Introduction to Cybersecurity
Lab setup and virtualization
Linux File System
Linux Directory Structure
Command Line Mastery
Backup, Restore, and Recovery
Manage User, Group and Privilages
Linux authentication & permission logic
Privilege escalation fundamentals
Managing Process and Services
Linux Networking Basics
shell scripting
Introduction of networking and communication
Client–Server Communication Basics
DNS Resolution Process
CDN & Modern Web Infrastructure
IPV 4 and IPV 6
Subnetting
OSI & TCP/IP Models
Network Security Protocols
Reconnaissance
Scanning
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial Of Service
Evading IDS ,Firewall and Honeypots
Hacking Web Servers
Hacking Web applications
Hacking Wireless Networks
Hacking Mobile Platforms
Cloud Security
Cryptography
Networking Security Fundamentals
Network Architecture and protocols
Linux concepts and Advance Commands
Bash Scripting
Passive Reconnaissance
Active reconnaissance
Vulnerability Assessments
Locating Public Exploits and fixing
Antivirus Evasion
File transfers
In depth Password Attacks
Windows Privilege Escalation
Linux Privilege Escalation
Pivoting
Active directory
Reporting and Documentation
Web application Pentesting
Introduction to Web Pentesting
Web Application Basics
OWASP 10
Web application Scanning and enumeration
Sql Injection
File Inclusion
Xss
CROSS-SITE REQUEST FORGERY (CSRF)
Web Application Firewall
File Upload
Host Header injection
JWT tokens Attack
Url Redirection
Http Request Smuggling
Reporting and Documentation
Variables and Data Types
Data Structures
Functions
Conditional Statements
Looping Concepts
Control Statements
OOPS
File Handling
Modules and Libraries
String Manipulation
Exception Handling
Introduction to Algorithms
Multithreading
python web dev