Course Overview

Cyber Security & Ethical Hacking


 **Cyber Security & Ethical Hacking Outline**
*(Duration: 6 Months)*

**Week 1: Introduction to Cybersecurity and Cyberspace**
– An overview of cybersecurity and cyberspace, including the importance of protecting digital assets and the impact of cyber threats on individuals and organizations.
– Cybersecurity Fields and Job Roles: A discussion of the various fields and job roles within the cybersecurity industry.
– CIA Triads: An explanation of the CIA triad (confidentiality, integrity, availability) in cybersecurity.
– Cybersecurity Platforms: An exploration of different cybersecurity platforms.
– Capture the Flag (CTF): A practical exercise in which students apply knowledge and skills.

**Week 2: Introduction to Networking**
– Overview of networking concepts and technologies.
– Network Addresses and Devices: Explanation of network addresses and devices.
– Network Services and Protocols: Introduction to network services and protocols.
– Network Models: Overview of network models such as the OSI model and TCP/IP model.

**Week 3: Understanding Computer Hardware**
– Introduction to basic hardware components.
– In-depth study of hardware components.
– Different GPU, PSU, Displays, Ports.
– Practical Demonstration of Computer Hardware.
– Introduction to Operating Systems and Booting Process.

**Week 4: Introduction to Linux**
– Overview of Linux and its history.
– Linux Installation.
– Directory Structure in Linux.
– Basic File Commands in Linux.
– CTF on Linux.

**Week 5: Absolute Path and Relative Path**
– Explanation of absolute and relative paths in Linux.
– Creating and Removing Files in Linux.
– Creating and Removing Directories in Linux.
– Copying and Moving Files in Linux.
– CTF on File Manipulation in Linux.

**Week 6: Root User in Linux**
– Explanation of the root user in Linux.
– Introduction to Groups in Linux.
– Creating and Modifying Users in Linux.
– Creating and Modifying Groups in Linux.
– Managing Users and Groups Permissions in Linux.

**Week 7: File and Directory Permissions**
– Explanation of file and directory permissions in Linux.
– Changing File Permissions in Linux.
– Ownership Permission of Files in Linux.
– Sudoers File and Restricting Users to Run Commands.
– CTF on Permission-related Topics.

**Week 8: Introduction to Packages**
– Overview of Linux packages.
– Installing and Removing Packages in Linux.
– Processes and Daemons in Linux.
– Networking Commands in Linux.
– Logs in Linux.

**Week 9: Configuring Web Server**
– Installation and configuration of a web server.
– Configuring DHCP Server.
– Configuring SMTP Server.
– Configuring SSH Server.
– Configuring FTP Server.

**Week 10: Hacker Methodology**
– Stages of a hacker’s methodology.
– OSINT and Web OSINT.
– Google Dorking.

**Week 11: Introduction to Web Fundamentals**
– Overview of web fundamentals, including HTTP protocol and web servers.
– Web Server Working and Directory Structure.
– HTTP Methods and Status Codes.
– CTF on Web Fundamentals.

**Week 12: Introduction to Cryptography**
– Basics of cryptography, encoding, encryption, and hashing algorithms.
– Decoding and Decryption, Hash Cracking.

**Week 13: Introduction to Password Attacks**
– Types of password attacks, Brute-Force and Wordlist Attacks.
– Cracking Passwords using Different Attack Techniques.
– CTF on Password Attacks.

**Week 14: Introduction to Steganography**
– Basics of Steganography, Meta Data, and Image Signatures.
– Using Steganography Techniques to Hide Data.
– CTF on Steganography.

**Week 15: Introduction to Layer 2 Attacks**
– Understanding Layer 2 and various attacks.
– Sniffing, Spoofing, MITM Attacks, and Protection.

**Week 16: Introduction to WiFi Attacks**
– WiFi Attacks, WiFi Password Attacks, Evil Twin Attack, DOS Attack on WiFi, Protection.

**Week 17: Introduction to Social Engineering Attacks**
– Types of social engineering attacks, Phishing Attacks using Websites and Emails.
– Detecting Phishing Attacks and Preventing Them.

**Week 18: Introduction to Computer Viruses and Their Types**
– Computer viruses, Designing Payloads for Windows, Android, and Linux.
– Protecting Yourself from Virus Attacks.

**Week 19: Network Scanning and Vulnerability Assessment**
– Network scanning and vulnerability assessment techniques.
– Exploitation and Reporting.
– CTF on Scanning and Vulnerability Assessment.

**Week 20: Introduction to Web Pentesting**
– Web pentesting fundamentals and OWASP TOP 10.
– Web attacks using tools like Burpsuite, Nikto, Zap.
– CTF on Web Pentesting.

**Week 21: Introduction to Python for Pentesters**
– Basic Python programming.
– Designing Hacking Tools and Keyloggers using Python.

**Week 22: Scanning and Vulnerability Assessment**
– Network scanning and vulnerability assessment.
– Exploitation and Reporting.

**Week 23: Introduction to Cybersecurity and SOC Operations**
– Cybersecurity fundamentals and SOC operations.
– SIEM Tools, Log Management, and Threat Intelligence.
– SIEM Tuning and Configuration.

**Week 24: Network Security Monitoring and Analysis**
– Network security monitoring and IDPS.
– Vulnerability assessment and Firewall rules.
– Threat hunting and analytics.

**Week 25: Introduction to the Dark Web**
– Dark Web basics, Installing Tor, Exploring the Dark Web.
– Anonymity and Security on the Dark Web.
– Hosting your Own Dark Web.

**Week 26: CEH Labs**
● CEH V11 Lab1
● CEH V11 Lab 2
● CEH V11 Lab 3
● CEH V11 Lab 4
● CEH V11 Lab 5