Login Or Sign up

Description

📅 Cybersecurity (Basic to Advanced)

🗓️ Duration: 12 Months

📚 Schedule: 4 or 3 Days Per Week

🕒 Session Length: 90 Minutes

💡 Total Sessions Per Month: 16

🎯 Goal: If you're diving into cybersecurity, having clear goals will keep you focused and motivated

Course content

What is penetration testing?

Pentesting vs vulnerability scanning

Types of pentests (black-box, white-box, gray-box)

Legal and ethical considerations (laws, consent, NDAs)

Penetration testing phases overview (PTES model)

Common Network Security Terms

What is Asset., Vulnerability, Exploit, Threat, Attack, Risk

Zero-Day Attack , Pivoting Countermeasures.

Type of Virus, Identify Malware, Virus, Adware, Trojan,

Worms, Spyware, Rootkits, Keyloggers, Scareware, DOS, DDOS, Logic Bomb,

What is Cyber Security, what is hacking Type of Hacker, Read Team and Blue Team, Black-Box vs Grey-Box vs White-Box Penetration Testing,

what is CIA, Type of Cyber Security, Zero Trust Architecture.

Setting up a safe pentesting lab (VMware/EVE-ENG/GNS3/PNETLAB)

Installing Kali Linux / Parrot OS

Using vulnerable machines (Metasploitable, DVWA, TryHackMe, Hack The Box)

Information about Linux and kali Linux

Login and change Password kali Linux

Login and change password Parrot

Finding Your Way Around Kali and Linux Filesystem

Man Pages and Linux commands

Linux Text Editor nano, Leafpad Mousepad

Kali Linux Searching tools locate, find

Update and upgraded kali Linux and Installing and removing tools in kali Linux

Managing kali Linux Services SSH, HTTP, RDP

Transfer file Between Kali Linux and Windows

Passive information gathering

Explain Footprinting and Reconnaissance Concept

Demonstrate Footprinting through Search Engines

Demonstrate Footprinting through internet Research Services

Demonstrate Footprinting through Social Networking Sites

Use Different Techniques for Whois Footprinting

Use Different Techniques for DNS Footprinting

Use Different Techniques for Network and Email Footprinting

Demonstrate Footprinting through Social Engineering

Automate Footprinting Tasks using Advanced tools and AI

Explain Footprinting Countermeasures

WHOIS, DNS records, Google dorking

Shodan, Censys, Recon-ng

LinkedIn/email scraping & metadata analysis

Target profiling and documentation

Active information Gathering with Links

Explain Network Scanning Concepts

Demonstrate Various Scanning Techniques for Host Discovery

Demonstrate Various Scanning Techniques for Port and Service Discovery

Demonstrate Various Scanning Techniques for OS Discovery

Demonstrate Various Techniques for Scanning Beyond IDS and Firewall

Explain Network Scanning Countermeasures

Explain Enumeration Concepts

Demonstrate Different Techniques For Active Directory Enumeration

Demonstrate Different Techniques for SNMP, SMTP, DNS, SMB, NFS, NTP, NetBIOS Enumeration

Explain Enumeration Countermeasures

Learn about the various system hacking methodologies—including Hacking Windows Password without any Software,

using IOS, kali Linux, brute-force attack, Responder and some tools.

Bypass Windows 10, 11 with USB

Cracking password what Jon the Ripper and Hashcat.

ZIP Password Cracking PowerPoint Cracking.

Hacking and Cracking Windows 7, 8, 10, 11, Windows Server 2016, 2018, 2022.

Ubuntu Linux, Red hat, kali Linux, Webserver.

covering tracks—used to discover.

Learn social engineering concepts and techniques, including how to

identify theft attempts, audit human-level vulnerabilities, and suggest

Psychological manipulation and phishing

Summarize Social Engineering

Explain Various Human-based Social Engineering Techniques

Explain Various Computer-based Social Engineering Techniques

Explain Various Mobile-Based Social Engineering Techniques

Web-based Social Engineering

Explain Social Engineering Countermeasures

Red team phishing campaigns

Track find the location of people

Social Engineering Toolkit

Brut-Force on Social Media Pages

Phishing through Site

Phishing with kali Linux tools

Auto-Run USB

Used professional method crying viruses to the target

Defense: security awareness training

social engineering countermeasures.

Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities

as well as countermeasures to defend against sniffing attacks.

