dots bg

Cyber Security

Total Duration: 180 Hours
Training Format: 6 Hours per Day
Total Training Days: 30 Days Training Schedule Overview Daily Schedule: 3 Hours Classroom Learning 3 Hours Practical Lab Work

Course Instructor: Admin

₹7999.00

To enroll in this course, please contact the Admin
dots bg

Course Overview

The Cyber Security course focuses on protecting digital systems, networks, and data from cyber threats. The course begins with cybersecurity fundamentals, explaining the importance of security, common cyber threats, and the CIA triad principles of confidentiality, integrity, and availability. Students learn about different types of malware and vulnerabilities while setting up virtual lab environments for practical security testing. The course then covers operating system security for Linux and Windows, including user permissions, file management, and system hardening techniques. Networking concepts such as the OSI model, TCP/IP protocols, and packet analysis using tools like Wireshark are also taught. Cryptography is another important section where students study encryption methods, hashing algorithms, public-key infrastructure, and digital signatures. The ethical hacking portion introduces penetration testing methodologies including reconnaissance, footprinting, scanning, and enumeration. Students also learn about web security vulnerabilities such as SQL injection, cross-site scripting, and command injection. The program concludes with vulnerability assessment and penetration testing (VAPT), where students perform a complete security audit and produce a professional security report as their final project. 

Schedule of Classes

Course Curriculum

79 Subjects

Introduction to Cybersecurity

What is cybersecurity

Importance of cybersecurity

Types of cyber threats

Lab Work

Install VirtualBox / VMware

Create virtual lab environment

History of Cybercrime

Evolution of cybercrime

Famous cyber attacks

Modern cyber threats

Lab Work

Research 3 major cyber attacks

Write short attack analysis

CIA Triad

Confidentiality

Integrity

Availability

Lab Work

Identify CIA principles in real-world systems

Threats, Attacks & Vulnerabilities

Types of threats

Types of attacks

Vulnerability concepts

Lab Work

Identify vulnerabilities in sample systems

Malware Basics

Virus

Worm

Trojan

Ransomware

Spyware

Lab Work

Analyze malware behavior in sandbox environment

Install Ubuntu / Kali Linux

Operating System Security – Linux Security Basics

Linux security architecture

File system structure

Lab Work

File Permissions & User Management

chmod

chown

user permissions

Lab Work

Create users

Change file permissions

Windows Security

Windows security features

User account control

Lab Work

Configure Windows security settings

OS Hardening

OS hardening techniques

Security updates

Firewall basics

Lab Work

Harden Linux system

Networking for Security – Networking Fundamentals

OSI model

TCP/IP model

Lab Work

Identify network layers in real traffic

Ports & Protocols

Common ports

Network services

Lab Work

Scan open ports on local machine

DNS, DHCP, HTTP/HTTPS

DNS resolution

DHCP process

Web protocols

Lab Work

Capture packets using Wireshark

Introduction to Cryptography

Encryption concepts

Importance of cryptography

Lab Work

Generate encrypted message

Symmetric Encryption

AES encryption

Shared key encryption

Lab Work

Encrypt files using OpenSSL

Asymmetric Encryption

Public & private keys

RSA encryption

Lab Work

Generate public/private key pair

Hashing Algorithms

MD5

SHA256

Lab Work

Generate & compare file hashes

Digital Signatures & PKI

Public Key Infrastructure

Digital certificates

Lab Work

Sign file using GPG

Ethical Hacking Basics

Ethical hacking overview

Legal considerations

Lab Work

Setup Kali Linux lab

Phases of Hacking

Reconnaissance

Scanning

Exploitation

Covering tracks

Lab Work

Map attack lifecycle

Virtualization for Security Labs

Virtual lab environments

Lab Work

Install DVWA vulnerable app

Footprinting

Passive reconnaissance

Information gathering

Lab Work

Use WHOIS

Reconnaissance Tools

Nslookup

Google Dorking

Shodan

Perform domain recon

Lab Work

Port Scanning

Port scanning techniques

Nmap basics

Lab Work

Scan network using Nmap

Banner Grabbing

Service identification

Lab Work

Banner grabbing using Netcat

Enumeration

SNMP enumeration

SMB enumeration

NetBIOS enumeration

Lab Work

Enumerate network services

Web Security Basics

HTTP headers

Cookies

Lab Work

Analyze web request headers

DVWA Practice

Web vulnerabilities overview

Lab Work

Explore DVWA vulnerabilities

SQL Injection Basics

SQL injection attacks

Lab Work

Perform SQLi on DVWA

VAPT & Web Security – Vulnerability Assessment

VAPT methodology

Lab Work

Scan system using Nessus/OpenVAS

CVE & CVSS

Vulnerability scoring system

Lab Work

Analyze CVE database

OWASP Top 10

Web application vulnerabilities

Lab Work

Identify OWASP vulnerabilities

Cross-Site Scripting (XSS)

Types of XSS

Lab Work

Perform XSS attack using Burp Suite

File Upload Vulnerabilities

Unsafe file upload risks

Lab Work

Practice file upload bypass

Command Injection

OS command injection

Lab Work

Exploit command injection

Password Attacks

Brute force attacks

Lab Work

Use Hydra for password cracking

Dictionary Attacks

Password dictionary attacks

Lab Work

Crack passwords using John the Ripper

Rainbow Tables

Password hash cracking

Lab Work

Compare hash cracking techniques

Security Testing Practice

Penetration testing workflow

Lab Work

Perform mini penetration test

Security Reporting

Writing vulnerability reports

Lab Work

Create security assessment report

Final Security Project- Lab Work


Reconnaissance

Scanning

Vulnerability identification

Exploitation testing

Security report

Course Instructor

tutor image

Admin

371 Courses   •   1565 Students