Course Overview
- ›Introduction to Cybersecurity
- ›Types of Hackers
- ›Ethical Hacking vs Malicious Hacking
- ›Cyber Threat Landscape
- ›CIA Triad (Confidentiality, Integrity, Availability)
- ›Common Cyber Attacks
- ›Cybersecurity Career Paths
- ›Legal & Ethical Aspects of Hacking
- ›Installing Kali Linux
- ›Setting up VirtualBox/VMware
- ›Configuring Linux Environment
- ›Installing Hacking Tools
- ›Understanding Linux File Structure
- ›Terminal Basics
- ›Package Installation in Linux
- ›Building a Cybersecurity Lab
- ›Basic Linux Commands
- ›File and Directory Management
- ›User and Permission Management
- ›Networking Commands
- ›Process Management
- ›Package Managers
- ›Bash Scripting Basics
- ›Automation using Shell Scripts
- ›Introduction to Networking
- ›IP Addressing
- ›Public vs Private IP
- ›Routers and Switches
- ›DNS (Domain Name System)
- ›Ports and Protocols
- ›OSI Model
- ›TCP/IP Model
- ›What is Network Scanning?
- ›Introduction to Nmap
- ›Host Discovery
- ›Port Scanning Techniques
- ›Service Enumeration
- ›OS Detection
- ›Vulnerability Detection Basics
- ›Network Mapping
- ›How Websites Work
- ›HTTP Request & Response
- ›HTTPS and SSL/TLS
- ›Cookies and Sessions
- ›Web Servers and Hosting
- ›Apache Server Basics
- ›Introduction to APIs
- ›Client-Server Architecture
- ›Introduction to Web Security
- ›OWASP Top 10 Overview
- ›Website Security Misconfigurations
- ›Web Application Firewall (WAF)
- ›Drupal Security Basics
- ›WordPress Security
- ›Website Hardening Techniques
- ›Secure Authentication Practices
- ›What is SQL Injection?
- ›Types of SQL Injection
- ›Authentication Bypass
- ›Union-based SQLi
- ›Blind SQL Injection
- ›Database Enumeration
- ›Preventing SQL Injection
- ›Secure Coding Practices
- ›Introduction to XSS
- ›Reflected XSS
- ›Stored XSS
- ›DOM-Based XSS
- ›Session Hijacking Concepts
- ›Input Validation
- ›Output Encoding
- ›Preventing XSS Attacks
- ›Introduction to Penetration Testing
- ›Reconnaissance
- ›Information Gathering
- ›Vulnerability Assessment
- ›Exploitation Basics
- ›Post Exploitation Concepts
- ›Reporting and Documentation
- ›Ethical Pentesting Workflow
- ›Introduction to Mobile Security
- ›Android Security Basics
- ›Common Mobile Threats
- ›App Permission Risks
- ›IoT Security Concepts
- ›CCTV Camera Security
- ›Port Forwarding using NGROK
- ›Kali NetHunter Introduction
What we'll cover in this course:
- Cybersecurity Fundamentals
- Setting up Ethical Hacking Environment
- Linux Command Line Mastery
- Networking Fundamentals
- Network Scanning & Enumeration
- Web Technologies Fundamentals
- Web Application Security
- SQL Injection Attacks
- Cross Site Scripting (XSS)
- Penetration Testing Methodology
- Mobile & IoT Security
- Password Security & Attacks
- Advanced Ethical Hacking Techniques
- Digital Forensics & Incident Response
- Privacy, Anonymity & Cyber Defense
- Capstone Project
Technologies & Tools












