Cyber Security

50 days challenge course , Cyber Security Malayalam

50 days Ethical Hacking course

76 Chapters
Cyber Security
50 days challenge course , Cyber Security Malayalam

Course Curriculum

Basic Networking concepts

01എന്താണ് Computer Network?
02Additional resources for the week
03World Wide Web എങ്ങനെയാണ് പ്രവർത്തിക്കുന്നത്?
04TryHackMe registration and first project
05അറ ഞ്ഞിരിക്കേണ്ട Network commands
06Let's create a network- Gamified
07Understanding HTTP, ആദ്യത്തെ Hacking task ചെയ്യാം
08Basic network Commands- Gamified
09THM Labs- What is networking?
10THM Labs - HTTP in detail
11Computer Networking Deep Dive

Lab Setup

01Virtual machine setup

Profile building & Career

01Note Making Using Xmind
02Profile Building
03Career Oppurtunities
04Career Path

Information Security Concepts

01Video Tutorial Elements of Information Security
02Video Tutorial- Ethical Hacking and Information Security attack vectors
03Video Tutorial- Types of attacks
04Video Tutorial- Laws, regulations and standards

Basic Cyber Security concepts

01അറിഞിരിക്കേണ്ട Terms and Definitions
02THM Labs- Red team Fundamentals
03THM Labs - Learning Cyber Security
04Additional resources for the week
05Installation & Setting up of Virtualbox, Kali Linux & Metasploitable 2

Security testing based on NIST SPF 800-115

01Scoping our Pentest activity (Understanding the context of our organisation)
02Review technique- Security testing and assessment
03Target identification and analysis - Security testing and assesment
04Target vulnerability validation - Security testing and assesment
05Cyber Kill Chain- Hackers methodology , Think like a Hacker

Reconnaissance

01THM Labs- Google Dorking
02THM Labs - DNS in detail
03Recording - DNS- Explained
04Reconaissance on Domain name
05Reconaissance on IP
06THM Labs - Common Attacks
07Gamified lesson: Domain Name System

Reconnaissance and scanning

01THM Labs- Passive Reconnaissance
02THM Labs- Active Reconnaissance
03Active vs Passive reconaissance
04THM Labs- Nmap
05Additional Resource video: Understand more about the internet
06Gamified lesson: Network scanning with nmap
07Gamified lesson: theHarvester
08Gamified lesson: Google dorking

Password cracking

01Password cracking Basics
02Public Key Cryptography
03Dictionary Attack and Rainbow table Attack
04Additional reading: Password attacks
05Research: Encryption algorithms
06Wordlists and Hash-Identifier
07Password cracking using Hashcat
08THM Labs- Crack the hash
09THM Labs- Hydra

System Hacking

01Metasploit Exploitation guide as note
02THM Labs- Metasploit Introduction

Web application security

01THM Labs- Web Application Security
02Web application security fundamentals
03Setting up Portswigger labs and exploiting SQL Injection
04Introduction to Burpsuite proxy [with PSG labs- Excessive trust in client side]
05Burpsuite Intruder [PSG Labs- Username enumeration]
06PSG Labs- High level logic vulnerability
07PSG Labs- Stored and reflected XSS
08PSG Labs- Insecure direct object references
09PSG Labs- User ID controlled by request parameter
10PSG Labs- Unprotected admin functionality
11Course recap- Security testing and assesment

Vulnerability management

01Vulnerability (Analysis & Management Lifecycle)
02How to install Nessus vulnerability scanner for linux machines _ kali linux
03Vulnerability scanning using Nessus
04THM Labs - Nessus

Projects

01How to install windows server 2022 on VirtualBox
02Project Phase-1: Configuration review

Resume Review

01First stage: Resume review
02Second stage: Resume review
03Third stage: Resume review

Ready to get started?

Enroll now and start learning with hands-on, expert-led training.

Enroll Now — ₹4,499