Course curriculum

  • 1

    Dec Weekend Batch

    • Introduction to Cyber Security & CIA Triad

    • Ports & Protocols SSH & FTP

    • Linux Permissions

    • Bash Scripts

    • Linux Bash Scripts - Basic Calculator

    • Cryptography - Symmetric, Asymmetric Encryption, Encoding & Hashing

    • Social Engineering

    • Password Cracking

    • Google Dorking & Subdomain Enumeration

    • GHDB

    • Nmap & Zenmap

    • Email Security

  • 2

    Oct Weekend Batch

    • Intro to Cyber Security & CIA Triad

    • Email Spoofing & SubdomainEnum

    • OSINT Framework & Linux Commands

    • Ports & Protocols SSH FTP - Practical

    • Nmap & Wireshark Practical

    • Part-1 Cryptography

    • Part-2 Cryptography

    • Part-3 Cryptography

    • Class by naman 29th October ( kali linux intro and its benefits)

    • Part 1 Subdomain Enumeration

    • Part 2 Steganography

    • Part 3 Steganography

    • Password Cracking

    • ChatGPT for Cyber Security & Linux Bash

    • Google Dorking and GHDB

    • DNS Records , TCP/IP model , OSI Model and Nmap Revision.

  • 3

    September - Weekend Batch

    • Introduction, Definitions, CIA & Practical

    • Ports, Protocols & Nmap

    • Practical SSH, FTP

    • Linux Commands and Permissions

    • Ethical Hacking ppt

    • Linux, Boot process & Runlevels, TCP/IP, OSI, Wireshark Practical

    • IP Address, IPv4 vs IPv6, Cryptography & Steganography

    • ChatGPT for cyber security & Linux bash scripting

    • Social Engineering

    • video1129822086

  • 4

    Weekdays Batch

    • Day 1

    • Day 2

    • Day 3

    • Day 4

    • Day 5

    • Day 6

    • Day 7

    • Day 8

    • Day 9

    • Day 10

  • 5

    Weekends Batch

    • Day 1- Intro to Cyber Security CIA Triad , Terminologies

    • Day 2 - Ports and Protocols, Nmap

    • Day 3 - Hosting a website, FTP Practical, Wireshark

    • Day 4 - SSH, FTP, Hydra & Crunch Practical by Rohit

    • Day 5 - Google Dorking

    • Day 6 - Subdomains, FFUF, Hunter.io, Alterx, HTTPX

    • Day 7 - Linux Permissions, Cryptography

    • Day - 8 - Symmetric & Asymmetric Encryption, Steganography

    • Day 9 - Social Engineering, Phishing, Shellphish

    • Day 10 Password Cracking & Email Security

    • Day 11 - DNS Records