Home > Course

Cyber Security Beginner



Course Information

Level:Beginner
Modules:9
Duration: 1 Month
Category:Cyber Security
Language:English
Certificate:Yes

Course Overview

Course Description: Unleash your creativity with a Graphic Designing course. Master industry-standard tools and techniques to create stunning visuals for digital and print media.

Topics Covered:

  • Basics
  • Wireshark
  • Kali Linux
  • Network
  • Scanning
  • Burp Suite
  • Pro Tools
  • Attacks

Syllabus

Module 1: Exploring Ethical Hacking

  • Introduction
  • Commonly used terms Related to Ethical Hacking
  • Information Security
  • The Security, Functionality and Usability Triangle
  • Information Security Threats and Attack Vectors
  • Information Security Threats
  • Network Threat
  • Host Threat
  • Application Threat
  • Motives and Objectives of an Information Security Attack
  • Types of Hacking Attacks
  • Information Warfare
  • Offensive Information Warfare
  • Defensive Information Warfare

LAB 1

  • Camphish
  • zphisher
  • haveibeenpwned
  • tbomb
  • OSINT
  • Darkweb

MODULE 2: Gathering Information About Target Computer Systems - Footprinting and Investigation

  • Foot printing Concepts
  • Foot printing Objectives

LAB 2

  • GHDB
  • Shodan
  • Netcraft
  • Archive.org

Module 3: Exploring Malware Threats and Their Countermeasures

  • Introduction to Malware
  • Malware Examples
  • Malware Propagation

LAB 3

  • Metasploit
  • i love you virus
  • Httrack

Module 4: Gaining Access To Systems-Hacking

  • Goals and Methodology of Hacking
  • Password Cracking
  • Types of Password Attacks
  • Microsoft Authentication Platforms
  • Password Salting

LAB 4

  • Colasoft

Module 5: Monitoring and Capturing Data Packets Using Sniffing

  • Network Sniffing
  • Types of Sniffing
  • Sniffing in OSI Model and Vulnerable Protocols
  • Wiretapping

LAB 5

  • Glasswire
  • Wireshark

Module 6: Web Servers And Threats Associated With It

  • Web Server Concept
  • Architecture of Web Server
  • Web Server Attacks

LAB 6

  • OWASP ZAP

Module 7: Injecting Code In Data Driven Applications: SQL Injection

  • SQL Injection Concepts
  • Definition of SQL Injection
  • Attacks Caused by SQL Injection
  • Anatomy of a SQL Injection Attack
  • SQL Injections and Server-Side Technologies

LAB 7

  • Burp Suite

Module 8: Hacking Mobile Platforms And Threats Associated With It

  • Mobile Business Environment: Vulnerable Areas
  • Major Risk for Mobile Platforms
  • Mobile Attack: Benefits for Hacker
  • Mobile Platform Vulnerabilities and Risks
  • Mobile Spam
  • SMS Phishing Attack (SMSishing)

LAB 8

  • The truth spy

Module 9: Cloud Computing, Virtualisation And Threats Associated With It

  • Cloud Computing
  • Cloud Deployment Models
  • Cloud Computing Benefits and Characteristics
  • Understanding Virtualisation
  • Types of Virtualisation

LAB 9

  • Creating cloud account
  • Wifi hacking using Aircrack-ng
  • TryHackMe

Learning Outcome

  • Understand core cybersecurity principles and identify common threats.


Related Courses

Service 2
Cyber Security Level 1

Focuses on cryptography, ethical hacking, and network defense, enabling learners to detect and mitigate real-world cyber threats.



Service 2
Cyber Security Level 2

Covers advanced penetration testing, digital forensics, and cloud security to strengthen enterprise-level protection systems.



Service 2
Blockchain Beginner

Explains blockchain fundamentals, distributed ledger technology, and smart contract basics. Learners understand decentralization and its applications in modern systems.