● Understand the fundamentals of ethical hacking, including the roles of red teams and blue teams, and the legal and ethical considerations involved.
● Gain knowledge of information security controls, types of security controls, and the CIA triad (Confidentiality, Integrity, and Availability).
● Learn about different types of hackers, attacks, and hacking phases, including network attacks, phishing, social engineering, physical attacks, and wireless attacks.
● Develop an understanding of computer networking concepts, including IP addresses, NAT, ports, services, protocols, OSI and TCP/IP models, DNS, and firewalls.
● Explore anonymity tools and techniques, such as VPNs, proxy servers, TOR, MAC address spoofing, and cookie management.
● Understand digital footprints and information gathering techniques, including people search, WHOIS, Google dorks, default passwords, and email tracking.
● Learn about vulnerability assessment and penetration testing (VAPT), including network scanning with Nmap, DNS lookup, OWASP, CVE, CWE, and patch management.
● Gain hands-on experience with web application security through hacking challenges involving SQL injection attacks and authentication bypass techniques.
● Study client-side attacks through practical hacking challenges covering XSS (Cross-Site Scripting), CSRF (Cross-Site Request Forgery), brute-force attacks, and forced browsing vulnerabilities.
● Explore steganography, keyloggers, password hacking, malware analysis, social engineering, wireless network attacks, mobile platform vulnerabilities.
● Learn penetration testing methodologies, exploitation techniques, post-exploitation techniques, and report writing.
● Understand the role of AI in cybersecurity, including threat detection, intrusion prevention, malware analysis, and future AI-driven cybersecurity trends.
Online
8 Weeks
IITM Pravartak Technologies Foundation
Technology Innovation Hub (TIH) of IIT Madras
and
Internshala
Rs.1349 (inclusive Tax)
Students must have completed 12th grade
● Knowledge of English language.
● Internet connectivity.
● Desktop/Laptop with a minimum 1 GB RAM and Windows 8 or later (64 bit).
Self paced (Suggested- 1 hr/day)
Jasmin Dawada
• Overview • Introduction to Ethical Hacking • Understanding Information Security Controls • Understanding Cybersecurity Threats • Basics of Cyber Security • Setting up Ethical Hacking Lab
• Steganography
• Keyloggers
• Hacking & Cracking
• Malware Creation
• Malware Detection & Removal
• Social Engineering Threats
• Preventing Social Engineering
• Mobile Security
• Mobile Malware
• Wifi Terminologies & Attack Vectors
• Wifi Security Audit & Pen Testing
• Basics of Pen Testing
• Exploitation
• Reporting & Legalities of Pen Testing
• Introduction to AI & its uses in Cyber Security
• The Future with AI