GENIOUSBIT CYBER SECURITY COURSE
Course Content
Module 1
Introduction | Little Q & A to understand the knowledge of student. | What are our (Indian) IT laws | Cyber Security career guidance | AMA sessions (Ask me anything)
Module 2
What is Network and how it works | What are network components? | How to secure your home network.
Module 3
What is Ethical Hacking | Difference between Information Security and Cyber Security | Types of hackers
Module 4
What is Kali Linux | How to install Kali Linux | Basics of Kali Linux | What are main usage of kali Linux in Ethical Hacking and Penetration Testing
Module 5
Types of Hacking attack | What is GHDB (Google Hacking Database) and how to use it like pro | What is Social Engineering
Module 6
How to setup your Ethical Hacking / Penetration testing lab environment | Phases of Hacking
Module 7
Reconnaissance | Information gathering | NMAP
Module 8
What is Vulnerability? | How to find a Vulnerability in system | Network Enumeration
Module 9
Gaining Access | How to take advantage of Vulnerability | Metasploit Framework
Module 10
What is Virus? | Difference between Payload, Exploit, Viruses, Trojan, Worms and Malware, Key-Logger (With Practical examples)
Module 11
Maintaining the Access (How to maintaining access of target system) | Covering the Tracks
Module 12
Passwords Cracking (Windows and Linux). | Automation and Manual process of cracking passwords of Wi-Fi devices.
Module 13
What is Buffer Overflow attack (For OSCP) | Practical Example | (Basic)
Module 14
Web Application Penetration Testing introduction | Vulnerability Disclosure P | OWAPS top 10
Module 15
XSS | Session Hijacking | URL-redirection
Module 16
Information Disclosure | LFI | RFI | WordPress Vulnerability
Module 17
What is Web Application firewall? | Firewall Evasion (Basic firewall bypass) | Do’s |Don’t
Module 18
What is Honeypots | IPS | IDS with live demonstration
Module 19
What is Active Directory? | How to setup a domain controller | How to create active directory lab environment for penetration testing
Module 20
How to penetrate active directory | SMB penetration testing and exploiting
Module 21
What is Privilege escalation | Windows and Linux |
Module 22
Mobile Security | Threats | Data Forensics | Cloud Computing introduction
Module 23
Capture the flag (basically in this Module we will explore how to perform a complete penetration testing in ethical way with a real-life example and machines)
Course Duration- 60 Days
Course Fees- Rs. 24,999/- 14,999/-
Benefits you will get
- After each class students will get their detailed notes about corresponding chapters.
- During each weekend there will be one doubt clearing class which will clear the doubts of students.
- There will be total 5 exams during this course 3 exams will be MCQ and one liner (25 marks) and 2 exams will be practical in which student have to perform certain attack which they thought during the course.
- If student qualifies in all exams with minimum of 65%. They will be eligible for the Geniousbit Technologies Hacker’s tournament.
- We will select all the geniuses who scored 65% or more they will be selected for the tournament. In which they will compete with other geniuses from other batches.
- During this tournament who comes first he/she will get amazing price from Geniousbit Technologies and getting chance to mention their name on hall of fame in our official website and social media handles. Best performer during the course and tournament will get chance to do internship in Geniousbit Technologies for 3 to 6 months. During internship student will learn and develop hands-on/real life penetration testing skills. This will help students to grow faster in this industry.