Basic Course

Foundation Course

Build a career in cyber defense and ethical hacking

icon

Modules Covered

Introduction to Cyber Security:
  • What is Cyber Security?
  • Importance and objectives
  • Types of cyber threats and attacks
  • Cyber Security Concepts:
  • CIA Triad (Confidentiality, Integrity, Availability)
  • Threats, Vulnerabilities, and Risks
  • Attack Surface and Attack Vectors
  • Network Security:
  • Network architecture basics
  • Firewalls, Routers, and Switches
  • Intrusion Detection and Prevention Systems (IDS/IPS)
  • Virtual Private Networks (VPNs)
  • Network Security Protocols (IPSec, HTTPS, etc.)
  • Cryptography:
  • Symmetric vs Asymmetric Encryption
  • Hashing (SHA, MD5)
  • SSL/TLS protocols
  • Digital Signatures and Certificates
  • Operating System Security:
  • Windows and Linux system hardening
  • User authentication and access control
  • File system permissions
  • Logging and auditing
  • Web Application Security:
  • Common vulnerabilities (OWASP Top 10)
  • SQL Injection
  • Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Secure coding practices
  • Ethical Hacking and Penetration Testing:
  • Footprinting and Reconnaissance
  • Scanning and Enumeration
  • Gaining Access (exploits)
  • Maintaining Access
  • Covering Tracks
  • Security Tools and Technologies:
  • Kali Linux
  • Wireshark (Packet Analysis)
  • Nmap (Port Scanning)
  • Metasploit (Penetration Testing Framework)
  • Burp Suite (Web App Security Testing)
  • Identity and Access Management (IAM):
  • Authentication and Authorization
  • Multi-Factor Authentication (MFA)
  • Single Sign-On (SSO)
  • Role-Based Access Control (RBAC)
  • Cloud Security Basics:
  • Cloud deployment models
  • Shared responsibility model
  • Securing cloud infrastructure (AWS, Azure basics)
  • Cloud-specific threats
  • Cyber Security Laws and Compliance:
  • GDPR, HIPAA, ISO/IEC 27001
  • Indian IT Act
  • Security policies and audits
  • Incident Response and Digital Forensics:
  • Steps in incident response
  • Evidence collection and preservation
  • Forensic analysis tools
  • Reporting and post-incident recovery
icon

Projects

  • Network Vulnerability Assessment
  • Web Application Penetration Testing
  • Password Cracking & Hash Analysis
  • Firewall Configuration & Security Setup
icon

Job Roles

icon

Hiring Companies

icon

Apps

  • Kali Linux
  • Wireshark
  • Metasploit Framework
  • Nmap
  • Burp Suite
  • OWASP ZAP
  • Splunk (SIEM)

Online Pricing details: ₹10000

Offline Pricing details: ₹20000