About the Course
The Cyber Security course is designed to equip students with the
skills and knowledge required to protect digital systems and networks
from cyber threats. It covers key areas such as network security,
ethical hacking, cryptography, incident response, and risk management.
Through hands-on labs, simulations, and real-world scenarios, students
gain practical experience to tackle modern cybersecurity challenges
and build a strong foundation for professional certifications.
Learning Methodology
Our academy adopts a structured, practical-focused approach to cyber
security training. Students progress from foundational concepts to
advanced techniques through hands-on labs, guided exercises, and
real-world simulations. Ethical standards, assessments, and industry
best practices are emphasized to prepare learners for professional
roles and certification pathways.
Course Outline
Week 1: Windows Administration (Windows 10)
- Understanding the Windows operating system
- Console, shell, and kernel concepts
- Windows Command Prompt and DOS commands
- File systems in Windows
- Executing tasks and operations via the console
Week 2: Networking Fundamentals
- Introduction to computer networking
- Understanding IP addresses
- Types and classes of IP addresses
- IP address ranges and classifications
Week 3: Cyber Security Fundamentals
- Introduction to cybersecurity concepts
- Data protection and safe keeping
- Evolution of cyber threats
- Cybersecurity domains and myths
- Common cyber threats and mitigation techniques
- Network security fundamentals
- Overview of cybersecurity tools
Week 4: Introduction to Ethical Hacking
- What ethical hacking is and why it matters
- Roles and responsibilities of ethical hackers
- Key ethical hacking concepts
- Problems hacking identifies
- Limitations of ethical hacking
- Setting up a hacking lab
Weeks 5–6: Reconnaissance & Information Gathering
- Network reconnaissance and footprinting
- Discovering devices on the same network
- Gathering device information (ports, MAC address, services)
- Operating system detection
- Using Zenmap for advanced scanning
Week 7: Wireless & Wi-Fi Hacking
- WPA and WPA2 security fundamentals
- Capturing handshakes
- Creating and using wordlists
- WPA/WPA2 cracking techniques
- Securing wireless networks
- Configuring Wi-Fi for maximum security
Week 8: Connection Attacks
- Packet sniffing basics
- Wi-Fi bands (2.4GHz & 5GHz)
- Targeted packet sniffing
- De-authentication attacks
- ARP request replay attacks
Weeks 9–11: Sniffing & Analysis with Wireshark
- Wireshark overview and setup
- Sniffing and analyzing network traffic
- Using filters and packet tracing
- Capturing passwords and transmitted data
- Man-In-The-Middle (MITM) attacks
- Git & GitHub basics
- Installing tools from GitHub into Kali Linux
Weeks 12–13: Trojan Backdoors & Payloads (Windows)
- Understanding backdoors
- Testing delivery methods
- Fake update attacks
- Backdooring downloads
- Protecting against delivery-based attacks
Week 14: Android Backdoors
- Creating Android backdoors
- Binding trojans with legitimate APKs
- Testing in virtual or physical environments
Weeks 15–16: Basic Python Programming
- Python variables and strings
- Python fundamentals for security
- Penetration testing with Python
- Overview of testing tools and platforms
Possible Career Opportunities
- Cybersecurity Analyst
- Penetration Tester (Ethical Hacker)
- Security Consultant
- Incident Responder
- Security Operations Center (SOC) Analyst
- Cybersecurity Researcher