Ethical Hacking+ Program

by CyberForge Academy Claim Listing

Ethical Hacking+ course is offered by CyberForge Academy. Our instructors are experienced, qualified and have experience in developing/deploying/securing SaaS. At CyberForge Academy, we envision a world where everyone has the opportunity to learn and grow with the rapid advancements in technology.

₹4999

Contact the Institutes

Fill this form

Advertisement

CyberForge Academy Logo

img Duration

6 Weeks

Course Details

Ethical Hacking+ course is offered by CyberForge Academy. Our instructors are experienced, qualified and have experience in developing/deploying/securing SaaS. At CyberForge Academy, we envision a world where everyone has the opportunity to learn and grow with the rapid advancements in technology.

Our vision is to be a catalyst for change, fostering a global community of learners, innovators, and leaders who are prepared to tackle the challenges of tomorrow.

 

Program Syllabus:

  • Module 1: Computer Science Fundamentals
  • Computer Networks Basics
  • How networks actually work?
  • OSI vs TCP/IP model in practice
  • Fundamental Protocols
  • ARP
  • DNS
  • DHCP
  • ICMP
  • Operating System Basics
  • How exactly does the OS work?
  • Kernel vs Userspace
  • Linux vs Windows vs MacOS
  • Writing C program to understand how compilation works
  • Linux Basics
  • Git and Github
  • Basics and Advanced commands
  • Important Services and nuances of Linux
  • Module 2: Cybersecurity Fundamentals
  • Understanding cybersecurity basics
  • Core principles and terminologies
  • Tools of Trade and lab setups
  • Module 3: Cryptography
  • Introduction to Cryptography
  • Cryptographic Hashes
  • Encryption Schemes: Symmetric and Asymmetric (PKC)
  • Digital Signatures
  • Hands-on: Calculating Hash with online and CLI tools
  • Hands-on: Encrypting and decrypting data with AES/RSA
  • Hands-on: Creating and using Digital Signature
  • Module 4: Virtualization
  • Virtual Machine and Virtualization Basics
  • Setting up and managing virtual machines (VirtualBox)
  • Containers and Containerization Basics
  • Docker, Docker Desktop and Docker Compose
  • Building and running Docker images
  • Building home lab
  • Hands-on: Install VirtualBox and create Kali VM
  • Hands-on: Install Docker and run target containers on Kali
  • Module 5: Network Security
  • Fundamentals of network security
  • Basic network security protocols and devices
  • FTP
  • HTTP
  • Telnet
  • Secure alternatives and how to use those
  • Secure FTP
  • HTTPS
  • SSH
  • Traffic Capture and Analysis
  • Introduction to Wireshark, Traffic/Capture Filters and tricks
  • Hands-on: Capture and save traffic with Wireshark
  • Hands-on: Analyze HTTP, DNS, ARP traffic
  • Hands-on: TCP/UDP Stream Reconstruction
  • Hands-on: Export unencrypted files from Traffic
  • Host discovery and Identification
  • Introduction to NMap, Commands and Scripts
  • Hands-on: Network scanning to discover hosts
  • Hands-on: Device/OS Fingerprinting
  • Hands-on: Detection of services and attacking those with scripts
  • Understanding the difference in HTTP and HTTPS
  • Hands-on: Creating a setup with Web Server
  • Hands-on: Creating TLS certificate with OpenSSL and configuring web server on HTTPS
  • Module 6: Security in Host Systems
  • What is a vulnerability?
  • How are systems exploited or hacked?
  • Hands-on: Hacking a vulnerable machine
  • What are Firewalls and AVs?
  • How defensive components work and can be bypassed?
  • Hands-on: Configure Firewall on Windows, Linux and MacOS
  • What is privilege escalation and how is it done?
  • Hands-on: Perform Privilege escalation
  • Module 7: Web and Application Security
  • How Web Applications work and how those are hosted?
  • Basics of web application security
  • Tools and common web vulnerabilities (OWASP Top 10 2021)
  • Broken Access Control
  • Cryptographic Failures
  • Injection
  • Insecure Design
  • Security Misconfiguration
  • Vulnerable and Outdated Components
  • SSRF
  • Hands-on: Web application attack to exploit all common vulnerabilities
  • Secure Coding and Best practices
  • Web Application Firewall
  • Hands-on: Configuring a WAF
  • What is Captcha and Why is it used?
  • Hands-on: Setting up a captcha and breaking it
  • Module 8: WiFi Security
  • WiFi Basics and Traffic Analysis
  • DIfferent security schemes i.e. WEP, WPA/WPA2-PSK
  • Hands-on: Hacking a WiFi network
  • Hands-on: Securing a wireless network
  • Module 9: Cloud Security
  • What exactly is cloud?
  • AWS Basics and usage
  • How to use 5 most popular services of AWS 
  • Common security misconfiguration on AWS
  • Hands-on: Identifying and exploiting misconfiguration on AWS infrastructure
  • Defending AWS Cloud
  • Hands-on: Protecting AWS cloud from hacks
  • Module 10: Path Forward
  • Beginner Cybersecurity Certifications, Jobs and Career Path
  • Identifying your strengths and interest
  • How to imbibe continuous learning
  • Capstone Project
  • Using the acquired knowledge, develop a real-world Cybersecurity project or open source Cybersecurity tool
  • Coding vs non-coding projects
  • Mohali Branch

    412, Tower A, Bestech Business Tower, Mohali

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy