Course Description: Unleash your creativity with a Graphic Designing course. Master industry-standard tools and techniques to create stunning visuals for digital and print media.
Topics Covered:
Basics
Wireshark
Kali Linux
Network
Scanning
Burp Suite
Pro Tools
Attacks
Syllabus
Module 1: Exploring Ethical Hacking
Introduction
Commonly used terms Related to Ethical Hacking
Information Security
The Security, Functionality and Usability Triangle
Information Security Threats and Attack Vectors
Information Security Threats
Network Threat
Host Threat
Application Threat
Motives and Objectives of an Information Security Attack
Types of Hacking Attacks
Information Warfare
Offensive Information Warfare
Defensive Information Warfare
LAB 1
Camphish
zphisher
haveibeenpwned
tbomb
OSINT
Darkweb
MODULE 2: Gathering Information About Target Computer Systems - Footprinting and Investigation
Foot printing Concepts
Foot printing Objectives
LAB 2
GHDB
Shodan
Netcraft
Archive.org
Module 3: Exploring Malware Threats and Their Countermeasures
Introduction to Malware
Malware Examples
Malware Propagation
LAB 3
Metasploit
i love you virus
Httrack
Module 4: Gaining Access To Systems-Hacking
Goals and Methodology of Hacking
Password Cracking
Types of Password Attacks
Microsoft Authentication Platforms
Password Salting
LAB 4
Colasoft
Module 5: Monitoring and Capturing Data Packets Using Sniffing
Network Sniffing
Types of Sniffing
Sniffing in OSI Model and Vulnerable Protocols
Wiretapping
LAB 5
Glasswire
Wireshark
Module 6: Web Servers And Threats Associated With It
Web Server Concept
Architecture of Web Server
Web Server Attacks
LAB 6
OWASP ZAP
Module 7: Injecting Code In Data Driven Applications: SQL Injection
SQL Injection Concepts
Definition of SQL Injection
Attacks Caused by SQL Injection
Anatomy of a SQL Injection Attack
SQL Injections and Server-Side Technologies
LAB 7
Burp Suite
Module 8: Hacking Mobile Platforms And Threats Associated With It
Mobile Business Environment: Vulnerable Areas
Major Risk for Mobile Platforms
Mobile Attack: Benefits for Hacker
Mobile Platform Vulnerabilities and Risks
Mobile Spam
SMS Phishing Attack (SMSishing)
LAB 8
The truth spy
Module 9: Cloud Computing, Virtualisation And Threats Associated With It
Cloud Computing
Cloud Deployment Models
Cloud Computing Benefits and Characteristics
Understanding Virtualisation
Types of Virtualisation
LAB 9
Creating cloud account
Wifi hacking using Aircrack-ng
TryHackMe
Learning Outcome
Understand core cybersecurity principles and identify common threats.
Related Courses
Cyber Security Level 1
Focuses on cryptography, ethical hacking, and network defense,
enabling learners to detect and mitigate real-world cyber threats.
Cyber Security Level 2
Covers advanced penetration testing, digital forensics, and
cloud security to strengthen enterprise-level protection systems.
Blockchain Beginner
Explains blockchain fundamentals, distributed ledger technology, and smart contract basics.
Learners understand decentralization and its applications in modern systems.
Home>Courses
Cyber security level 1
Course Information
Level:Beginner
Modules:19
Duration:2 Months
Category:Cyber Security
Language:English
Certificate:Yes
Course Overview
Course Description:Intermediate cybersecurity skills focusing on threat detection, risk management, and security controls.
