Currently Empty: ₹0.00
π― Course Objectives
By the end of this course, learners will be able to:
Understand ethical hacking concepts and cybersecurity fundamentals
Identify system and network vulnerabilities
Perform basic penetration testing
Use popular ethical hacking tools
Secure systems against common cyber attacks
Build a strong foundation for advanced cybersecurity careers
π¨βπ Who Should Enroll?
Engineering & diploma students
Beginners interested in cybersecurity
IT & Computer Science students
Professionals switching to cybersecurity
Anyone curious about hacking (legally π)
No prior hacking experience required!
π§ Course Duration
Duration: 2 Weeks
Mode: Online / Offline / Hybrid
Level: Beginner to Intermediate
π Detailed Course Curriculum
ποΈ Week 1: Foundations of Ethical Hacking & Networking
πΉ Day 1: Introduction to Ethical Hacking
What is Ethical Hacking?
Hackers vs Crackers vs Ethical Hackers
Types of Hackers (White, Black, Grey Hat)
Cybercrime & Cyber Laws (IT Act, legal boundaries)
Career paths in Ethical Hacking
πΉ Day 2: Networking Basics for Hackers
Basics of Computer Networks
Types of Networks (LAN, WAN, MAN)
OSI & TCP/IP Models
IP Addressing & Subnetting
Ports, Protocols & Services
How data travels on the internet
πΉ Day 3: Linux & Command Line Essentials
Introduction to Linux (Kali Linux)
Linux file system
Basic Linux commands
File & directory permissions
Installing and updating tools
Why hackers prefer Linux
πΉ Day 4: Footprinting & Reconnaissance
Information Gathering Techniques
Passive vs Active Reconnaissance
DNS Enumeration
Google Dorking
WHOIS Lookup
Email & domain footprinting
Tools: WHOIS, Nmap (intro)
πΉ Day 5: Scanning & Enumeration
Network Scanning Concepts
Port Scanning
Service & Version Detection
Vulnerability Scanning Basics
Tools:
Nmap
Netcat
Zenmap
Understanding scan results
ποΈ Week 2: Attacks, Security & Hands-On Practice
πΉ Day 6: System Hacking Basics
Password Attacks
Types of Passwords
Brute Force & Dictionary Attacks
Hashing & Encryption Basics
Introduction to Metasploit Framework
πΉ Day 7: Malware & Cyber Attacks
Types of Malware (Virus, Worm, Trojan, Ransomware)
Malware lifecycle
Keyloggers (conceptual)
Backdoors & payloads
How malware spreads
Prevention techniques
πΉ Day 8: Web Application Hacking
How websites work
HTTP & HTTPS basics
Common Web Vulnerabilities:
SQL Injection
XSS (Cross Site Scripting)
CSRF
OWASP Top 10 overview
Tools: Burp Suite (Intro)
πΉ Day 9: Wireless & Network Security
Wi-Fi Security Basics
Encryption Types (WEP, WPA, WPA2)
Man-in-the-Middle (MITM) attacks
ARP Spoofing (concept)
Securing wireless networks
πΉ Day 10: Cyber Defense & Final Project
Cybersecurity Best Practices
Firewalls & IDS/IPS
Antivirus & system hardening
Ethical Hacking Methodology
Final Mini Project:
Vulnerability Assessment of a Test System
Career Guidance & Certification Path
π§ͺ Hands-On Labs & Practical Training
Kali Linux environment setup
Live tool demonstrations
Real-world attack simulations (safe & legal)
Mini penetration testing tasks
Guided practice sessions
π οΈ Tools Covered
Kali Linux
Nmap
Metasploit
Netcat
Burp Suite
Wireshark (Intro)
π Certification
Certificate of Completion



