Click on 'Enroll Now' button to get access to 6 Cyber Security Courses in 1.
1. Windows Hacking
2.Website Hacking
3.Social Media Hacking
4.Wifi Hacking
5.Performing VAPT
6.Securing Network & Devices
Course Curriculum
- 1.1 Basics of Ethical Hacking - 28 Oct'20 (78:52)
- 1. Notes for Basics of Ethical Hacking
- 2. Notes for Basics of Ethical Hacking
- 3. Notes for Basics of Ethical Hacking
- 1.2 Basics of ethical hacking - part 1 - 29 oct'20 (57:40)
- 1.3 Basics of Networking - part 1 - 29 oct'20 (32:55)
- 4. Notes for Basics of Networking
- 1.4 Basics of networking - part 2 - 31 oct'20 (130:29)
- 1.5 Basics of Networking - part 3 - 1 Nov'20 (127:24)
- 5. Assignment for modules 1-3
- 1.1 Basics of Ethical Hacking - 28 Oct'20 (78:52)
- 1. Notes for Basics of Ethical Hacking
- 2. Notes for Basics of Ethical Hacking
- 3. Notes for Basics of Ethical Hacking
- 1.2 Basics of ethical hacking - part 1 - 29 oct'20 (57:40)
- 1.3 Basics of Networking - part 1 - 29 oct'20 (32:55)
- 4. Notes for Basics of Networking
- 1.4 Basics of networking - part 2 - 31 oct'20 (130:29)
- 1.5 Basics of Networking - part 3 - 1 Nov'20 (127:24)
- 5. Assignment for modules 1-3
- 3.1 Footprinting - part 1 - 19 Nov (123:35)
- 3.2 Footprinting - part 2 - 21 Nov (143:09)
- 1. Notes for footprinting
- 2. notes for footprinting
- 3. notes for footprinting
- 4. notes for footprinting
- 5. Assignment for footprinting
- 3.1 Footprinting - part 1 - 19 Nov (123:35)
- 3.2 Footprinting - part 2 - 21 Nov (143:09)
- 1. Notes for footprinting
- 2. notes for footprinting
- 3. notes for footprinting
- 4. notes for footprinting
- 5. Assignment for footprinting
- 4.1 Scanning, Vulnerability Assessment and Penetration Testing - 28 Nov (146:01)
- 1. Notes for Scanning
- 2. Notes for Scanning
- 3. Linux command cheat sheet
- 4. nmap command cheat sheet
- 5. scanning assignment
- 6. Notes for Vulnerability assessment
- 7. Assignment for Vulnerability assessment
- 8. Notes for Penetration testing
- 9. Assignment for penetration testing
- 4.1 Scanning, Vulnerability Assessment and Penetration Testing - 28 Nov (146:01)
- 1. Notes for Scanning
- 2. Notes for Scanning
- 3. Linux command cheat sheet
- 4. nmap command cheat sheet
- 5. scanning assignment
- 6. Notes for Vulnerability assessment
- 7. Assignment for Vulnerability assessment
- 8. Notes for Penetration testing
- 9. Assignment for penetration testing
- 5.1 System Hacking - 4 Dec (96:19)
- 5.2 How to create payload to hack windows - 5 dec (151:43)
- 1. Notes for system hacking
- 2. Notes for system hacking
- 3. Notes for system hacking
- 4. Notes for system hacking
- 5.3 Email Hacking (37:49)
- 1. Notes for Email Hacking
- 2. Notes for Email Hacking
- 5.1 System Hacking - 4 Dec (96:19)
- 5.2 How to create payload to hack windows - 5 dec (151:43)
- 1. Notes for system hacking
- 2. Notes for system hacking
- 3. Notes for system hacking
- 4. Notes for system hacking
- 5.3 Email Hacking (37:49)
- 1. Notes for Email Hacking
- 2. Notes for Email Hacking
- 7.1 Basics of malwares, virus and worm (95:43)
- 1. Notes for virus and worm
- 2. Notes for basics of malware
- 7.2 Trojan and RATs (95:57)
- 3. Notes for trojan and rat
- 7.3 Sniffing - part 1 (105:17)
- 7.4 Sniffing - part 2 (47:22)
- 1. Notes for sniffing
- 2. Notes for sniffing
- 3. Notes for sniffing
