Cyber Security & Web Security Training
Learn modern cyber security techniques including ethical hacking, network defense, OWASP vulnerabilities, penetration testing and web application security used by industry professionals.
Ethical Hacking Web Security VAPT Training
Module 1 – Introduction to Cyber Security
- Overview and Importance of Cyber Security
- Fundamental concepts of security
- Fundamentals of Networking – TCP/IP Protocols
- Network Defense Tools
- Introduction to Cybercrime
- Python for Cyber Security
Module 2 – Operating System Security
- Security features in Windows, Linux, macOS
- User account management & permissions
- Bootstrapping Technology
Module 3 – Encryption & Cryptography
- Encryption and Decryption
- Cryptography Tools
- SSL / TLS Protocols
- Digital Signatures
- Digital Certificates
Module 4 – Ethical Hacking
- What is Ethical Hacking?
- Types of Hackers
- Security Challenges
- Types of Attacks
- Vulnerability Research
- Penetration Testing
- Enumeration
Module 5 – Footprinting & Reconnaissance
- What is Footprinting
- DNS Lookup
- Analyzing Email Headers
- Mirroring Websites
- Tracking Email Communication
- Tracking Mobile Communications
Module 6 – Network Scanning
- Types of Scanning
- Three Way Handshake
- NMAP Tool
- Banner Grabbing
- OS Fingerprinting
- Checking the Status of Ports
Module 7 – System Hacking
- Password Cracking Techniques
- Password Attacks
- Keyloggers & Anti-Keyloggers
- Spyware & Anti-Spyware
- Steganography Techniques
Module 8 – Network & Internet Security
- Firewall & Network Security
- Securing Wireless Networks
- Wi-Fi Security Protocols
- VPN
- Internet Security Laws
Web Security & OWASP Training
Module 9 – Web Architecture & Security
- HTTP / HTTPS Protocols
- Request & Response Headers
- Burp Suite Interception Proxy
- Encoding / Decoding (Base64, URL)
- Subdomain Enumeration
- Technology Profiling
- Cookie Security
- Session IDs
- JWT Introduction
Module 10 – OWASP Top 10
- SQL Injection
- Broken Access Control
- IDOR Exploits
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Parameterized Queries
- Input Validation
- Anti-CSRF Tokens
- Social Engineering & Phishing
Module 11 – Advanced AppSec & VAPT
- Authentication Security
- MFA Bypass
- JWT Exploits
- OWASP ZAP Scanning
- Nuclei & Nessus Tools
- Web Application Firewall (WAF)
- Rate Limiting
- Professional VAPT Reporting
- CVSS Scoring
- Final Capstone Project
Course Benefits
Hands-on Ethical Hacking
Practice real-world hacking techniques used by security professionals.
Industry Tools
Learn Burp Suite, Nmap, OWASP ZAP, Nessus and other security tools.
Career Opportunities
Prepare for roles like Cyber Security Analyst, Pen Tester, and Security Engineer.