Topics covered:
Basics
Wireshark
Kali Linux
Network
Scanning
Burp Suite
Syllabus
Module 1: Exploring Ethical Hacking
Introduction
Commonly used terms Related to Ethical Hacking
Information Security
The Security, Functionality and Usability Triangle
Information Security Threats and Attack Vectors
Information Security Threats
Network Threat
Host Threat
Application Threat
Motives and Objectives of an Information Security Attack
Types of Hacking Attacks
Information Warfare
Offensive Information Warfare
Defensive Information Warfare
LAB 1
Camphish
zphisher
haveibeenpwned
tbomb
Bevigil
Stopncii
Darkweb
MODULE 2: Associated Protocols
Networking Models
The Layered Approach
Advantages of layered Architecture
LAB 2
Cisco Packet Tracer
Module 3: Gathering Information About Target Computer Systems Footprinting And Investinagtion
Foot printing Concepts
Foot printing Objectives
Footprinting Methodology
Footprinting Through Search Engine
Footprinting Using Advanced Google Hacking Techniques
Footprinting Through Social Networking Websites
LAB 3
Whois
GHDB
Archive.org
Shodan
Httrack
Module 4: Scanning Computers In The Networks
Network Scanning
Scanning Methodology
Live Systems Scanning
Port scanning
Scanning beyond IDS
LAB 4
Colasoft
Fping
Nmap
Module 5: Vulnerabilities Associated With Systems
What is a Vulnerability Assessment?
Benefits of Vulnerability Assessment
Type of Vulnerability Assessments
LAB 5
Nikto
Module 6: :Exploring Malware Threats And Their Countermeasures
Introduction to Malware
Malware Examples
Malware Propagation
Trojan Concepts
Virus and Worms
LAB 6
Metaspolit
I Love You Virus
Module 7: Enumeration-Listing The System/Users And Connecting Them
Enumeration in Ethical Hacking
Enumeration Techniques
Enumeration Types
LAB 7
Nmap
Module 8: Gaining Access To Systems-Hacking
Goals and Methodology of Hacking
Password Cracking
Types of Password Attacks
Microsoft Authentication Platforms
Password Salting
Escalating Privileges
Executing Applications
LAB 8
Colasoft
(SET)
Hydra
Module 9: Monitoring And Capturing Data Packets Using Sniffing
Network Sniffing
Types of Sniffing
Wiretapping
MAC Attacks
DHCP Starvation Attack
ARP Poisoning
LAB 9
Glasswiresetup
Wireshark
tcpdump
Module 10: Restricting The System Access - Denial Of Service (Dos Attack)
DoS/DDoS Concepts
Distributed Denial of Service Attack
Working of Distributed Denial of Service Attack
Techniques of DoS/DDoS Attack
Service Request Flood Attack
ICMP Attack
peer-to-peer Attack
Program- and Application-Level Attack
Permanent DoS Attack
Distributed Reflection Denial of service (DRDoS)
LAB 10
DOS tools slowloris
Hping3
Module 11: Tricking People To Gather Confidential Information - Social Engineering
Social Engineering
Impact of Attack on a Company
Behaviours Vulnerable to Attacks
Factors that Make Organisations Vulnerable to Attacks.
Why Social Engineering is Effective
Phases in Social Engineering Attack
LAB 11
BeEF
Module 12: Web Servers And Threats Associated With It
Web Server Concepts
Architecture of Service
Web Server Attack
Attack Methodology
LAB 12
sqlmap
OWASP ZAP
Dirb
Module 13: Web Applications And Threats Associated With It
Introduction to Web Applications
Web Application Architecture
Web 2.0 Applications
Vulnerability Stack Web App
Threats Unvalidated Input
Parameter/Form Tampering
Directory Traversal Security
Misconfiguration Injection Flaws
SQL Injection Attacks
Cross-Site Request
Forgery (CSRF) attack
LAB 13
Burp Suite
Wapiti
Xsstrike
Module 14: Controlling User Session With Authenticated TCP Connection Session Hacking
Concepts of Session Hijacking
Session Hijacking Process
Session Hijacking IOS modole
Application Level Session Hijacking
Session Sniffing
Predicting Session Token
Using Man-in-the-Browser Attack
LAB 14
Brute Force Attack with Hydra