- 7.1 Basics of malwares, virus and worm (95:43)
- 1. Notes for virus and worm
- 2. Notes for basics of malware
- 7.2 Trojan and RATs (95:57)
- 3. Notes for trojan and rat
- 7.3 Sniffing - part 1 (105:17)
- 7.4 Sniffing - part 2 (47:22)
- 1. Notes for sniffing
- 2. Notes for sniffing
- 3. Notes for sniffing
- Virtualization and LAB set up - 10 July'20 (101:45)
- Notes for virtualization and LAB set up
- Assignment for Modules 1-3
- English - Virrtualization And basic commands in kali linux - 11 july'20 (78:09)
- Virtualization and LAB set up - 10 July'20 (101:45)
- Notes for virtualization and LAB set up
- Assignment for Modules 1-3
- English - Virrtualization And basic commands in kali linux - 11 july'20 (78:09)
- Virtualization and LAB set up - 10 July'20 (101:45)
- Notes for virtualization and LAB set up
- Assignment for Modules 1-3
- English - Virrtualization And basic commands in kali linux - 11 july'20 (78:09)
- Virtualization and LAB set up - 10 July'20 (101:45)
- Notes for virtualization and LAB set up
- Assignment for Modules 1-3
- English - Virrtualization And basic commands in kali linux - 11 july'20 (78:09)
- 4.1 Basic commands in Kali Linux and Footprinting - part 1 - 11 July'20 (98:38)
- 1. notes for basic commands in kali linux
- 2. notes for basic commands in kali linux
- 3. Notes for footprinting
- 4. Notes for footprinting
- 5. notes for footprinting
- 6. notes for footprinting
- 7. Assignment for footprinting
- 4.2 Footprinting - part 2 - 13 july'20 (124:56)
- 4.2 English - footprinting - 14 july'20 (87:04)
- 4.1 Basic commands in Kali Linux and Footprinting - part 1 - 11 July'20 (98:38)
- 1. notes for basic commands in kali linux
- 2. notes for basic commands in kali linux
- 3. Notes for footprinting
- 4. Notes for footprinting
- 5. notes for footprinting
- 6. notes for footprinting
- 7. Assignment for footprinting
- 4.2 Footprinting - part 2 - 13 july'20 (124:56)
- 4.2 English - footprinting - 14 july'20 (87:04)
- 4.1 Basic commands in Kali Linux and Footprinting - part 1 - 11 July'20 (98:38)
- 1. notes for basic commands in kali linux
- 2. notes for basic commands in kali linux
- 3. Notes for footprinting
- 4. Notes for footprinting
- 5. notes for footprinting
- 6. notes for footprinting
- 7. Assignment for footprinting
- 4.2 Footprinting - part 2 - 13 july'20 (124:56)
- 4.2 English - footprinting - 14 july'20 (87:04)
- 4.1 Basic commands in Kali Linux and Footprinting - part 1 - 11 July'20 (98:38)
- 1. notes for basic commands in kali linux
- 2. notes for basic commands in kali linux
- 3. Notes for footprinting
- 4. Notes for footprinting
- 5. notes for footprinting
- 6. notes for footprinting
- 7. Assignment for footprinting
- 4.2 Footprinting - part 2 - 13 july'20 (124:56)
- 4.2 English - footprinting - 14 july'20 (87:04)
- 6. Penetration Testing and Enumeration - 16 July'20 (105:31)
- 1. Notes for Penetration Testing
- 2. Notes for Penetration Testing
- 3. Notes for Enumeration
- 4. Notes for Enumeration
- 5. Notes for Enumeration
- 6. Assignment for penetration testing
- 7. Assignment for Enumeration
- 6.1 Enumeration part 2 - 17 Jul'20 (104:33)
- 6.2 Enumeration part 3 and how to create payload for windows - 21 july'20 (106:03)
- 6.3 how to create payload and change password in windows - 22 July (106:03)
