In this course, you’ll master the art of cybersecurity, learning how to protect systems, networks, and data from cyber threats. Whether you're a beginner or an aspiring ethical hacker, this course will take you from the fundamentals to advanced security concepts.
Five Phases of Ethical Hacking
Reconnaissance
Scanning
Gaining access
Maintaining access
Clearing tracks
Kali Linux
Nmap
Metasploit
Burpsuite
John The Ripper
Wireshark
Autopsy
Bash Scripting
Dominate.
From Start To Victory.
Introduction to Linux and History
Linux Architecture Kernel
Basic Command Line Usage
File System Management & File System Types
Process Management
User and Group Management
Package Management
Networking
System Monitoring and Performance
Shell Scripting
System Administration
Information Gathering Nmap
Vulnerability Analysis Using OpenVAS
Basic Command Line Usage
Exploitation Tools
Wireless Attacks
Password Attacks
Reverse Engineering
Social Engineering
Network Security
Malware Analysis
Understanding Operating System Security
User and Privilege Management
Access Control
System Hardening
Basic Networking Protocols
Application Layer Protocols
Transport Layer Protocols
Network Layer Protocols
Data Link Layer Protocols
Basic Concepts
Types of Cryptography
Cryptographic Protocols
Key Management
Cryptographic Attacks
Access Control Concepts
Access Control Models
Understanding Sessions
Session Lifecycle
Cryptographic Protocols
Session Identification
Web Application Security Fundamentals
Common Web Vulnerabilities
Web Security Best Practices
Web Architecture
Web Protocols
Web Technologies and Languages
Database Fundamentals
Web Application Security Fundamentals
Authentication and Authorization
Encryption
File Encryption
Access Controls
File Integrity
Data Backup and Recovery
File System Security
Mobile Operating Systems
Mobile Threats
Mobile Device Management
Understanding SQL Injection
How SQL Injection Works
Impact of SQL Injection
Prevention and Mitigation
SQL Injection Testing and Tools
Manual Testing Techniques
Automated Tools
Introduction to Ethical Hacking
Networking Fundamentals and Basics of Computer Networks
Active and Passive Footprinting
Scanning and Enumeration and Network Scanning Techniques
Vulnerability Assessment
System Hacking and Gaining Access
Web Application Security and Basics of Web Technologies
System Hacking and Gaining Access
Wireless Network Hacking
Social Engineering
Malware Analysis Types of Malware
Importance of Anonymity in Ethical Hacking
Fundamentals of Online Privacy Privacy
Using Proxy Servers and Types of Proxy Servers
VPNs
Onion Based Routing
MAC Address Spoofing
Operating System for Anonymity
Basics of Information Gathering
Open Source Intelligence
Web Reconnaissance Techniques
Advanced Reconnaissance Techniques
Advanced OSINT Techniques
Automated Information Gathering
DNS Reconnaissance and Subdomain Enumeration
Web-Based Reconnaissance and Directory Enumeration
Email Harvesting
Network Scanning Fundamentals
Advanced Network Scanning Techniques
Network Mapping and Topology
Vulnerability Scanning and Service Enumeration
Introduction to Enumeration
Techniques and Tools for Enumeration
Enumerating Windows Systems
Linux System Enumeration
Network Enumeration
SMB and NetBIOS Enumeration
SNMP Enumeration
Vulnerability Analysis
Vulnerability Scanning Tools and Techniques
Manual vs Automated Vulnerability Assessment
Understanding Web Application Structure
OWASP Top 10 Vulnerabilities
Information Gathering for Web Applications
Advanced Injection Techniques
Vulnerability Scanning Tools and Techniques
Authentication and Session Hijacking
Cross-Site Scripting (XSS)
Server-Side Request Forgery (SSRF)
Client-Side Attacks and Cross-Site Request Forgery
Understanding SQL Injection
Types of SQL Injection
SQL Injection Detection Tools
Manual SQL Injection Techniques
SQL Injection Prevention and Mitigation
Session Hijacking
Common Techniques for Session Hijacking
Man-in-the-Middle (MitM) Attacks for Session Hijacking
At Cyber Indians, we believe the best way to learn is by doing.That’s why our approach is centered around real-world, hands-on projects. Instead of just listening to lectures or memorizing theory, our studforments dive into building projects and tools from the very first week.