Session Hijacking with Burp Suite
Password Cracking with John the Ripper
Module 15: Injecting Code In Data Driven Applications, SQL Injection
SQL Injection Concepts
Types of SQL Injection (SQLi)
Union SQL Injection
Blind SQL Injection
System Stored Procedures
Definition of SQL Injection
LAB 15
SQLMap
jSQL Injection
Module 16: Hacking Mobile Plateforms And Threats Associated With It
Mobile Bussiness Environment:Vulnerable Areas
Major Risk for Mobile Platforms
Mobile attack: Benifits for hacker
Mobile Platform Vulnerabilities and risks
Mobile Spam
SMS Phishing Attack (SMSishing)
LAB 16
The Truth spy
Metasploit Creating Android RAT
Module 17: Encrypting And Decrypting The Code Cryptography And Its Types
Cryptography
Types of Cryptography
Government Access to Keys (GAK)
Encryption Algorithms: Ciphers
Data Encryption Standard (DES)
LAB 17
OpenSSL
Hashcat
GnuPG(GPG)
John the Ripper
Hashcat
Module 18: Evading IDS, Firewalls and Honeypots
Intrusion Detection Systems (IDS)
Working of an IDS
Network Based Attacks
Types of Intrusion Detection Systems
Network Intrusion Detection System (NIDS)
Types of Firewall
LAB 18
TCPick
Module 19: Wireless Networks and Threats Associated with it
Wireless Concepts
Wireless Local Area Network (WLAN)
Wireless Metropolitan Area Networks (WMAN)
Wireless Wide Area Network (WWAN)
Wireless Personal Area Network (WPAN)
Multiple Device Support
LAB 19
Wifi hacking using Aircrack-ng
Learning Outcome
Implement security measures, manage risks, and respond to security incidents.
Related Courses
Cyber Security Beginner
Introduces core cybersecurity concepts, including online safety, threat awareness,
and basic risk prevention to protect digital assets effectively.
Cyber Security Level 2
Covers advanced penetration testing, digital forensics, and
cloud security to strengthen enterprise-level protection systems.
Blockchain Beginner
Explains blockchain fundamentals, distributed ledger technology, and smart contract basics.
Learners understand decentralization and its applications in modern systems.
Home>Courses
Cyber security level 2
Course Information
Level:Beginner
Modules:22
Duration:3 Month
Category:Cyber Security
Language:English
Certificate:Yes
Course Overview
Course Description: Advanced cybersecurity practices, including ethical hacking, security architecture, and advanced threat mitigation.
Topics Covered:
Basics
Wireshark
Kali Linux
Network
Scanning
Burp Suite
Syllabus
Module 1: Exploring Ethical Hacking
Introduction
Commonly used terms Related to Ethical Hacking
Information Security
The Security, Functionality and Usability Triangle
Information Security Threats and Attack Vectors
Information Security Threats
Network Threat
Host Threat
Application Threat
Motives and Objectives of an Information Security Attack
Types of Hacking Attacks
Information Warfare
Offensive Information Warfare
Defensive Information Warfare
LAB 1
Camphish
zphisher
haveibeenpwned
tbomb
Bevigil
Stopncii
Darkweb
Module 2: Associated Protocols
Networking Models
The Layered Approach
Advantages of layered Architecture
LAB 2
Cisco Packet Tracer
Module 3: Footprinting and Investigation
Foot printing Concepts
Foot printing Objectives
Footprinting Methodology
Footprinting Through Search Engine
Footprinting Using Advanced Google Hacking Techniques
Footprinting Through Social Networking Websites
Website Footprinting
Email Footprinting
Competitive Intelligence
WHOIS Footprinting
DNS Footprinting
Network Footprinting
Footprinting Through Social Engineering
LAB 3
Whois
GHDB
Archive.org
Shodan
Httrack
Module 4: Scanning Computers In The Networks
Network Scanning
Scanning Methodology
Live Systems Scanning
Port scanning
Scanning beyond IDS
LAB 4
Colasoft
Fping
Nmap
Module 5: Vulnerabilities Associated With Systems
What is a Vulnerability Assessment?