- 6.4 Creating Payload - 23 July'20 (104:33)
- 6. English - Vulnerability Assessment and penetration testing - 21 july (49:11)
- 6.1 English - Enumeration - 22 july'20 (89:27)
- 6.5 Password Cracking - 24 july (124:08)
- 8. Notes for system hacking
- 9. Notes for system hacking
- 10. Notes for system hacking
- 11. Notes for system hacking
- 6. Penetration Testing and Enumeration - 16 July'20 (105:31)
- 1. Notes for Penetration Testing
- 2. Notes for Penetration Testing
- 3. Notes for Enumeration
- 4. Notes for Enumeration
- 5. Notes for Enumeration
- 6. Assignment for penetration testing
- 7. Assignment for Enumeration
- 6.1 Enumeration part 2 - 17 Jul'20 (104:33)
- 6.2 Enumeration part 3 and how to create payload for windows - 21 july'20 (106:03)
- 6.3 how to create payload and change password in windows - 22 July (106:03)
- 6.4 Creating Payload - 23 July'20 (104:33)
- 6. English - Vulnerability Assessment and penetration testing - 21 july (49:11)
- 6.1 English - Enumeration - 22 july'20 (89:27)
- 6.5 Password Cracking - 24 july (124:08)
- 8. Notes for system hacking
- 9. Notes for system hacking
- 10. Notes for system hacking
- 11. Notes for system hacking
- 6. Penetration Testing and Enumeration - 16 July'20 (105:31)
- 1. Notes for Penetration Testing
- 2. Notes for Penetration Testing
- 3. Notes for Enumeration
- 4. Notes for Enumeration
- 5. Notes for Enumeration
- 6. Assignment for penetration testing
- 7. Assignment for Enumeration
- 6.1 Enumeration part 2 - 17 Jul'20 (104:33)
- 6.2 Enumeration part 3 and how to create payload for windows - 21 july'20 (106:03)
- 6.3 how to create payload and change password in windows - 22 July (106:03)
- 6.4 Creating Payload - 23 July'20 (104:33)
- 6. English - Vulnerability Assessment and penetration testing - 21 july (49:11)
- 6.1 English - Enumeration - 22 july'20 (89:27)
- 6.5 Password Cracking - 24 july (124:08)
- 8. Notes for system hacking
- 9. Notes for system hacking
- 10. Notes for system hacking
- 11. Notes for system hacking
- 6. Penetration Testing and Enumeration - 16 July'20 (105:31)
- 1. Notes for Penetration Testing
- 2. Notes for Penetration Testing
- 3. Notes for Enumeration
- 4. Notes for Enumeration
- 5. Notes for Enumeration
- 6. Assignment for penetration testing
- 7. Assignment for Enumeration
- 6.1 Enumeration part 2 - 17 Jul'20 (104:33)
- 6.2 Enumeration part 3 and how to create payload for windows - 21 july'20 (106:03)
- 6.3 how to create payload and change password in windows - 22 July (106:03)
- 6.4 Creating Payload - 23 July'20 (104:33)
- 6. English - Vulnerability Assessment and penetration testing - 21 july (49:11)
- 6.1 English - Enumeration - 22 july'20 (89:27)
- 6.5 Password Cracking - 24 july (124:08)
- 8. Notes for system hacking
- 9. Notes for system hacking
- 10. Notes for system hacking
- 11. Notes for system hacking
- 7.1 Email Hacking, Keyloggers, spywares - 27 July (106:20)
- 1. notes for Email Hacking
- 2.Notes for Email Hacking
- 3. Notes for keyloggers and spywares
- 7.1 Email Hacking, Keyloggers, spywares - 27 July (106:20)
- 1. notes for Email Hacking
- 2.Notes for Email Hacking
- 3. Notes for keyloggers and spywares
- 7.1 Email Hacking, Keyloggers, spywares - 27 July (106:20)
- 1. notes for Email Hacking
- 2.Notes for Email Hacking
- 3. Notes for keyloggers and spywares
