Cyber Security
50 days challenge course , Cyber Security Malayalam
50 days Ethical Hacking course
76 Chapters
Cyber Security
Course Curriculum
Basic Networking concepts
01എന്താണ് Computer Network?
02Additional resources for the week
03World Wide Web എങ്ങനെയാണ് പ്രവർത്തിക്കുന്നത്?
04TryHackMe registration and first project
05അറ ഞ്ഞിരിക്കേണ്ട Network commands
06Let's create a network- Gamified
07Understanding HTTP, ആദ്യത്തെ Hacking task ചെയ്യാം
08Basic network Commands- Gamified
09THM Labs- What is networking?
10THM Labs - HTTP in detail
11Computer Networking Deep Dive
Lab Setup
01Virtual machine setup
Profile building & Career
01Note Making Using Xmind
02Profile Building
03Career Oppurtunities
04Career Path
Information Security Concepts
01Video Tutorial Elements of Information Security
02Video Tutorial- Ethical Hacking and Information Security attack vectors
03Video Tutorial- Types of attacks
04Video Tutorial- Laws, regulations and standards
Basic Cyber Security concepts
01അറിഞിരിക്കേണ്ട Terms and Definitions
02THM Labs- Red team Fundamentals
03THM Labs - Learning Cyber Security
04Additional resources for the week
05Installation & Setting up of Virtualbox, Kali Linux & Metasploitable 2
Security testing based on NIST SPF 800-115
01Scoping our Pentest activity (Understanding the context of our organisation)
02Review technique- Security testing and assessment
03Target identification and analysis - Security testing and assesment
04Target vulnerability validation - Security testing and assesment
05Cyber Kill Chain- Hackers methodology , Think like a Hacker
Reconnaissance
01THM Labs- Google Dorking
02THM Labs - DNS in detail
03Recording - DNS- Explained
04Reconaissance on Domain name
05Reconaissance on IP
06THM Labs - Common Attacks
07Gamified lesson: Domain Name System
Reconnaissance and scanning
01THM Labs- Passive Reconnaissance
02THM Labs- Active Reconnaissance
03Active vs Passive reconaissance
04THM Labs- Nmap
05Additional Resource video: Understand more about the internet
06Gamified lesson: Network scanning with nmap
07Gamified lesson: theHarvester
08Gamified lesson: Google dorking
Password cracking
01Password cracking Basics
02Public Key Cryptography
03Dictionary Attack and Rainbow table Attack
04Additional reading: Password attacks
05Research: Encryption algorithms
06Wordlists and Hash-Identifier
07Password cracking using Hashcat
08THM Labs- Crack the hash
09THM Labs- Hydra
System Hacking
01Metasploit Exploitation guide as note
02THM Labs- Metasploit Introduction
Web application security
01THM Labs- Web Application Security
02Web application security fundamentals
03Setting up Portswigger labs and exploiting SQL Injection
04Introduction to Burpsuite proxy [with PSG labs- Excessive trust in client side]
05Burpsuite Intruder [PSG Labs- Username enumeration]
06PSG Labs- High level logic vulnerability
07PSG Labs- Stored and reflected XSS
08PSG Labs- Insecure direct object references
09PSG Labs- User ID controlled by request parameter
10PSG Labs- Unprotected admin functionality
11Course recap- Security testing and assesment
Vulnerability management
01Vulnerability (Analysis & Management Lifecycle)
02How to install Nessus vulnerability scanner for linux machines _ kali linux
03Vulnerability scanning using Nessus
04THM Labs - Nessus
Projects
01How to install windows server 2022 on VirtualBox
02Project Phase-1: Configuration review
Resume Review
01First stage: Resume review
02Second stage: Resume review
03Third stage: Resume review
Ready to get started?
Enroll now and start learning with hands-on, expert-led training.
Enroll Now — ₹4,499