Benefits of Vulnerability Assessment
Type of Vulnerability Assessments
LAB 5
Nikto
Module 6: Exploring Malware Threats And Countermeasures
Introduction to Malware
Malware Examples
Malware Propagation
Trojan Concepts
Virus and Worms
LAB 6
Metaspolit
I Love You Virus
Module 7: Enumeration
Enumeration in Ethical Hacking
Enumeration Techniques
Enumeration Types
LAB 7
Nmap
enum4linux
snmpwalk
Metasploit for Enumeration
Module 8: Gaining Access To Systems
Goals and Methodology of Hacking
Password Cracking
Types of Password Attacks
Microsoft Authentication Platforms
Password Salting
Escalating Privileges
Executing Applications
LAB 8
Colasoft
(SET)
Hydra
Module 9: Sniffing
Network Sniffing
Types of Sniffing
Wiretapping
MAC Attacks
DHCP Starvation Attack
ARP Poisoning
LAB 9
Wireshark
tcpdump
Module 10: Denial Of Service (DoS/DDoS)
DoS/DDoS Concepts
Distributed Denial of Service Attack
Working of DDoS Attack
Techniques of DoS/DDoS Attack
Service Request Flood Attack
ICMP Attack
Peer-to-Peer Attack
Program/Application Level Attack
Permanent DoS Attack
DRDoS Attack
LAB 10
Slowloris
Hping3
GoldenEye
Module 11: Social Engineering
Social Engineering
Impact on Company
Behaviours Vulnerable to Attacks
Factors Making Organisations Vulnerable
Why Social Engineering is Effective
Phases in Social Engineering Attack
LAB 11
BeEF
Module 12: Web Servers
Web Server Concepts
Architecture of Service
Web Server Attack
Attack Methodology
LAB 12
sqlmap
OWASP ZAP
Dirb
Module 13: Web Applications
Introduction to Web Applications
Working of Web Applications
Example of a Web Application
Advantages of Web Applications
Web Application Architecture
Web 2.0 Applications
Web App Threats
Unvalidated Input
Parameter/Form Tampering
Directory Traversal
Security Misconfiguration
LAB 13
Burp Suite
Wapiti
Xsstrike
Module 14: Session Hacking
Concepts of Session Hijacking
Session Hijacking Process
Packet Analysis of Local Session Hijack
Types of Session Hijacking
Application Level Session Hijacking
Session Sniffing
Predicting Session Token
Man-in-the-Middle Attack
LAB 14
Brute Force with Hydra
Session Hijacking with Burp Suite
Password Cracking with John the Ripper
Module 15: SQL Injection
SQL Injection Concepts
Types of SQL Injection
Union SQL Injection
Blind SQL Injection
System Stored Procedures
Definition of SQL Injection
LAB 15
SQLMap
jSQL Injection
Module 16: Hacking Mobile Platforms
Major Risk for Mobile Platforms
Benefits for Hackers
Mobile Platform Vulnerabilities
Mobile Spam
SMSishing
LAB 16
The Truth Spy
Metasploit Android RAT
Module 17: Cryptography
Cryptography
Types of Cryptography
Government Access to Keys
Encryption Algorithms
DES
LAB 17
OpenSSL
Hashcat
GnuPG
John the Ripper
Module 18: Evading IDS, Firewalls and Honeypots
Intrusion Detection Systems
Working of IDS
Network Based Attacks
Types of IDS
NIDS
Types of Firewall
LAB 18
TCPick
Module 19: Wireless Networks
Wireless Concepts
WLAN
WMAN
WWAN
WPAN
Multiple Device Support
LAB 19
Wifi Hacking using Aircrack-ng
Module 20: Cloud Computing and Virtualisation
Cloud Computing
Types of Cloud Services
Cloud Deployment Models
Cloud Characteristics
Understanding Virtualisation
Types of Virtualisation
Module 21: Output Analysis And Reports
Staying Abreast: Security Alerts
Module 22: Economics And Laws
Passwords and Encryption
Learning Outcome
Develop and manage comprehensive security solutions and conduct advanced security assessments.
Related Courses
Cyber Security Beginner
Introduces core cybersecurity concepts, including online safety, threat awareness,
and basic risk prevention to protect digital assets effectively.
Cyber Security Level 1
Focuses on cryptography, ethical hacking, and network defense,
enabling learners to detect and mitigate real-world cyber threats.
Blockchain Beginner
Explains blockchain fundamentals, distributed ledger technology, and smart contract basics.
Learners understand decentralization and its applications in modern systems.