Learn live Hacking

Our main value is to teach the valuable course of Hacking by online Live Classes including the latest technologies.
If you still have any doubts then fill this form to receive a call by our side.

Cybersecurity Training Calendar

Open
Course Name Start Date End Date Start/End Time Batch Type Training Mode Certificate Batch Status
Cyberminars Cybersecurity Expert 15th December 2023 20th January 2024 - (IST) Daily Classes Online yes Open Enroll
Cyberminars Bug Hunting Expert 15th December 2023 15th January 2024 - (IST) Daily Classes Online yes Open Enroll Check Module

             Module - Cyberminars Cybersecurity Expert

Introduction to Cyber security :

  • What is cyber Security
  • Need of cyber security
  • Common Terminologies
  • Various types of Hackers
  • Hacking phases
  • Reconnaissence
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Clearing Records
  • Career and growth
  • Hacking as a career
  • Domains of cyber security
  • Jobs opportunities
  • How to become an Ethical Hacker [My Secret Way]
  • Introduction to Linux OS & its
  • importance in Ethical Hacking
  • Introduction to Virtual Machines (VMware & VirtualBox)& Kali Linux
  • Live OS, Dual Boot & Vmware
  • Dark web, Deep web and Tor Websites

Basics Of Networking:

  • OSI Model
  • TCP/IP Model
  • Networking Devices
  • Hubs
  • Bridges
  • Switches
  • Routers
  • Firewalls
  • WAP’s
  • Protocols
  • Concept of 3-Way Handshake [SYN / ACK / FIN]
  • Concept of DNS & its Working
  • Concept of Packets & Traceroute
  • Concept of TCP / UDP / ICMP
  • Some more Concepts...

Kali Linux:

  • Introduction to Kali Linux [Detailed]
  • Configuring Kali default repository
  • Learning commands like vi, nano, vim, touch, cat, who, head, tail & more...
  • Learning Users, Groups, Shadow, Passswd & more Kali commands
  • Permissions in Linux [Read, Write & Execute]
  • File sharing between Kali [in VMware] & Windows using 3 different methods
  • Learning about various Kali Important tools
  • Kali Linux Advanced
  • More Kali Practicals & Practices

Footprinting:

  • Footprinting using search engine
  • Footprinting using  SHODAN
  • Footprinting using WHOIS
  • Footprinting using Dns queries
  • Footprinting using Utilities
  • Footprinting using Command line utilities
  • Footprinting using tools
  • Call Spoofing
  • Email Tracking
  • More Reconnaissance Topics & Practicals
  • Footprinting Individuals
  • Becoming Anonymous Using Tor [ IP Hiding ]
  • More Anonymity Topics & Practical

Network Scanning:

  • Introduction
  • Types of Scanning
  • Objectives of Scanning Techniques
  • Scanning for Live Single Systems
  • Scanning for Live Multiple Systems
  • Scanning for Open Ports
  • Port Scanning Techniques
  • TCP connect Open Scan \ Half Open
  • Scan
  • FIN scan
  • Null scan
  • Xmas Tree scan
  • Ftp bounce scan ,
  • UDP Scan
  • Understanding Vulnerability, Exploit & Payload
  • Open Ports, Service Name & versions

Wireless Hacking:

  • Deauthentication Attacks
  • WPA /WPA2 Cracking
  • Usage of various tools
  • Unmasking Hidden SSID
  • Dictionary Attack
  • Bruteforce Attack
  • Hybrid Attack

System Hacking:

  • Windows Hacking 
  • Linux Hacking
  • Ubuntu Hacking
  • Exploitation(Hacking Systems)
  • Usage of Metasploit
  • Payloads
  • Encoders
  • Auxillaries
  • Exploits
  • Uploading a Backdoor
  • Reverse Listeners
  • Generation Malware
  • Malware Delivery methods
  • Post Exploitation
  • Rainbow Attack
  • Stealing SAM Databse

Pentesting:

  • Nmap
  • Network Discovery
  • Vulnerability detection
  • Backdoor detection
  • Vulnerability exploitation
  • Aggressive Scan
  • Wireshark
  • Analysing Packets
  • Analysing SSH/DNS/HTTP + Other Protocols
  • Password Hacking
  • Intrusion Detection Systems(IDS)
  • How does the IDS work
  • What is the Function Of IDS
  • Intrusion Prevention Systems(IPS)
  • How does the IPS work
  • What is the Function Of IPS
  • Report Writing

Malwares-

  • Virus
  • worms
  • bot
  • Trojans
  • Ransomware
  • Rootkit
  • Keyloggers
  • Browser Keyloggers

Human Hacking:

  • Why social engineering is master of all other attacks
  • Types of Social Engineering Attack
  • Human & Computer Based social engineering attacks
  • Identity Theft
  • Social Engineering using Android Lost
  • Email Spoofing/Fake Mail
  • Hiding malicious links in Email
  • Introduction to Phishing
  • Phishing Techniques
  • Phishing Campaign with Lucy Security
  • Social Engineering Countermeasures
  • More Social Engineering topics & practical's
  • Information Gathering

WEBSITE HACKING:

  • Introduction to WAPT / Bug Bounty / Penetration Testing
  • Introduction to Burpsuite
  • LFI
  • RFI
  • Authentication Bypass
  • No Rate Limit Attacks
  • Xss
  • Writing Reports
  • More Bug Bounty Topics & Practicals
  • Screenshots Of Subdomains
  • Directory Bruteforcing
  • MCQ Exam  2:15 Hours
  • Certificate After Exam