UrbanPro
true

Cyber Security and Ethical Hacking

LIVE
32 Hours

Just Pay ₹200,000 to Register

- OR -

Course offered by Saif Ali Khan

0 review

Module 1: Introduction to Cybersecurity & Key Concepts – 2Hrs

  • Introduction to Cybersecurity
    • Definition, Importance, and Role of Cybersecurity in the Modern Digital Age
    • Types of Cyberattacks: Cybercrime, Hacktivism, Cyberwarfare
    • Ethical Hacking vs. Black Hat Hacking
  • Types of Hackers
    • Black Hat, White Hat, and Gray Hat Hackers
    • Script Kiddies, Hacktivists, and State-Sponsored Hackers
    • Ethical Hacking Guidelines
  • CIA Triad
    • Confidentiality, Integrity, and Availability in Information Security
    • Importance of the CIA Triad in Vulnerability Management and Risk Assessment
  • Common Vulnerabilities and Exposure (CVE) & Identifiers
    • What is CVE?
    • CVE Impact and How It Affects Organizations
    • Understanding CVSS (Common Vulnerability Scoring System) and its Application
  • Types of Security Testing
    • Vulnerability Assessment (VA), Penetration Testing (VAPT), Red Teaming, Blue Teaming
    • Difference Between Automated and Manual Security Testing
    • Why VAPT is Critical in Cybersecurity

 

Module 2: Networking Fundamentals & Security – 2 Hrs

  • Introduction to Networks & Network Topology
    • Understanding Network Types: LAN, MAN, WAN
    • Network Topology and its Importance in Security
    • Key Network Devices: Routers, Switches, Hubs, Gateways, Firewalls
  • OSI Model and Network Protocols
    • OSI (Open Systems Interconnection) Model: Understanding Layers 1–7
    • Key Protocols at Each Layer (TCP/IP, UDP, HTTP, FTP, DNS, etc.)
  • TCP/IP Protocol Suite
    • How TCP/IP Works in Network Communication
    • Understanding IP Addresses, Subnetting, and Routing
    • TCP vs. UDP: Differences and Use Cases
  • Firewall: Basics & Monitoring
    • What is a Firewall and How Does It Protect a Network?
    • Types of Firewalls: Packet Filtering, Stateful Inspection, Proxy Firewalls
    • Firewall Protocols and Security Monitoring
  • Intrusion Detection System (IDS) & Intrusion Prevention System (IPS)
    • Role of IDS and IPS in Detecting and Preventing Attacks
    • Types of IDS: Signature-Based, Anomaly-Based, Hybrid IDS

Module 3: Linux Fundamentals and Security Tools – 3 Hrs

  • Kali Linux - Introduction
    • Overview of Kali Linux as a Penetration Testing Distribution
    • Practical: Kali Linux Setup and Command Line Basics
  • Linux File Permissions and Security
    • Understanding Linux File Permissions (Read, Write, Execute)
    • Practical: File Permissions, Sudoers, and User Management
  • Reconnaissance and Information Gathering
    • Practical: Network Reconnaissance Using Nmap
    • Practical: DNS Lookup and Using Google Dorks/Shodan for OSINT (Open-Source Intelligence)
    • Social Engineering Techniques: Phishing
  • Practical: Port Scanning Using Hping3 and Nmap
    • Understanding Different Scanning Techniques: SYN, ACK, UDP Scans
    • Using Nmap for Network Discovery and Security Audits
    • Hping3 for Advanced Network and Port Scanning
  • Practical: Network Tools
    • Using Netcat for Banner Grabbing, Reverse Shell

 

Module 4: Vulnerability Scanning and Exploitation – 5 Hrs

  • Understanding Common Services/Protocols
    • Key Network Services: DNS, DHCP, HTTP(S), FTP, SSH, Telnet, etc.
    • Ipsec Protocols & Operations for Securing Communication
    • VPN Protocols: SSL/TLS, IKE
    • Practical: IKE Scan for VPN Discovery
  • Hacking Passwords
    • Types of Password Attacks: Brute Force, Dictionary, Rainbow Tables
    • Practical: Using Tools for Password Cracking
  • Vulnerability Scanning with Nessus
    • Introduction to Nessus: How to Perform a Vulnerability Scan
    • Understanding Vulnerability Reports and Risk Assessment
  • Practical: Metasploit
    • Introduction to Metasploit Framework: Setting up and Using Metasploit for Exploitation
    • Practical Exploits: Finding and Executing Exploits using Metasploit
  • Practical: Exploiting FTP, SMB, SSH

 

 

 

Module 5: Wireless Networks & Attacks – 3 Hrs

  • Wireless Networks Overview
    • Types of Wireless Networks (WEP, WPA, WPA2, WPA3)
    • Risks in Wireless Networks and Common Attack Vectors
  • Practical: Wireless Packet Interaction
    • Capturing WLAN Packets with Aircrack-ng, Wireshark
    • Cracking WEP Encryption and Cracking WPA/WPA2
  • Practical: Aircrack-Ng
    • Tools and Techniques to Crack WEP Encryption
    • Cracking WPA2 Using Dictionary Attacks
  • Evil Twin Attack
    • How Evil Twin Attacks Work and Mitigation Techniques
    • Practical: Setting up a Rogue Access Point for an Evil Twin Attack

 

