyber Crimes
  • Information Technology Act 2000
  • Sections & IPCs

#4 Victim Checking Tools

  • Have I been pwned?
  • Pwned Passwords
  • Avast Check
  • F-Secure Identity Theft Checker
  • F-Secure Strong Password Generator
  • F-Secure Router Checker
  • F-Secure IP Checker
  • 1Password
  • Account Security

#5 Study of Hacked Organizations

  • Truecaller
  • Attacker 404
  • Birla Group
  • Canva
  • Internet Traffic
  • Famous Hacker's Website got Hacked
  • Hacking for Religious & Political Matters
  • Mirai Botnet

#6 Frauds & Scams

  • How Fraud Works?
  • How to Detect Frauds?
  • Work from Home Scam
  • SMS Types & Scams
    • Promotional SMS
    • Transactional SMS
    • SMS API & Dashboard
  • Chinese Application Scams
  • OLX Scams
  • OTP Scams
  • Airtel Money & other Wallet Applications Scams

#7 Windows Security Geeks & Hacks

  • File/Data Properties (Read Only & Hidden)
  • Data Recovery Concepts & Tools
  • Batch Programming Hacks
  • VBScript Shell Scripting
  • Keyloggers
  • Virus/Trojan Horse/Malware/Adware
  • Block Viruses without Anti-Virus
  • Create Virus & Study of Anti-Virus Software
  • Windows Exploitations
  • Mount Suspicious Files
  • SFX Hacks

#8 Full Stack Development & GIT

  • Git Bash & Github
  • Basics of HTML & Bootstrap CSS
  • PHP Programming
  • MySQL
  • Web Development & CRUD Operations
  • Website Designing using Framework
  • Web Hosting - cPanel/Plesk Panel/VestaCP Panel

#9 Active & Passive Attacks

  • Active Attack Examples
  • Passive Attack Examples

#10 The Public Network (Surface/Deep/Dark Web)

  • Surface Web
  • Deep Web
  • Dark Web
  • Brave Browser
  • VPN
  • Onion Routing with TOR
  • Register New Onion Domain
  • Dark Web Market
  • The Hidden Wiki
  • Peer-to-Peer Communication in Dark Web
  • Torrent Sites & Torrent Network
  • Dark Web Deployment
  • Z-Library
  • Science Hub

#11 Introduction to VMs, Kali Linux & CLI

  • VMware
  • Virtual Box
  • Kali Linux Installations
  • Basic Linux Commands

#12 Cyber Attacks (Penetration Testing Only)

  • SQL Injection Attack
  • Wi-Fi Password Crack
  • Windows Password Crack
  • DoS Attack
  • Social Engineering Attack
  • Phishing Attack with Deployment
  • HOST File Attack
  • NMAP Port Scanning
  • Network Jammer/Blocker with Defender
  • CamPhish
  • Clickjacking
  • Android Phone Hacking (Optional)

#13 Cryptography & X.509 Certificate

  • Secure Hash Algorithm - 1
  • Secure Hash Algorithm - 256
  • Secure Hash Algorithm - 512
  • Base64
  • OpenSSL
  • Deploy Secret Encrypted Messaging Application in the Dark Web
  • Full SQL Database Encryption using Hybrid Cryptography
  • SSL Certificate Installations (X.509)

#14 API Testing

  • Postman & Swagger
  • API Testing
  • GET/POST/DELETE/UPDATE Examples

#15 IoT Device Security Challenges

  • Hardware Device Attack
  • IoT Device Attack using API End-Point
  • DOS Attack using IoT Bot
  • LoRa Hacking
  • NULL User Agent
  • Basic Electronics Circuits

#16 Email Hacks

  • SD Email
  • Email Geeks
  • Detect Fake Email
  • Email Forwarding/IMAP/POP Features & Integration

CONTACT ME