



Key Highlights






What You’ll Learn
- Introduction to Cybersecurity
- Importance of cybersecurity in the digital world
- CIA Triad (Confidentiality, Integrity, Availability)
- Threat Landscape: Cybercrime, Nation-state attacks, Hacktivism
- Roles: SOC Analyst, Pen Tester, Security Engineer, CISO
- Types of Attacks
- Malware: Virus, Worm, Trojan, Spyware
- Ransomware: Attack lifecycle, Real-life examples
- Phishing: Email phishing, Spear phishing, Whaling
- DoS/DDoS: Attack vectors, Botnets, Mitigation techniques
- OSI Model, TCP/IP Stack
- Layers of OSI: Functions & Examples
- TCP/IP Comparison to OSI
- Ports and Protocols (Common ones like 80, 443, 22, etc.)
- Protocols
- HTTP vs HTTPS
- FTP: Secure File Transfer
- DNS: Functioning, Poisoning, Tunneling
- Devices
- Router vs Switch
- Firewalls: Types, Rules, Zones
- IDS/IPS: Differences, Deployment methods
- Linux CLI
- Common Commands (cd, ls, grep, find, chmod)
- Bash Scripting Basics
- File Systems & Navigation
- Permissions
- Users & Groups
- chmod, chown, umask
- SUID, SGID, Sticky Bit
- Windows CMD
- Navigation & System Commands
- Registry Basics
- Services, Task Scheduler
- Group Policy Objects (GPO)
- Basics of AD & GPO
- Security Policies & Restrictions
- Virtualization Tools
- VirtualBox & VMware: Comparison & Setup
- Network Modes (NAT, Bridged, Host-only)
- Installation
- Kali Linux Setup & Tools Overview
- Metasploitable2 Installation
- Optional: OWASP Broken Web Apps VM
- Passive Recon
- Google Dorking Techniques
- WHOIS, DNSdumpster, netcraft, Shodan & Censys
- Active Recon
- Nmap: Host Discovery, Port Scans, Scripting Engine (NSE)
- Banner Grabbing using Netcat, Telnet
- Tools
- Nmap: Service versioning, OS Detection
- Netcat: Reverse Shells, Bind Shells
- Nikto: Web server scanning
- Dirbuster: Directory brute force
- Enumeration Techniques
- DNS Enumeration (dig, dnsenum, fierce)
- SMB/NetBIOS Enumeration
- SNMP Enumeration
- Fingerprinting OS, Services
- lnerability Scanning
- Nessus Installation, Scan Types
- OpenVAS Configuration, Reporting
- Vulnerability Research
- Reading CVEs (CVSS, Description, Exploits)
- Patch Analysis: What is fixed, What is exploitable
- OWASP Top 10
- SQL Injection (Manual + Tools)
- XSS (Stored, Reflected)
- CSRF (Token Bypass)
- SSRF, IDOR, Command Injection
- Tools
- Burp Suite: Intercepting Proxy, Repeater, Intruder
- OWASP ZAP
- SQLmap for automated SQLi
- DVWA, Juice Shop (for practice)
- Metasploit Framework
- msfconsole, Exploit/Payload/Module Structure
- Meterpreter Basics
- Privilege Escalation Techniques
- Post-Exploitation
- Persistence (Registry, Services)
- Data Exfiltration
- Clearing Logs
- Tools
- John the Ripper: Hash Cracking
- Hydra: Network Login Bruteforce
- Hashcat: GPU-Based Cracking
- Attack Types
- Brute Force vs Dictionary vs Hybrid
- Rainbow Tables & Salting
- Cracking Wireless
- WEP Cracking with aircrack-ng
- WPA/WPA2 Handshake Capture & Cracking
- Wireless Attacks
- Evil Twin Attack
- Rogue AP & Karma Attacks
- Wi-Fi Pineapple Introduction
- Phishing
- Email Template Creation
- Tools: SET (Social Engineering Toolkit), GoPhish
- Impersonation & Pretexting
- Physical Recon & Tailgating
- Fake Calls & Baiting Techniques
- Capstone Project
- Simulated Pen Test on a vulnerable system
- Report Writing (Executive Summary + Technical Details)
- Career Prep
- Resume Optimization (Cybersecurity-Specific)
- Common Interview Questions (Technical + HR)
- Overview of Certifications: CEH, Security+, OSCP
Module 1: Cybersecurity Fundamentals
- Introduction to Cybersecurity
- Importance of cybersecurity in the digital world
- CIA Triad (Confidentiality, Integrity, Availability)
- Threat Landscape: Cybercrime, Nation-state attacks, Hacktivism
- Roles: SOC Analyst, Pen Tester, Security Engineer, CISO
- Types of Attacks
- Malware: Virus, Worm, Trojan, Spyware
- Ransomware: Attack lifecycle, Real-life examples
- Phishing: Email phishing, Spear phishing, Whaling
- DoS/DDoS: Attack vectors, Botnets, Mitigation techniques
Module 2 : Networking Essentials
- OSI Model, TCP/IP Stack
- Layers of OSI: Functions & Examples
- TCP/IP Comparison to OSI
- Ports and Protocols (Common ones like 80, 443, 22, etc.)
- Protocols
- HTTP vs HTTPS
- FTP: Secure File Transfer
- DNS: Functioning, Poisoning, Tunneling
- Devices
- Router vs Switch
- Firewalls: Types, Rules, Zones
