Expert Instructors
Learn from industry veterans with years of real-world experience.
Hands-on Projects
Build a portfolio-ready project during your training journey.
Certification
Earn a recognized certificate upon successful course completion.
Cyber Security
Networking Basics OSI & TCP/IP models IP addressing + subnetting DNS, DHCP basics Routers, switches, firewalls NAT + VLAN fundamentals TCP vs UDP HTTP/HTTPS + SSL/TLS DNS operation SSH vs Telnet SMTP basics Linux Essentials File system navigation Basic commands Users + permissions Process management Package management Logs + cron jobs Cybersecurity Fundamentals CIA triad Risk management basics Access control models Authentication vs authorization Incident response basics Footprinting & Reconnaissance Passive vs Active recon Google dorking Search engines WHOIS + DNS lookup Scanning Nmap scanning Service detection OS fingerprinting Banner grabbing SMB / SNMP / LDAP enumeration Vulnerability Assessment CVE & CVSS Scanning tools concept Misconfiguration checks Exploitation Basics Metasploit fundamentals Privilege escalation concept Password cracking basics Shell types Attack Concepts DoS/DDoS basics MITM attacks overview Social engineering types Malware Basics Types of malware Basic analysis concept Web Security HTTP requests/responses Sessions + cookies File upload flaws Command injection SSRF OWASP Top 10 Access Control issues Injection Misconfiguration Auth failures Cryptography Essentials Encryption types Hashing SSL/TLS basics PKI fundamentals