- 7.1 Email Hacking, Keyloggers, spywares - 27 July (106:20)
- 1. notes for Email Hacking
- 2.Notes for Email Hacking
- 3. Notes for keyloggers and spywares
- Steganography, Hiding files and Clearing Tracks, Trojan and RATs - part 1- 28 July (113:51)
- Trojan and RAT part 2, 29 July (136:15)
- 1. Steganography notes
- 2. Hiding files and Clearing tracks notes
- 3. malware basic notes
- 4. Introduction to malware scan
- 5. Notes for trojan and RATs
- Steganography, Hiding files and Clearing Tracks, Trojan and RATs - part 1- 28 July (113:51)
- Trojan and RAT part 2, 29 July (136:15)
- 1. Steganography notes
- 2. Hiding files and Clearing tracks notes
- 3. malware basic notes
- 4. Introduction to malware scan
- 5. Notes for trojan and RATs
- Steganography, Hiding files and Clearing Tracks, Trojan and RATs - part 1- 28 July (113:51)
- Trojan and RAT part 2, 29 July (136:15)
- 1. Steganography notes
- 2. Hiding files and Clearing tracks notes
- 3. malware basic notes
- 4. Introduction to malware scan
- 5. Notes for trojan and RATs
- Steganography, Hiding files and Clearing Tracks, Trojan and RATs - part 1- 28 July (113:51)
- Trojan and RAT part 2, 29 July (136:15)
- 1. Steganography notes
- 2. Hiding files and Clearing tracks notes
- 3. malware basic notes
- 4. Introduction to malware scan
- 5. Notes for trojan and RATs
- Sniffing part 1 - 30 July (152:39)
- Sniffing part 2 - 31 July (109:35)
- 1. Notes for sniffing
- 2. Notes for sniffing
- 3. Notes for sniffing
- Sniffing part 1 - 30 July (152:39)
- Sniffing part 2 - 31 July (109:35)
- 1. Notes for sniffing
- 2. Notes for sniffing
- 3. Notes for sniffing
- Sniffing part 1 - 30 July (152:39)
- Sniffing part 2 - 31 July (109:35)
- 1. Notes for sniffing
- 2. Notes for sniffing
- 3. Notes for sniffing
- Sniffing part 1 - 30 July (152:39)
- Sniffing part 2 - 31 July (109:35)
- 1. Notes for sniffing
- 2. Notes for sniffing
- 3. Notes for sniffing
- Session Hijacking - part 1 - 4 August (105:19)
- Session Hijacking - part 2 - 5 August (135:07)
- 1. Notes for session hijacking
- 2. Notes for session hijacking
- Session Hijacking - part 1 - 4 August (105:19)
- Session Hijacking - part 2 - 5 August (135:07)
- 1. Notes for session hijacking
- 2. Notes for session hijacking
- Session Hijacking - part 1 - 4 August (105:19)
- Session Hijacking - part 2 - 5 August (135:07)
- 1. Notes for session hijacking
- 2. Notes for session hijacking
- Session Hijacking - part 1 - 4 August (105:19)
- Session Hijacking - part 2 - 5 August (135:07)
- 1. Notes for session hijacking
- 2. Notes for session hijacking
- SQL Injection - part 1 - 6 August (45:47)
- SQL Injection - part 2 - 6 August (64:14)
- 1. Notes for SQL Injection
- 2. Notes for SQL Injection
- SQL Injection - part 1 - 6 August (45:47)
- SQL Injection - part 2 - 6 August (64:14)
- 1. Notes for SQL Injection
- 2. Notes for SQL Injection
- SQL Injection - part 1 - 6 August (45:47)
- SQL Injection - part 2 - 6 August (64:14)
- 1. Notes for SQL Injection
- 2. Notes for SQL Injection
- SQL Injection - part 1 - 6 August (45:47)
- SQL Injection - part 2 - 6 August (64:14)
- 1. Notes for SQL Injection
- 2. Notes for SQL Injection
- Social Engineering and Phishing - 2 August (107:51)
- 1. notes for Social Engineering and Phishing
- 2. notes for Social Engineering and Phishing
