+91 70083 28450 +191-723-19511


Course Content

Module 1

Introduction | Little Q & A to understand the knowledge of student. | What are our (Indian) IT laws | Cyber Security career guidance | AMA sessions (Ask me anything)

Module 2

What is Network and how it works | What are network components? | How to secure your home network.

Module 3

What is Ethical Hacking | Difference between Information Security and Cyber Security | Types of hackers

Module 4

What is Kali Linux | How to install Kali Linux | Basics of Kali Linux | What are main usage of kali Linux in Ethical Hacking and Penetration Testing

Module 5

Types of Hacking attack | What is GHDB (Google Hacking Database) and how to use it like pro | What is Social Engineering

Module 6

How to setup your Ethical Hacking / Penetration testing lab environment | Phases of Hacking

Module 7

Reconnaissance | Information gathering | NMAP

Module 8

What is Vulnerability? | How to find a Vulnerability in system | Network Enumeration

Module 9

Gaining Access | How to take advantage of Vulnerability | Metasploit Framework

Module 10

What is Virus? | Difference between Payload, Exploit, Viruses, Trojan, Worms and Malware, Key-Logger (With Practical examples)

Module 11

Maintaining the Access (How to maintaining access of target system) | Covering the Tracks

Module 12

Passwords Cracking (Windows and Linux). | Automation and Manual process of cracking passwords of Wi-Fi devices.

Module 13

What is Buffer Overflow attack (For OSCP) | Practical Example | (Basic)

Module 14

Web Application Penetration Testing introduction | Vulnerability Disclosure P | OWAPS top 10

Module 15

XSS | Session Hijacking | URL-redirection

Module 16

Information Disclosure | LFI | RFI | WordPress Vulnerability

Module 17

What is Web Application firewall? | Firewall Evasion (Basic firewall bypass) | Do’s |Don’t

Module 18

What is Honeypots | IPS | IDS with live demonstration

Module 19

What is Active Directory? | How to setup a domain controller | How to create active directory lab environment for penetration testing

Module 20

How to penetrate active directory | SMB penetration testing and exploiting

Module 21

What is Privilege escalation | Windows and Linux |

Module 22

Mobile Security | Threats | Data Forensics | Cloud Computing introduction

Module 23

Capture the flag (basically in this Module we will explore how to perform a complete penetration testing in ethical way with a real-life example and machines)

Course Duration- 60 Days

Course Fees- Rs. 24,999/- 14,999/-

Benefits you will get

  • After each class students will get their detailed notes about corresponding chapters.

  • During each weekend there will be one doubt clearing class which will clear the doubts of students.

  • There will be total 5 exams during this course 3 exams will be MCQ and one liner (25 marks) and 2 exams will be practical in which student have to perform certain attack which they thought during the course.

  • If student qualifies in all exams with minimum of 65%. They will be eligible for the Geniousbit Technologies Hacker’s tournament.

  • We will select all the geniuses who scored 65% or more they will be selected for the tournament. In which they will compete with other geniuses from other batches.

  • During this tournament who comes first he/she will get amazing price from Geniousbit Technologies and getting chance to mention their name on hall of fame in our official website and social media handles. Best performer during the course and tournament will get chance to do internship in Geniousbit Technologies for 3 to 6 months. During internship student will learn and develop hands-on/real life penetration testing skills. This will help students to grow faster in this industry.

T&C Apply

Enroll Now