- IDS/IPS: Differences, Deployment methods
Module 3: Operating Systems Basics
- Linux CLI
- Common Commands (cd, ls, grep, find, chmod)
- Bash Scripting Basics
- File Systems & Navigation
- Permissions
- Users & Groups
- chmod, chown, umask
- SUID, SGID, Sticky Bit
- Windows CMD
- Navigation & System Commands
- Registry Basics
- Services, Task Scheduler
- Group Policy Objects (GPO)
- Basics of AD & GPO
- Security Policies & Restrictions
Module 4: Lab Setup
- Virtualization Tools
- VirtualBox & VMware: Comparison & Setup
- Network Modes (NAT, Bridged, Host-only)
- Installation
- Kali Linux Setup & Tools Overview
- Metasploitable2 Installation
- Optional: OWASP Broken Web Apps VM
Module 5: Reconnaissance
- Passive Recon
- Google Dorking Techniques
- WHOIS, DNSdumpster, netcraft, Shodan & Censys
- Active Recon
- Nmap: Host Discovery, Port Scans, Scripting Engine (NSE)
- Banner Grabbing using Netcat, Telnet
Module 6: Scanning & Enumeration
- Tools
- Nmap: Service versioning, OS Detection
- Netcat: Reverse Shells, Bind Shells
- Nikto: Web server scanning
- Dirbuster: Directory brute force
- Enumeration Techniques
- DNS Enumeration (dig, dnsenum, fierce)
- SMB/NetBIOS Enumeration
- SNMP Enumeration
- Fingerprinting OS, Services
Module 7: Vulnerability Assessment
- lnerability Scanning
- Nessus Installation, Scan Types
- OpenVAS Configuration, Reporting
- Vulnerability Research
- Reading CVEs (CVSS, Description, Exploits)
- Patch Analysis: What is fixed, What is exploitable
Module 8: Web Security
- OWASP Top 10
- SQL Injection (Manual + Tools)
- XSS (Stored, Reflected)
- CSRF (Token Bypass)
- SSRF, IDOR, Command Injection
- Tools
- Burp Suite: Intercepting Proxy, Repeater, Intruder
- OWASP ZAP
- SQLmap for automated SQLi
- DVWA, Juice Shop (for practice)
Module 9: System Exploitation
- Metasploit Framework
- msfconsole, Exploit/Payload/Module Structure
- Meterpreter Basics
- Privilege Escalation Techniques
- Post-Exploitation
- Persistence (Registry, Services)
- Data Exfiltration
- Clearing Logs
Module 10: Password Attacks
- Tools
- John the Ripper: Hash Cracking
- Hydra: Network Login Bruteforce
- Hashcat: GPU-Based Cracking
- Attack Types
- Brute Force vs Dictionary vs Hybrid
- Rainbow Tables & Salting
Module 11: Wireless Security
- Cracking Wireless
- WEP Cracking with aircrack-ng
- WPA/WPA2 Handshake Capture & Cracking
- Wireless Attacks
- Evil Twin Attack
- Rogue AP & Karma Attacks
- Wi-Fi Pineapple Introduction
Module 12: Social Engineering
- Phishing
- Email Template Creation
- Tools: SET (Social Engineering Toolkit), GoPhish
- Impersonation & Pretexting
- Physical Recon & Tailgating
- Fake Calls & Baiting Techniques
Module 13: Capstone Project + Interview Prep
- Capstone Project
- Simulated Pen Test on a vulnerable system
- Report Writing (Executive Summary + Technical Details)
- Career Prep
- Resume Optimization (Cybersecurity-Specific)
- Common Interview Questions (Technical + HR)
- Overview of Certifications: CEH, Security+, OSCP
- The 7 Cs of Effective Business Communication
- Communication English
- Grammar Mastery: Tenses, Adjectives, and Verbs
- Body Language & Modals
- Ace Your Business Presentations
- Effective Email Writing
- Telephonic Communication and Business Vocab
- Networking and Interpersonal Skills Development
- Resume Building
- LinkedIn Profile Creation
- Profile Building
- Interview Best Practice
- Technical interview
- 10+ Mock Analytic Interviews
- HR interview
- 10+ Mock Commination Interviews
- Company-Specific Interview Guides
- Several Coding Challanges
- Industry Specific Projects on Python, Machine Learning, and data Analytics
- Work on Real World Datasets
- 50+ Assignments
- The 7 Cs of Effective Business Communication
- Communication English
- Grammar Mastery: Tenses, Adjectives, and Verbs
- Body Language & Modals
- Ace Your Business Presentations
- Effective Email Writing
- Telephonic Communication and Business Vocab
- Networking and Interpersonal Skills Development
- Resume Building
- LinkedIn Profile Creation
- Profile Building
- Interview Best Practice
- Technical interview
- 10+ Mock Analytic Interviews
- HR interview
- 10+ Mock Commination Interviews
- Company-Specific Interview Guides
- Several Coding Challanges
- Industry Specific Projects on Python, Machine Learning, and data Analytics
- Work on Real World Datasets
- 50+ Assignments


