- 3. notes for Social Engineering and Phishing
- Social Engineering and Phishing - 2 August (107:51)
- 1. notes for Social Engineering and Phishing
- 2. notes for Social Engineering and Phishing
- 3. notes for Social Engineering and Phishing
- Social Engineering and Phishing - 2 August (107:51)
- 1. notes for Social Engineering and Phishing
- 2. notes for Social Engineering and Phishing
- 3. notes for Social Engineering and Phishing
- Social Engineering and Phishing - 2 August (107:51)
- 1. notes for Social Engineering and Phishing
- 2. notes for Social Engineering and Phishing
- 3. notes for Social Engineering and Phishing
- Webserver Hacking - 8 August (36:37)
- Webserver Hacking and Web application Hacking part 1 - 8 August (58:44)
- Web Application part 2 and DOS & DDOS - 9 August (128:10)
- 1. Notes for Web server Hacking
- 2. Notes for Web server Hacking
- 3. Notes for Web server Hacking
- 4. Notes for DOS and DDOS
- 5. Notes for DOS and DDOS
- 6. Notes for Web Application Hacking
- Webserver Hacking - 8 August (36:37)
- Webserver Hacking and Web application Hacking part 1 - 8 August (58:44)
- Web Application part 2 and DOS & DDOS - 9 August (128:10)
- 1. Notes for Web server Hacking
- 2. Notes for Web server Hacking
- 3. Notes for Web server Hacking
- 4. Notes for DOS and DDOS
- 5. Notes for DOS and DDOS
- 6. Notes for Web Application Hacking
- Webserver Hacking - 8 August (36:37)
- Webserver Hacking and Web application Hacking part 1 - 8 August (58:44)
- Web Application part 2 and DOS & DDOS - 9 August (128:10)
- 1. Notes for Web server Hacking
- 2. Notes for Web server Hacking
- 3. Notes for Web server Hacking
- 4. Notes for DOS and DDOS
- 5. Notes for DOS and DDOS
- 6. Notes for Web Application Hacking
- Webserver Hacking - 8 August (36:37)
- Webserver Hacking and Web application Hacking part 1 - 8 August (58:44)
- Web Application part 2 and DOS & DDOS - 9 August (128:10)
- 1. Notes for Web server Hacking
- 2. Notes for Web server Hacking
- 3. Notes for Web server Hacking
- 4. Notes for DOS and DDOS
- 5. Notes for DOS and DDOS
- 6. Notes for Web Application Hacking
- Cryptography - 11 August (134:43)
- 1. Notes for Cryptography
- 2. Notes for Cryptography
- 3. Notes for Cryptography
- Cryptography - 11 August (134:43)
- 1. Notes for Cryptography
- 2. Notes for Cryptography
- 3. Notes for Cryptography
- Cryptography - 11 August (134:43)
- 1. Notes for Cryptography
- 2. Notes for Cryptography
- 3. Notes for Cryptography
- Cryptography - 11 August (134:43)
- 1. Notes for Cryptography
- 2. Notes for Cryptography
- 3. Notes for Cryptography
- Cross Site Scripting - 13 August'20 (100:21)
- 1. Notes for Cross site scripting
- 2. Notes for Cross site scripting
- Cross Site Scripting - 13 August'20 (100:21)
- 1. Notes for Cross site scripting
- 2. Notes for Cross site scripting
- Cross Site Scripting - 13 August'20 (100:21)
- 1. Notes for Cross site scripting
- 2. Notes for Cross site scripting
- Cross Site Scripting - 13 August'20 (100:21)
- 1. Notes for Cross site scripting
- 2. Notes for Cross site scripting
- Firewall - 14 August'20 (83:01)
- Firewall part 2 and wifi hacking, IOT - 15 August'20 (82:27)
- 1. Notes for firewall
- 2. Notes for firewall
- 3. Notes for firewall
- 4. Notes for firewall
- 5. Notes for IOT
- 6. Notes for Wifi Hacking