Passive and Active Sniffing

Sniffing Tools: Wireshark,

Sniffing Tools: Ettercap, Ettercap, Sniffing Tools: Tcpdump

Sniffing Tools: Aircrack-ng

Sniffing Tools: Burp Suite

DHCP Starvation and Rouge Attack

ARP Poisoning and Spoofing Attack and DNS Spoofing

MAN-IN-THE-MIDDLE (MITM)

Learn about different Denial of Service (DoS) and Distributed DoS

(DDoS) attack techniques, as well as the tools used to audit a target and

devise DoS and DDoS countermeasures and protections.

Ping of Death and ICMP Flooding

Smurf Attack Metasploit and Hping3

TCP Flooding Attack

CDP Flooding Attack

MAC Spoofing Attack

MAC Flooding Attack

Buffer Overflow


Understand different types of wireless technologies, including encryption, threats, hacking methodologies, hacking tools, Wi-Fi security tools, and countermeasures.

Wireless encryption standards

Access point Configuration and setup.

Wired Equivalent Privacy (WEP) Security and Cracking

Wi-Fi Protected Access (WPA) Security and Cracking

Wi-Fi Protected Access || (WPA2) Security and Cracking

Wi-Fi Protected Access ||| (WPA3) Security and Cracking

Capturing handshakes and cracking WPA2

Airmon-ng, Airodump-ng Tools, Aireplay-ng

Evil twin and rogue access point attacks

Tools: Aircrack-ng, Kismet, Wifite

Wireless defense mechanisms

Types of password attacks (brute force, dictionary, rainbow tables)

Tools: Hydra, John the Ripper, Hashcat

Cracking hashes (MD5, SHA, NTLM)

Wordlist generation and manipulation (CeWL, Crunch)

Creating Wordlist with Crunch

Using world fastest Cracking tools hashcat basic to Advanced

Manual vs automated exploitation

Exploit-DB and searchsploit

Using Metasploit Framework

Metasploit framework database and Managing Workspaces

Import Nmap Scan In Metasploit

msfvenom basic to advacned

Creating reverse shells and Bind shells

Common exploits: buffer overflow, RCE, file inclusion

Combine with listeners in Metasploit using exploit/multi/handler.

Use tools like Veil, Shellter, or Obfuscator-LLVM for AV evasion.

System control and information gathering

Privilege escalation (Linux and Windows

Escalating Privileges by Exploiting Client Side Vulnerabilities

New Session for full Access

Add User to Administrators Group

Gaining Access with SMB Port 445

Lifetime Access Windows Persistence

Windows10, 11 Server 2019 Persistence

Armitage Tools

Payload creation (malicious documents)

Gathering hashdump and Cracking

Credential dumping (Mimikatz, LaZagne)

Pivoting and lateral movement

Maintaining access (backdoors, persistence)

Understanding HTTP and web app structure

OWASP Top 10: XSS, SQLi, CSRF, etc.

Burp Suite workflows

Exploiting authentication and session flaws

Vulnerability testing tools (Nikto, sqlmap, etc.)

Session Hijacking

Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Session Hijacking with Remember me

Session Hijacking with Cookies

Session Hijacking Cross-Site Scripting (XSS)

Session Hijacking with ZAP

Session Hijacking Burp Suite

Learn different cloud computing concepts, such as container technologies and server less computing, various cloud computing threats, attacks, hacking methodology, and cloud security techniques and tools.

Download install and configure ownCloud.

Setup Shearing file

Create Group

Create users

Test Security.

Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.

Cryptography Concepts

Caesar Cipher Encrypting algorithm

Cryptography Terminologies

Describe Hash Massage Digest (DM5)

Secure Hash Algorithm (SHA)

Hash Message Authentication Code (HMAC)

Symmetric and Asymmetric Encryption

Creating Encryption

Learn Mobile platform attack vector, android and iOS hacking

Mobile device management, mobile security guidelines, and security tools.

Creating Payload for android APK

Create Trojan with android APK

AppMon: Real-Time Monitoring of App Behavior

Needle: Modular Android Penetration Testing

Metasploit Fretwork

Evil-Droid, Msfvenom, The fatrat

Learn how to identify security loopholes in a target organization’s

network, communication infrastructure, and end systems.

Different types of vulnerability assessment and vulnerability assessment tools.

