Skip to content

Ethical Hacking+ Program

Contact us on Whatsapp for Demo class or to enroll in the batch. Learn why to choose CyberForge Academy?

Duration: 6 weeks

Fees: 4,999 INR (Original Fee: 9999 INR)

Delivery: Online instructor-led classes on Weekends

Who Should Take This Course?

  • Students in B.Tech./M.Tech./BCA/MCA/BSc(IT)
  • Students with Diploma in Computer Science
  • Students in 11th or 12th class (with Computer Subject)
  • Working professionals interested in Cybersecurity

The objective of this program is to teach theory and hands-on concepts related to Ethical Hacking and Cybersecurity.

Tools used: Nmap, Wireshark, SQLMap, Burp Suite, Zap Proxy, Hydra, Metasploit

Program Syllabus

Module 1: Computer Science Fundamentals

  • Computer Networks Basics
    • How networks actually work?
    • OSI vs TCP/IP model in practice
    • Fundamental Protocols
      • ARP
      • DNS
      • DHCP
      • ICMP
  • Operating System Basics
    • How exactly does the OS work?
    • Kernel vs Userspace
    • Linux vs Windows vs MacOS
    • Writing C program to understand how compilation works
  • Linux Basics
  • Git and Github
  • Basics and Advanced commands
  • Important Services and nuances of Linux

Module 2: Cybersecurity Fundamentals

  • Understanding cybersecurity basics
  • Core principles and terminologies
  • Tools of Trade and lab setups

Module 3: Cryptography

  • Introduction to Cryptography
  • Cryptographic Hashes
  • Encryption Schemes: Symmetric and Asymmetric (PKC)
  • Digital Signatures
  • Hands-on: Calculating Hash with online and CLI tools
  • Hands-on: Encrypting and decrypting data with AES/RSA
  • Hands-on: Creating and using Digital Signature

Module 4: Virtualization

  • Virtual Machine and Virtualization Basics
  • Setting up and managing virtual machines (VirtualBox)
  • Containers and Containerization Basics
  • Docker, Docker Desktop and Docker Compose
  • Building and running Docker images
  • Building home lab
  • Hands-on: Install VirtualBox and create Kali VM
  • Hands-on: Install Docker and run target containers on Kali

Module 5: Network Security

  • Fundamentals of network security
  • Basic network security protocols and devices
    • FTP
    • HTTP
    • Telnet
  • Secure alternatives and how to use those
    • Secure FTP
    • HTTPS
    • SSH
  • Traffic Capture and Analysis
  • Introduction to Wireshark, Traffic/Capture Filters and tricks
  • Hands-on: Capture and save traffic with Wireshark
  • Hands-on: Analyze HTTP, DNS, ARP traffic
  • Hands-on: TCP/UDP Stream Reconstruction
  • Hands-on: Export unencrypted files from Traffic
  • Host discovery and Identification
  • Introduction to NMap, Commands and Scripts
  • Hands-on: Network scanning to discover hosts
  • Hands-on: Device/OS Fingerprinting
  • Hands-on: Detection of services and attacking those with scripts
  • Understanding the difference in HTTP and HTTPS
  • Hands-on: Creating a setup with Web Server
  • Hands-on: Creating TLS certificate with OpenSSL and configuring web server on HTTPS

Module 6: Security in Host Systems

  • What is a vulnerability?
  • How are systems exploited or hacked?
  • Hands-on: Hacking a vulnerable machine
  • What are Firewalls and AVs?
  • How defensive components work and can be bypassed?
  • Hands-on: Configure Firewall on Windows, Linux and MacOS
  • What is privilege escalation and how is it done?
  • Hands-on: Perform Privilege escalation

Module 7: Web and Application Security

  • How Web Applications work and how those are hosted?
  • Basics of web application security
  • Tools and common web vulnerabilities (OWASP Top 10 2021)
    • Broken Access Control
    • Cryptographic Failures
    • Injection
    • Insecure Design
    • Security Misconfiguration
    • Vulnerable and Outdated Components
    • SSRF
  • Hands-on: Web application attack to exploit all common vulnerabilities
  • Secure Coding and Best practices
  • Web Application Firewall
  • Hands-on: Configuring a WAF
  • What is Captcha and Why is it used?
  • Hands-on: Setting up a captcha and breaking it

Module 8: WiFi Security

  • WiFi Basics and Traffic Analysis
  • DIfferent security schemes i.e. WEP, WPA/WPA2-PSK
  • Hands-on: Hacking a WiFi network
  • Hands-on: Securing a wireless network

Module 9: Cloud Security

  • What exactly is cloud?
  • AWS Basics and usage
  • How to use 5 most popular services of AWS 
  • Common security misconfiguration on AWS
  • Hands-on: Identifying and exploiting misconfiguration on AWS infrastructure
  • Defending AWS Cloud
  • Hands-on: Protecting AWS cloud from hacks

Module 10: Path Forward

  • Beginner Cybersecurity Certifications, Jobs and Career Path
  • Identifying your strengths and interest
  • How to imbibe continuous learning

Capstone Project

  • Using the acquired knowledge, develop a real-world Cybersecurity project or open source Cybersecurity tool
  • Coding vs non-coding projects

Why select us for Summer training?

Our instructors have taught these topics to multiple students and received splendid feedback. They have worked extensively in hands-on Cybersecurity projects and development/deployment of real world SaaS applications. Our course is going to be 70% hands-on, with real world examples/tools.

Are there any special benefit for students of this program?

The following benefits are extended to the students:

  • Access to community to ask questions and doubts
  • Access to job alert group
  • Certificate of Completion
  • Open-source Project idea and guidance
  • Further discounts on our other programs

Enrollment started for August 24 Weekend and Bootcamp batches. Reserve your seat at discounted price now!

× How can I help you?