Currently Empty: ₹0.00



π― Course Objectives
By the end of this course, learners will be able to:
-
Understand ethical hacking concepts and cybersecurity fundamentals
-
Identify system and network vulnerabilities
-
Perform basic penetration testing
-
Use popular ethical hacking tools
-
Secure systems against common cyber attacks
-
Build a strong foundation for advanced cybersecurity careers
π¨βπ Who Should Enroll?
-
Engineering & diploma students
-
Beginners interested in cybersecurity
-
IT & Computer Science students
-
Professionals switching to cybersecurity
-
Anyone curious about hacking (legally π)
No prior hacking experience required!
π§ Course Duration
-
Duration: 2 Weeks
-
Mode: Online / Offline / Hybrid
-
Level: Beginner to Intermediate
π Detailed Course Curriculum
ποΈ Week 1: Foundations of Ethical Hacking & Networking
πΉ Day 1: Introduction to Ethical Hacking
-
What is Ethical Hacking?
-
Hackers vs Crackers vs Ethical Hackers
-
Types of Hackers (White, Black, Grey Hat)
-
Cybercrime & Cyber Laws (IT Act, legal boundaries)
-
Career paths in Ethical Hacking
πΉ Day 2: Networking Basics for Hackers
-
Basics of Computer Networks
-
Types of Networks (LAN, WAN, MAN)
-
OSI & TCP/IP Models
-
IP Addressing & Subnetting
-
Ports, Protocols & Services
-
How data travels on the internet
πΉ Day 3: Linux & Command Line Essentials
-
Introduction to Linux (Kali Linux)
-
Linux file system
-
Basic Linux commands
-
File & directory permissions
-
Installing and updating tools
-
Why hackers prefer Linux
πΉ Day 4: Footprinting & Reconnaissance
-
Information Gathering Techniques
-
Passive vs Active Reconnaissance
-
DNS Enumeration
-
Google Dorking
-
WHOIS Lookup
-
Email & domain footprinting
-
Tools: WHOIS, Nmap (intro)
πΉ Day 5: Scanning & Enumeration
-
Network Scanning Concepts
-
Port Scanning
-
Service & Version Detection
-
Vulnerability Scanning Basics
-
Tools:
-
Nmap
-
Netcat
-
Zenmap
-
-
Understanding scan results
ποΈ Week 2: Attacks, Security & Hands-On Practice
πΉ Day 6: System Hacking Basics
-
Password Attacks
-
Types of Passwords
-
Brute Force & Dictionary Attacks
-
Hashing & Encryption Basics
-
Introduction to Metasploit Framework
πΉ Day 7: Malware & Cyber Attacks
-
Types of Malware (Virus, Worm, Trojan, Ransomware)
-
Malware lifecycle
-
Keyloggers (conceptual)
-
Backdoors & payloads
-
How malware spreads
-
Prevention techniques
πΉ Day 8: Web Application Hacking
-
How websites work
-
HTTP & HTTPS basics
-
Common Web Vulnerabilities:
-
SQL Injection
-
XSS (Cross Site Scripting)
-
CSRF
-
-
OWASP Top 10 overview
-
Tools: Burp Suite (Intro)
πΉ Day 9: Wireless & Network Security
-
Wi-Fi Security Basics
-
Encryption Types (WEP, WPA, WPA2)
-
Man-in-the-Middle (MITM) attacks
-
ARP Spoofing (concept)
-
Securing wireless networks
πΉ Day 10: Cyber Defense & Final Project
-
Cybersecurity Best Practices
-
Firewalls & IDS/IPS
-
Antivirus & system hardening
-
Ethical Hacking Methodology
-
Final Mini Project:
-
Vulnerability Assessment of a Test System
-
-
Career Guidance & Certification Path
π§ͺ Hands-On Labs & Practical Training
-
Kali Linux environment setup
-
Live tool demonstrations
-
Real-world attack simulations (safe & legal)
-
Mini penetration testing tasks
-
Guided practice sessions
π οΈ Tools Covered
-
Kali Linux
-
Nmap
-
Metasploit
-
Netcat
-
Burp Suite
-
Wireshark (Intro)
π Certification
-
Certificate of Completion
Course Content
WEEK-01
-
LESSON-01
06:38 -
LESSON-02
06:03 -
LESSON -03
03:13 -
QUIZ-01
-
LESSON-04
06:00 -
QUIZ-01
-
LESSON-05
08:46
WEEK-02
FINAL PROJECT AND CERTIFICATION
A course by
Shankar kumar
AI Engineer
Student Ratings & Reviews
No Review Yet