Module 6: Web Application Penetration Testing – 12 Hrs

  • Practical: Burp Suite
    • Introduction to Burp Suite as a Penetration Testing Proxy
    • Using Burp Suite for Intercepting and Modifying Web Traffic
  • Common Web Application Vulnerabilities
    • Host Header Injection
    • Open Redirection
    • Cross-Site Scripting (XSS): Types of XSS (Reflected, Stored)
    • SQL Injection (Union and Blind Injection)
    • HTML Injection
    • Cross-Site Request Forgery (CSRF)
    • Insecure CORS (Cross-Origin Resource Sharing)
    • OTP Bypass
    • IDOR (Insecure Direct Object Reference) Attacks
    • File Upload Vulnerabilities
    • Parameter Tampering
    • Command Injection
    • XML External Entity
    • Access Control Issues
    • Path Traversal
    • Server Side Template Injection
    • JWT Attacks
    • OAuth Attacks
    • Lack of Rate Limiting

 

 

Module 7: Android Penetration Testing – 5 Hrs

  • Understanding the Android File System
    • Key Files in Android: Manifest, XML, DEX Files
    • Practical: Exploring Android File Structure and Filesystem
  • Android Pentesting Tools
    • Tools for Android Penetration Testing: MobSF, ADB
    • Using ADB (Android Debug Bridge) for Interacting with Android Devices
  • Dynamic Analysis - Memu
    • Practical: Configuring Memu to BurpSuite
  • Static Analysis
    • Practical: Decompiling/Reverse Engineer APK
    • Practical: Identify Vulnerabilities using Static Analysis
    • Practical: Exploiting Activity, Webview

 

Module 8: Reporting & Documentation – 1 Hrs

  • Penetration Testing Report
    • Importance of Documentation in Pentesting
    • Structuring Penetration Testing Reports: Executive Summary, Technical Details, Recommendations
    • Risk Assessment: CVSS Scoring and Impact Analysis

 

 

 

 

About the Trainer

Saif Ali khan picture

Avg Rating

0 Reviews

0 Students

1 Courses

Saif Ali Khan

Bachelor of Engineering (B.E.) from Mumbai University in 2017

7 Years of Experience

As an experienced cybersecurity professional with over 6 years in the industry, I bring a wealth of knowledge and practical experience in securing applications, networks, and cloud environments. My expertise spans across vulnerability assessments, penetration testing, secure coding, and security audits, with a proven track record in delivering security solutions for diverse domains such as BFSI, E-Commerce, Healthcare, and NBFC.

Beyond my technical skills, I am passionate about sharing my knowledge and empowering the next generation of cybersecurity professionals. As a certified Information Security Manager (CISM), Ethical Hacker (CEH), and AWS Certified Solution Architect, I have worked extensively in mentoring and training teams, leading security initiatives, and ensuring compliance with industry standards.

As a Cybersecurity Tutor, I aim to create a dynamic and engaging learning environment, helping students develop practical skills, solve real-world security challenges, and prepare for a successful career in the ever-evolving cybersecurity landscape. I strive to provide a balance between theoretical concepts and hands-on experience, ensuring that learners not only understand the principles of cybersecurity but also have the confidence to apply them in real-world scenarios.

Students also enrolled in these courses

LIVE
9 reviews
20 Hours
12,000 Group Class (max 5)
17,000 1-on-1 Class

Course offered by Palvinder Singh

106 reviews
LIVE
9 reviews
20 Hours
11,000 Group Class (max 5)
15,000 1-on-1 Class

Course offered by Palvinder Singh

106 reviews
LIVE
9 reviews
20 Hours
37,500 Group Class (max 5)
4,000 1-on-1 Class

Course offered by Palvinder Singh

106 reviews
LIVE
9 reviews
1 Hours
8,000 Group Class (max 3)
10,000 1-on-1 Class

Course offered by Palvinder Singh

106 reviews

Tutor has not setup batch timings yet. Book a Demo to talk to the Tutor.

Different batches available for this Course

No Reviews yet!

Reply to 's review

Enter your reply*

1500/1500

Please enter your reply

Your reply should contain a minimum of 10 characters

Your reply has been successfully submitted.

Certified

The Certified badge indicates that the Tutor has received good amount of positive feedback from Students.

Different batches available for this Course

tickYou have successfully registered

Cyber Security and Ethical Hacking by Saif Ali Khan

Saif Ali khan picture
LIVE

Class
starts in

00

Days

01

Hour

01

Min

01

Sec

Select One

Register Now

Do you want to Register for this Free class?

Yes, Register No, not right now

Tell us a little more about yourself

Cyber Security and Ethical Hacking by Saif Ali Khan

Saif Ali khan picture
LIVE

Class
starts in

00

Days

01

Hour

01

Min

01

Sec

Please enter Student name

Please enter your email address.

Please enter phone number.

Verify Your Mobile Number

Please verify your Mobile Number to book this free class.

Update

Please enter 10 digit phone number.

Please enter your phone number.

Please Enter a valid Mobile Number

This number is already in use.

Resend

Please enter OTP.

Or, give a missed call and get your number verified

080-66-0844-42

This website uses cookies

We use cookies to improve user experience. Choose what cookies you allow us to use. You can read more about our Cookie Policy in our Privacy Policy

Accept All
Decline All

UrbanPro.com is India's largest network of most trusted tutors and institutes. Over 55 lakh students rely on UrbanPro.com, to fulfill their learning requirements across 1,000+ categories. Using UrbanPro.com, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 7.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on UrbanPro.com. Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more