- Firewall - 14 August'20 (83:01)
- Firewall part 2 and wifi hacking, IOT - 15 August'20 (82:27)
- 1. Notes for firewall
- 2. Notes for firewall
- 3. Notes for firewall
- 4. Notes for firewall
- 5. Notes for IOT
- 6. Notes for Wifi Hacking
- Firewall - 14 August'20 (83:01)
- Firewall part 2 and wifi hacking, IOT - 15 August'20 (82:27)
- 1. Notes for firewall
- 2. Notes for firewall
- 3. Notes for firewall
- 4. Notes for firewall
- 5. Notes for IOT
- 6. Notes for Wifi Hacking
- Firewall - 14 August'20 (83:01)
- Firewall part 2 and wifi hacking, IOT - 15 August'20 (82:27)
- 1. Notes for firewall
- 2. Notes for firewall
- 3. Notes for firewall
- 4. Notes for firewall
- 5. Notes for IOT
- 6. Notes for Wifi Hacking
- Mobile Platform Hacking - 19 August (204:07)
- Mobile Platform Hacking - part 2 - 20 August (68:10)
- 1. Notes for mobile platform hacking
- Mobile Platform Hacking - 19 August (204:07)
- Mobile Platform Hacking - part 2 - 20 August (68:10)
- 1. Notes for mobile platform hacking
- Mobile Platform Hacking - 19 August (204:07)
- Mobile Platform Hacking - part 2 - 20 August (68:10)
- 1. Notes for mobile platform hacking
- Mobile Platform Hacking - 19 August (204:07)
- Mobile Platform Hacking - part 2 - 20 August (68:10)
- 1. Notes for mobile platform hacking
- Cloud Computing, Credit card Fraud, Creating Security Policies - 23 august (88:04)
- 1. Notes for Cloud Computing
- 2. Notes for credit card fraud
- 3. Creating Security policies
- Cloud Computing, Credit card Fraud, Creating Security Policies - 23 august (88:04)
- 1. Notes for Cloud Computing
- 2. Notes for credit card fraud
- 3. Creating Security policies
- Cloud Computing, Credit card Fraud, Creating Security Policies - 23 august (88:04)
- 1. Notes for Cloud Computing
- 2. Notes for credit card fraud
- 3. Creating Security policies
- Cloud Computing, Credit card Fraud, Creating Security Policies - 23 august (88:04)
- 1. Notes for Cloud Computing
- 2. Notes for credit card fraud
- 3. Creating Security policies
- 1. Ethical Hacking Sample Resume
- 2. Ethical Hacking Sample Resume
- 3. Ethical Hacking Sample Resume
- 1. Ethical Hacking Sample Resume
- 2. Ethical Hacking Sample Resume
- 3. Ethical Hacking Sample Resume
- 1. Ethical Hacking Sample Resume
- 2. Ethical Hacking Sample Resume
- 3. Ethical Hacking Sample Resume
- 1. Ethical Hacking Sample Resume
- 2. Ethical Hacking Sample Resume
- 3. Ethical Hacking Sample Resume
Priyanka Shirurkar
One of India's leading ladies in cyber security field.
Certified L.P.T. (Licensed Penetration Tester - Highest Qaulification in Ethical Hacking)
Works with police and cyber cell over cyber crime issues
Trained Over 8679+ students across the world
Atharva Birari
A mentor is major important factor while considering a course for ethical hacking. Luckily priyanka mam is a LPT and works in the industry as an ethical hacker, she gave us beautiful insights about hacking using practical examples.
Prajwal Khante
I have been learning from this course since last 2 months and it has been amazing journey. Placement support is one of the best in the world. Mentor is very helpful in nature and assists whenever needed.
Samar Juneja
Being a professional and working in MNC has been possible only because of this course. Totally recommended if you want to land a job as an ethical hacker.