Tools: Nessus, OpenVAS, Burp Suite, Nmap scripts

Interpreting scan results

Risk ratings (CVSS)

Common Vulnerabilities and Exposures CVE

Prioritizing targets for exploitation

MITRE ATTA&CK Framework

OWASP top 10

Cyber Kill Chain

Unified Kill Chain

Documenting findings clearly

Report Writing for Penetration Testers

Reproducing exploitation steps

Prioritizing issues by impact

Executive summary writing

Technical vs business communication

Virtual Private Networks Allows individual users to securely connect to a private network from a remote location.

Remote Access VPN

SSL, IPSec

Site-to-Site VPN

IPSec (most common)

GRE (Generic Routing Encapsulation)

Download and install and configure Firewall

Cisco ASA Firewall vs Cisco Firepower (Next-Generation Firewall)

super useful for anyone getting into network security, pentesting, or cybersecurity architecture.

Next-Gen IPS (NGIPS) — detects & blocks threats

Application-layer filtering

URL filtering & content control

Malware protection (AMP)

Security Intelligence feeds (block malicious IPs, URLs, domains)

Basic Bash Script

Variable in Bash Script

Bash Script Arguments

Bash Script Reading User input

IF, ELSE, ELIF Statements

Boolean Logical Operations

Computer Variables

Loop, For Loops, While Loops

Functions

Creating Project with help of AI

DOS Attack Project

🔍 1. Information Gathering

1. Nmap Port scanning, service detection

2. Netcat Network utility (read/write over TCP/UDP)

3. Recon-ng Web-based recon framework

4. theHarvester Emails, subdomains, hosts

5. Maltego Link analysis and data mining

6. Shodan Search engine for internet-connected devices

7. FOCA Metadata extraction

8. DNSenum DNS information enumeration

9. Sublist3r Subdomain enumeration


📦 2. Vulnerability Scanning

11. Nessus Comprehensive vulnerability scanner

12. OpenVAS Open-source vulnerability scanner

13. Nikto Web server vulnerability scanning

14. Nmap (NSE) Scriptable network scans

15. Burp Suite (Scanner) Web app vuln detection (Pro)


💥 3. Exploitation Frameworks

16. Metasploit Exploit development and execution

17. BeEF Browser exploitation

18. SQLMap SQL injection automation

19. Commix Command injection testing

20. Exploit-DB Database of public exploits


🧬 4. Password Cracking & Bruteforce

21. Hydra Network service brute-forcer

22. John Password cracking tool

23. Hashcat GPU-accelerated hash cracker

24. Medusa Fast brute-forcer

25. CeWL Custom wordlist generator


🌐 5. Web Application Testing

26. Burp Suite Intercept/modify HTTP traffic

27. OWASP ZAP Open-source web app scanner

28. Wapiti Web app vulnerability scanner

29. XSStrike XSS detection and fuzzing

30. Nikto Web server scanner (again, yes!)


🛰️ 6. Wireless Attacks

31. Aircrack-ng Wi-Fi key cracking

32. Kismet Wireless network sniffer

33. Wifite Automated WPA/WEP attacks

34. Reaver WPS brute-force

35. Fluxion WPA social engineering attacks


👣 7. Post-Exploitation & Lateral Movement

36. Mimikatz Credential harvesting (Windows)

37. Empire PowerShell post-exploitation

38. CrackMapExec AD enumeration & attacks

39. BloodHound AD privilege escalation mapping

40. Nishang PowerShell scripts for pentesting


👻 8. Social Engineering & Phishing

41. Social-Engineer Toolkit (SET) Phishing, cloning, payload delivery

42. Gophish Phishing simulation tool

43. Evilginx2 Advanced phishing (bypass 2FA)

44. King Phisher Campaign management & delivery

45. ShellPhish Termux phishing toolkit (educational use only)


🖥️ 9. Container / Cloud Security

46. Trivy Container image scanning

47. ScoutSuite AWS, Azure, GCP auditing

48. Prowler AWS security best practices

49. Kube-hunter Kubernetes vulnerability scanner

50. CloudSploit Cloud configuration auditing

CompTIA Security Plus

Certified Ethical Hacker (CEHv13)

CompTIA PenTest+

Certified Information Systems Auditor (CISA)

Certified Expert Penetration Tester (CEPT)

Certified penetration testing professional (CPENT)

Offsec Certified Professional PWK (OSCP)

CISSP - Certified Information Systems Security Professional

Download PDF