Why Choose Fingertips?
Top-Quality Training: Led by certified cyber security professionals
Hands-on Projects: Work on real-world scenarios and penetration testing labs
Placement Support: Dedicated career guidance till you get placed
Industry-Recognized Certification
Lifetime LMS Access

Who can apply for this course?
Students who are in the final year of graduation or post-graduation.
Recent Graduates who want to pursue a career in the field of Digital Marketing.
Professionals Who are looking at building a career in Digital Marketing.
Get Certified with Fingertips

Certificate
Upon completing this program, you will be granted a certificate of completion from Fingertips.

Credible
It validates the expertise of over 15,000 learners in the field, boosting your credibility and giving a competitive edge in the job market, and opening doors to lucrative career opportunities.

Shareable
Leverage the power of your certificate by showcasing it on LinkedIn and job hosting platforms, unlocking exciting recruitment prospects with renowned companies.
We have partnered with the following financing companies to provide no-cost EMI and competitive finance options with no hidden costs.


- Learn From The Industry Experts
- Generative Ai Curriculum
- 10+ Tools & Techniques
- 100% Job Assistance
We have partnered with the following financing companies to provide no-cost EMI and competitive finance options with no hidden costs.


We have partnered with the following financing companies to provide no-cost EMI and competitive finance options with no hidden costs.


- Learn From The Industry Experts
- Generative Ai Curriculum
- 10+ Tools & Techniques
- 100% Job Assistance
We have partnered with the following financing companies to provide no-cost EMI and competitive finance options with no hidden costs.

