Ethical Hacking+ Program

by CyberForge Academy Claim Listing

Ethical Hacking+ course is offered by CyberForge Academy. Our instructors are experienced, qualified and have experience in developing/deploying/securing SaaS. At CyberForge Academy, we envision a world where everyone has the opportunity to learn and grow with the rapid advancements in technology.

₹4999

Contact the Institutes

Fill this form

Advertisement

CyberForge Academy Logo

img Duration

6 Weeks

Course Details

Ethical Hacking+ course is offered by CyberForge Academy. Our instructors are experienced, qualified and have experience in developing/deploying/securing SaaS. At CyberForge Academy, we envision a world where everyone has the opportunity to learn and grow with the rapid advancements in technology.

Our vision is to be a catalyst for change, fostering a global community of learners, innovators, and leaders who are prepared to tackle the challenges of tomorrow.

 

Program Syllabus:

  • Module 1: Computer Science Fundamentals
  • Computer Networks Basics
  • How networks actually work?
  • OSI vs TCP/IP model in practice
  • Fundamental Protocols
  • ARP
  • DNS
  • DHCP
  • ICMP
  • Operating System Basics
  • How exactly does the OS work?
  • Kernel vs Userspace
  • Linux vs Windows vs MacOS
  • Writing C program to understand how compilation works
  • Linux Basics
  • Git and Github
  • Basics and Advanced commands
  • Important Services and nuances of Linux
  • Module 2: Cybersecurity Fundamentals
  • Understanding cybersecurity basics
  • Core principles and terminologies
  • Tools of Trade and lab setups
  • Module 3: Cryptography
  • Introduction to Cryptography
  • Cryptographic Hashes
  • Encryption Schemes: Symmetric and Asymmetric (PKC)
  • Digital Signatures
  • Hands-on: Calculating Hash with online and CLI tools
  • Hands-on: Encrypting and decrypting data with AES/RSA
  • Hands-on: Creating and using Digital Signature
  • Module 4: Virtualization
  • Virtual Machine and Virtualization Basics
  • Setting up and managing virtual machines (VirtualBox)
  • Containers and Containerization Basics
  • Docker, Docker Desktop and Docker Compose
  • Building and running Docker images
  • Building home lab
  • Hands-on: Install VirtualBox and create Kali VM
  • Hands-on: Install Docker and run target containers on Kali
  • Module 5: Network Security
  • Fundamentals of network security
  • Basic network security protocols and devices
  • FTP
  • HTTP
  • Telnet
  • Secure alternatives and how to use those
  • Secure FTP
  • HTTPS
  • SSH
  • Traffic Capture and Analysis
  • Introduction to Wireshark, Traffic/Capture Filters and tricks
  • Hands-on: Capture and save traffic with Wireshark
  • Hands-on: Analyze HTTP, DNS, ARP traffic
  • Hands-on: TCP/UDP Stream Reconstruction
  • Hands-on: Export unencrypted files from Traffic
  • Host discovery and Identification
  • Introduction to NMap, Commands and Scripts
  • Hands-on: Network scanning to discover hosts
  • Hands-on: Device/OS Fingerprinting
  • Hands-on: Detection of services and attacking those with scripts
  • Understanding the difference in HTTP and HTTPS
  • Hands-on: Creating a setup with Web Server
  • Hands-on: Creating TLS certificate with OpenSSL and configuring web server on HTTPS
  • Module 6: Security in Host Systems
  • What is a vulnerability?
  • How are systems exploited or hacked?
  • Hands-on: Hacking a vulnerable machine
  • What are Firewalls and AVs?
  • How defensive components work and can be bypassed?
  • Hands-on: Configure Firewall on Windows, Linux and MacOS
  • What is privilege escalation and how is it done?
  • Hands-on: Perform Privilege escalation
  • Module 7: Web and Application Security
  • How Web Applications work and how those are hosted?
  • Basics of web application security
  • Tools and common web vulnerabilities (OWASP Top 10 2021)
  • Broken Access Control
  • Cryptographic Failures
  • Injection
  • Insecure Design
  • Security Misconfiguration
  • Vulnerable and Outdated Components
  • SSRF
  • Hands-on: Web application attack to exploit all common vulnerabilities
  • Secure Coding and Best practices
  • Web Application Firewall
  • Hands-on: Configuring a WAF
  • What is Captcha and Why is it used?
  • Hands-on: Setting up a captcha and breaking it
  • Module 8: WiFi Security
  • WiFi Basics and Traffic Analysis
  • DIfferent security schemes i.e. WEP, WPA/WPA2-PSK
  • Hands-on: Hacking a WiFi network
  • Hands-on: Securing a wireless network
  • Module 9: Cloud Security
  • What exactly is cloud?
  • AWS Basics and usage
  • How to use 5 most popular services of AWS 
  • Common security misconfiguration on AWS
  • Hands-on: Identifying and exploiting misconfiguration on AWS infrastructure
  • Defending AWS Cloud
  • Hands-on: Protecting AWS cloud from hacks
  • Module 10: Path Forward
  • Beginner Cybersecurity Certifications, Jobs and Career Path
  • Identifying your strengths and interest
  • How to imbibe continuous learning
  • Capstone Project
  • Using the acquired knowledge, develop a real-world Cybersecurity project or open source Cybersecurity tool
  • Coding vs non-coding projects
  • Mohali Branch

    412, Tower A, Bestech Business Tower, Mohali

Check out more CEH (Certified Ethical Hacker) courses in India

Spectrum Networks Logo

Certified Ethical Hacking

Our security experts have designed over 140 labs which mimic real time scenarios in this hacking course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

by Spectrum Networks [Claim Listing ]
TrainingTrains Logo

Ethical Hacking Training

ERODE offers Ethical Hacking Training, which certifies an ethical hacker’s abilities to guard against illicit hacking and network infrastructure flaws and vulnerabilities. The top-ranked and best ethical hacking training center in Erode is Training Trains.

by TrainingTrains
Govardhan Logo

Ethical Hacking

Ethical Hacking training is offered by Govardhan for all skill level. The framework supporting many languages and developed by leading tech giant Microsoft.

by Govardhan [Claim Listing ]
Multimise Logo

Ethical Hacker (Basic)

Ethical Hacker Course is offered by Multimise for all skill level. Multimise is a web development Company, we are  technology enthusiasts, we support and develop beautiful websites, Mobile App, SEO service and outsourced projects.

by Multimise [Claim Listing ]
WebHopers Academy Logo

Ethical Hacking Course

Webhopers Academy is the Best Ethical Hacking Training institute in Panchkula Chandigarh offering a Certified Ethical Hacker course. We have a team of experts to handle the hands-on experience on the technology and experience in working which makes sure to deliver our best to the students.

by WebHopers Academy [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy