Ethical Hacking Training
24 JUNE – 24 JULY • $250 (21K INR)
FOR STUDENTS/FRESHERS ONLY
Cybersecurity Landscape & Careers
+Why Cybersecurity?
Industry Overview (Threat growth, market size, exit types)
Career Paths (SOC analysis, IR, GRC, pentesting, cloud use)
Future Trends 2025-2035 (Ad-driven attacks, zero-trust, quantum impact)
Getting Hired
Certifications & Skills Map (CompTIA, CISSP Associate, AWS SAA)
Resume & LinkedIn Tips (Action verbs, project showcases)
Interview Prep (Common Q&A, hands-on lab demonstrations)
AI in Use AI-Powered
IT Foundations
+Hardware & Virtualization
Computer Components (CPU, RAM, storage, motherboard)
Virtual Machines vs. Containers (Docker, VMware, Hyper-V)
Setting Up a Home Lab (Free tools, network sim)
Windows Fundamentals
Windows Architecture (Kernel, user-mode, registry)
PowerShell Basics (Scripting for automation)
Windows Security Controls (MAC, Windows Defender)
Linux Fundamentals
Linux Distros & Filesystem (Ubuntu, CentOS, permissions)
Shell Scripting (Bash basics, automation)
Linux Security Tools (SELinux, SEsTune, audits)
AI in Use AI-Powered
Networking & Protocols
+TCP/IP Deep-Dive
OSI vs. TCP/IP Model
IP Addressing & Subnets
ARP/ICMP, DHCP
Common Protocols
Routing & NAT
HTTP/S & Web Traffic
DNS Operation & Security
Email Protocols (SMTP, IMAP, POP3)
SMB, LDAP, RDP
Network Defense Basics
Firewalls & ACLs
IDS/IPS Fundamentals
VPN & Zero-Trust Network Access
Network Segmentation Best Practices
AI in Use AI-Powered
Operating Systems Security
+Host Hardening
Patch Management
Secure Configuration (CIS Benchmark)
Application Whitelisting
AV vs. EDR
Behavioral Monitoring
Host-Based Firewall & HIPS
Windows Event Logs
Linux syslog & auditd
Centralized Log Collection
AI in Use AI-Powered
Identity & Access Management
+Authentication & Access
Passwords & MFA
Reference & SSO
OAuth/OpenID Connect
RBAC, ABAC, PBAC
Cloud IAM (AWS, Azure, GCP)
Privileged Access Management
Directory Services
Active Directory Basics
Azure AD & Identity Fabric
AD Hardening & Audit
AI in Use AI-Powered
Cryptography Essentials
+Core Concepts
Symmetric vs. Asymmetric
Hashing & MACs
Key Management Basics
Protocols & Standards
TLS/SSL Deep Dive
PKI & Certificates
VPN Crypto (IPSec, WireGuard)
Future Crypto
Quantum-Safe Algorithms
Blockchain & Smart Contract Security
Cryptographic Attacks (Padding Oracles, ROCA)
AI in Use AI-Powered
Web & Application Security
+OWASP Top 10
Injection Flaws
Broken Auth & Session Management
XSS & CSP
Insecure Deserialization
Other OWASP Top 10
Secure Dev Practices
SDLC & DevOps
Static & Dynamic Analysis (SAST/DAST)
Dependency Management & SBOM
Container Security (Docker Bench)
API & Mobile Security
REST & GraphQL Risks
Mobile App Hardening
API Gateway & WAF
AI in Use AI-Powered
Cloud Security Basics
+Cloud Fundamentals
Shared Responsibility Model
Cloud Service Models (IaaS, PaaS, SaaS)
Cloud Security Posture Management
Platform Security
AWS Security Services
Azure Security Center
GCP Security Command Center
Cloud Workloads & Containers
Kubernetes Security Basics
Serverless Functions Security
Cloud Network Best Practices
AI in Use AI-Powered
Threats, Vulnerabilities & Pentesting Intro
+Common Threats
Malware Families & TTPs
Social Engineering Trends
Hidden Threats & Supply Chain
Vulnerability Assessment
Nessus & OpenVAS
Web App Scanning (Burp Suite, OWASP ZAP)
Network Vulnerability Scanning
Pentest Primer
Pentest Methodology
Report Writing & Findings
Ethical Hacking Labs
AI in Use AI-Powered
Incident Response & SIEM
+IR Process
NIST & SANS B1 Categories
Forensic Data Collection
Chain of Custody & Legal
SIEM & Monitoring
SIEM Architecture (Elastic, Splunk)
Writing Correlation Rules
Alert Triage & Playbooks
AI in Use AI-Powered
Career Prep & Continuous Learning
+Building Experience
Capture The Flag (CTF Strategy)
Open-Source Projects & Bug Bounties
Community & Mentorship
Staying Current
Threat Intel Feeds & Blogs
Podcasts, Conferences & Workshops
AI-Powered Learning Platforms