find my guru logo
  • List Your Courses
  • FAQ
  • Blogs
  • Sign In
mobile nav open
Font My Guru logo
  • connect with us on facebook
  • connect with us on instagram
  • connect with us on linkedin
  • connect with us on X
  • connect with us on youtube

Quick Links

  • Home
  • About Us
  • Contact Us

Top 4 Category

  • Terms & Conditions
  • Privacy Policy

Support

  • FAQs for Students
  • FAQs for Trainers / Institutes
  • Investor Connect
Disclaimer: All the course names, logos, and certification titles we use are their respective owners' property. The firm, service, or product names on the website are solely for identification purposes. We do not own, endorse or have the copyright of any brand/logo/name in any manner. Few graphics on our website are freely available on public domains.

©️ 2025 Findmyguru.com | All Rights Reserved. A Brand of TutorKhoj Private Limited

Cyber security - P Karthik Kumar

DurationDuration:3 months

Batch TypeBatch Type:Weekend and Weekdays

LanguagesLanguages:English, Hindi, Telugu

Class TypeClass Type:Online and Offline

Class TypeAddress:Hyderabad, Hyderabad

Class Type Course Fee:

₹20,000.00Full Course

share

Course Content

Module 1: Introduction to Cybersecurity & Ethical Hacking

  • Understanding Cybersecurity Fundamentals

  • Types of Cyber Attacks & Threat Landscape

  • Cyber Kill Chain Model

  • Ethical Hacking vs Malicious Hacking

  • Responsibilities of an Ethical Hacker

  • Career Roles in Cybersecurity


🐧 Module 2: Linux for Hackers

  • Linux Basics & Command Line

  • File System, Permissions & Environment Setup

  • Essential Pentesting Commands

  • Scripting Basics (Bash)

  • Installing & Using Kali Linux / Parrot OS

  • Network Utilities: nmap, netstat, tcpdump


💉 Module 3: Penetration Testing – Complete Framework

3.1 Information Gathering & Footprinting

  • OSINT Techniques

  • Whois, DNS Enumeration, Subdomain Discovery

  • Social Engineering Basics

3.2 Scanning & Enumeration

  • Network Scanning Tools

  • Vulnerability Scanning (Nessus, OpenVAS)

  • System & Service Enumeration

3.3 Gaining Access

  • Exploitation Techniques

  • Password Attacks (Hydra, John)

  • Web Application Exploits

  • Metasploit Framework

3.4 Maintaining Access

  • Backdoors & Persistence

  • Privilege Escalation

3.5 Clearing Tracks & Reporting

  • Log Clearing Techniques

  • Ethical Report Writing Practices


☁️ Module 4: AWS Security Groups & Cloud Security

  • AWS Infrastructure & Shared Responsibility Model

  • Identity & Access Management (IAM)

  • Security Groups and NACL Configuration

  • Protecting EC2, S3, VPC

  • Cloud Monitoring Tools

  • Best Practices for Cloud Security


📱 Module 5: Mobile Application Penetration Testing

  • Android Architecture Basics

  • Mobile App Threats

  • Static & Dynamic Testing

  • API Testing for Mobile Apps

  • Mobile Malware Analysis

  • Tools: MobSF, Burp Suite, Frida


🌐 Module 6: Web Application Ethical Hacking

  • OWASP Top 10

  • SQL Injection, XSS, CSRF

  • Broken Authentication & Access Control

  • Insecure Direct Object References

  • Server Misconfigurations

  • Bug Bounty Methodology


🤖 Module 7: IoT Ethical Hacking & Security

  • IoT Architecture & Protocols

  • IoT Device Vulnerabilities

  • Firmware Extraction & Analysis

  • Smart Home Device Pentesting

  • Automotive IoT Security

  • Radio Frequency (RF) Attacks (BLE, NFC)


🕵️ Module 8: Cyber Forensics & Investigation

  • Fundamentals of Digital Forensics

  • Disk Imaging & Data Recovery

  • Email & Network Forensics

  • Memory Forensics

  • Mobile Forensics Tools

  • Evidence Collection & Chain of Custody


🧪 Module 9: Hands-on Labs & Real-World Projects

  • Capture the Flag (CTF) Exercises

  • Live Hacking Simulations

  • Web App & Mobile App Pentesting Projects

  • AWS Security Configuration Lab

  • Forensics Investigation Case Study


📝 Module 10: Certification & Career Preparation

  • CEH, CHFI, OSCP, Security+ Roadmap

  • Resume Preparation for Cybersecurity Roles

  • Interview Questions & Practice

  • Industry Projects for Portfolio

Skills

Cyber Forensics, Iot, Mobile Testing, Aws Security Groups, Penetration Testing, Networking, Ethical Hacking, Linux

Tutor

P KARTHIK KUMAR Profile Pic
P KARTHIK KUMAR

0.0 Average Ratings

0 Reviews

4 Years Experience

hyderabad

Students Rating

0.0

Course Rating

Related Courses

Explore All
arrow
Linux

IT Courses

0.0 Stars Rating0.0

Online/Offline

Linux

Course Duration Duration: 90 hours

By Mahesh Muthusamy

Details
CYBERSECURITY TRAINING

IT Courses

0.0 Stars Rating0.0

Online

CYBERSECURITY TRAINING

Course Duration Duration: 45 days

By PNR EDU

Details
Cyber Security

IT Courses

0.0 Stars Rating0.0

Online

Cyber Security

Course Duration Duration: 20 days

By Pawan Kumar Mahawar

Details
CyberSecurity

IT Courses

0.0 Stars Rating0.0

Online

CyberSecurity

Course Duration Duration: 4 months

By TaskHiveSea

Details
arrow

Blogs

Explore All
arrow
How I Got ₹12 LPA as a Fresher Full Stack Developer in 2025?

How I Got ₹12 LPA as a Fresher Full Stack Developer in 2025?

Discover how I went from a beginner to earning ₹12 LPA as a fresher Full Stack Developer in 2025. Learn the key skills, roadmap, and real-world projects that helped me succeed — and how FindMyGuru’s mentorship turned my career dreams into reality.

Blog updated date

11 Aug 25

arrow