Cyber Security

Explore the dynamic world of cybersecurity with our program, gaining essential skills, certifications, and experience for a rewarding career.

4.9/5

Course Rating

Start Your Learning Journey Now!


2-3 Months

Program Duration

Certifications

2

Industrial Projects

4-6

Internship Partners

100+

Quiz/ Assignments

Lifetime

Program Access

Program Curriculum

Introduction to Cybersecurity

  • Definition, Importance, and Scope of Cybersecurity
  • Types of Cyber Threats (Malware, Phishing, DDoS, Ransomware, Insider Threats)
  • CIA Triad (Confidentiality, Integrity, Availability)
  • Cybersecurity Ethics, Principles, and Best Practices

Module 2: Introduction to Linux 

  • Basic Linux Commands
  • Networking Commands (ping, netstat, ifconfig, traceroute)
  • Service and Log Management
  • System Administration Commands
  • Linux File System and Directories

Module 3: Introduction to Windows 

  • Access Control Types, Permissions, and User Account Control (UAC)
  • Windows Firewall & Windows Defender
  • Windows Remote Management (RDP)
  • Basic CMD Commands and Batch Scripting
  • Introduction to PowerShell
  • Using CMD & PowerShell for System Administration and Security Tasks

Introduction to Networking 

  • Types of Networks (LAN, WAN, VPN, etc.)
  • Network Topologies
  • Network Protocols & Ports (TCP/IP, HTTP, HTTPS, DNS)
  • IP Addressing & Subnetting Basics
  • Firewalls and Basic Configuration

Ethical Hacking Essentials

  • Footprinting, Reconnaissance, and Enumeration
  • Vulnerability Assessment & Reporting
  • System Hacking: Windows and Linux
  • Password Cracking & Hashing
  • Wireshark and Network Testing
  • Wireless Network Hacking
  • Digital Forensics Basics
  • Cloud Security Overview (AWS / Azure)
  • TOR, Anonymity & Proxy Services

Web Application Security Fundamentals

  • Introduction to Web Hacking
  • Understanding HTTP/S and Web Requests
  • Introduction to Burp Suite
  • Fuzzing and Directory Enumeration
  • Subdomain Enumeration
  • Authentication Bypass Technique

Exploitation & OWASP Top 10 (2 Hours)

  • File Inclusion Vulnerabilities (LFI/RFI)
  • File Upload Vulnerabilities
  • Cross-Site Scripting (XSS)
  • Command Injection
  • SQL Injection
  • Overview of OWASP Top 10  and Mitigation

SOC and SIEM Fundamentals

  • Introduction to Security Operations Center (SOC)
  • Understanding SIEM (Security Information and Event Management)
  • Tools Overview: Splunk, ELK Stack, Wazuh
  • IDS, Firewalls, and Honeypot Configuration
  • Monitoring and Alert Management
  • Documenting & Reporting Security Incidents

Red/Blue/Purple Team Exercises & Offensive Penetration Testing 

  • Red Team (Offensive Testing)
  • Blue Team (Defensive Response & Monitoring)
  • Purple Team (Collaboration & Continuous Improvement)
  • Offensive Penetration Testing
  • Attacking Real-World Vulnerable Services
  • Web Application Vulnerability Testing
  • Anonymity, Dark Web, and Secure Communication

Security Checklists for Auditing & Testing

  • Linux Terminal & Windows PowerShell
  • Wireshark – Network analysis
  • Nmap – Port and vulnerability scanning
  • Metasploit Framework – Penetration testing
  • Burp Suite / OWASP ZAP – Web app testing
  • DVWA – Vulnerable web app lab
  • Splunk / Wazuh – SIEM monitoring
  • Hashcat / Aircrack-ng – Password and wireless testing

Certificates

Select the Best Plan for Your Growth

Choose the plan that suits your learning needs and start your journey with ShikshaVertex today. Tailored options for every goal and budget.

Self Paced

Learn at your own pace

₹ 5,999

Mentor Led

Guided learning with mentor support

₹ 8,999

Professional

Be placement ready

₹ 13,999

Earn credentials from IBM — give the exam, get certified, and stand out.

Master the language of the web with IBM’s globally recognized certification

What You’ll Get:

Price : ₹3000

Our Alumni Works At

Our learners have turned their skills into success, now thriving at top companies worldwide.
Scroll to Top