Program Description

●    Understand the fundamentals of ethical hacking, including the roles of red teams and blue teams, and the legal and ethical considerations involved.
 
●    Gain knowledge of information security controls, types of security controls, and the CIA triad (Confidentiality, Integrity, and Availability). 
 
●    Learn about different types of hackers, attacks, and hacking phases, including network attacks, phishing, social engineering, physical attacks, and wireless attacks.
 
●    Develop an understanding of computer networking concepts, including IP addresses, NAT, ports, services, protocols, OSI and TCP/IP models, DNS, and firewalls.
 
●    Explore anonymity tools and techniques, such as VPNs, proxy servers, TOR, MAC address spoofing, and cookie management.

●    Understand digital footprints and information gathering techniques, including people search, WHOIS, Google dorks, default passwords, and email tracking.

●    Learn about vulnerability assessment and penetration testing (VAPT), including network scanning with Nmap, DNS lookup, OWASP, CVE, CWE, and patch management.
 
●    Gain hands-on experience with web application security through hacking challenges involving SQL injection attacks and authentication bypass techniques.

●    Study client-side attacks through practical hacking challenges covering XSS (Cross-Site Scripting), CSRF (Cross-Site Request Forgery), brute-force attacks, and forced browsing vulnerabilities.
 
●    Explore steganography, keyloggers, password hacking, malware analysis, social engineering, wireless network attacks, mobile platform vulnerabilities.
 
●    Learn penetration testing methodologies, exploitation techniques, post-exploitation techniques, and report writing.
 
●    Understand the role of AI in cybersecurity, including threat detection, intrusion prevention, malware analysis, and future AI-driven cybersecurity trends.

Key Highlights

check svg

Certification of completion from Internshala.

check svg

Government approved certificate from NSDC (National Skill Development Corporation) & Skill India.

check svg

Downloadable content with lifetime access.

check svg

24*7 doubt solving forum.

check svg

Free access to ‘Internship and Job Preparation’ training.

check svg

Hand picked internships & jobs curated as per your preference in your inbox every week.

check svg

Get highlighted on Internshala and a badge of achievement in your Internshala account if you score above 90% in your final test. This badge will be shown to the employers when you apply to internships

Learning Format

Online

Duration

8 Weeks

Certified by

IITM Pravartak Technologies Foundation
Technology Innovation Hub (TIH) of IIT Madras and
Internshala

Program Fee

Rs.1349 (inclusive Tax)

Education Qualification

Students must have completed 12th grade

Suggested Prerequisites

●    Knowledge of English language.
●    Internet connectivity.
●    Desktop/Laptop with a minimum 1 GB RAM and Windows 8 or later (64 bit).

Teaching Hours

Self paced (Suggested- 1 hr/day)

Lead Faculty

Jasmin Dawada

Learning Module

• Overview • Introduction to Ethical Hacking • Understanding Information Security Controls • Understanding Cybersecurity Threats • Basics of Cyber Security • Setting up Ethical Hacking Lab

•    Basics of Networking
•    IP Address & NAT
•    Ports & Services
•    Protocols, OSI and TCP/IP Model
•    Understanding & Using Anonimity Tools

•    Passive Information Gathering
•    Active Information Gathering & Recconaissance

•    Basics of Vulnerability Assessment
•    Existing Vulnerability Research
•    Using Vulnerability Assessment Tools

•    Understanding SQL
•    Basic SQL Injections
•    Advanced SQL Injections

•    Understanding Client Side Attacks
•    XSS & CSRF
•    Attack Vectors

•    Steganography
•    Keyloggers
•    Hacking & Cracking

•    Malware Creation
•    Malware Detection & Removal

•    Social Engineering Threats
•    Preventing Social Engineering

•    Mobile Security
•    Mobile Malware

•    Wifi Terminologies & Attack Vectors
•    Wifi Security Audit & Pen Testing

•    Basics of Pen Testing
•    Exploitation
•    Reporting & Legalities of Pen Testing

•    Introduction to AI & its uses in Cyber Security
•    The Future with AI



Are you interested in this program?

Our Learning Partners

Want To Know More

Guiding Star with Our Help!

Contact Us