Course Overview
Networking Basics
OSI & TCP/IP models
IP addressing + subnetting
DNS, DHCP basics
Routers, switches, firewalls
NAT + VLAN fundamentals
TCP vs UDP
HTTP/HTTPS + SSL/TLS
DNS operation
SSH vs Telnet
SMTP basics
Linux Essentials
File system navigation
Basic commands
Users + permissions
Process management
Package management
Logs + cron jobs
Cybersecurity Fundamentals
CIA triad
Risk management basics
Access control models
Authentication vs authorization
Incident response basics
Footprinting & Reconnaissance
Passive vs Active recon
Google dorking
Search engines
WHOIS + DNS lookup
Scanning
Nmap scanning
Service detection
OS fingerprinting
Banner grabbing
SMB / SNMP / LDAP enumeration
Vulnerability Assessment
CVE & CVSS
Scanning tools concept
Misconfiguration checks
Exploitation Basics
Metasploit fundamentals
Privilege escalation concept
Password cracking basics
Shell types
Attack Concepts
DoS/DDoS basics
MITM attacks overview
Social engineering types
Malware Basics
Types of malware
Basic analysis concept
Web Security
HTTP requests/responses
Sessions + cookies
File upload flaws
Command injection
SSRF
OWASP Top 10
Access Control issues
Injection
Misconfiguration
Auth failures
Cryptography Essentials
Encryption types
Hashing
SSL/TLS basics
PKI fundamentals
Expert Instructors
Learn from industry veterans with years of experience.
Hands-on Projects
Build real-world projects during your training.
Certification
Official certificate awarded on completion.