
Cyber security - P Karthik Kumar
by P KARTHIK KUMAR
Experience: 4 Yrs
Module 1: Introduction to Cybersecurity & Ethical HackingUnderstanding Cybersecurity FundamentalsTypes of Cyber Attacks...
Read More →
by P KARTHIK KUMAR
Experience: 4 Yrs
Module 1: Introduction to Cybersecurity & Ethical HackingUnderstanding Cybersecurity FundamentalsTypes of Cyber Attacks...
Read More →Online and Offline
3 months
Hindi, English, Telugu
Hyderabad
20000 INR Per Full Course
Weekdays and Weekend
4 Years
4.5 Years
Understanding Cybersecurity Fundamentals
Types of Cyber Attacks & Threat Landscape
Cyber Kill Chain Model
Ethical Hacking vs Malicious Hacking
Responsibilities of an Ethical Hacker
Career Roles in Cybersecurity
Linux Basics & Command Line
File System, Permissions & Environment Setup
Essential Pentesting Commands
Scripting Basics (Bash)
Installing & Using Kali Linux / Parrot OS
Network Utilities: nmap, netstat, tcpdump
OSINT Techniques
Whois, DNS Enumeration, Subdomain Discovery
Social Engineering Basics
Network Scanning Tools
Vulnerability Scanning (Nessus, OpenVAS)
System & Service Enumeration
Exploitation Techniques
Password Attacks (Hydra, John)
Web Application Exploits
Metasploit Framework
Backdoors & Persistence
Privilege Escalation
Log Clearing Techniques
Ethical Report Writing Practices
AWS Infrastructure & Shared Responsibility Model
Identity & Access Management (IAM)
Security Groups and NACL Configuration
Protecting EC2, S3, VPC
Cloud Monitoring Tools
Best Practices for Cloud Security
Android Architecture Basics
Mobile App Threats
Static & Dynamic Testing
API Testing for Mobile Apps
Mobile Malware Analysis
Tools: MobSF, Burp Suite, Frida
OWASP Top 10
SQL Injection, XSS, CSRF
Broken Authentication & Access Control
Insecure Direct Object References
Server Misconfigurations
Bug Bounty Methodology
IoT Architecture & Protocols
IoT Device Vulnerabilities
Firmware Extraction & Analysis
Smart Home Device Pentesting
Automotive IoT Security
Radio Frequency (RF) Attacks (BLE, NFC)
Fundamentals of Digital Forensics
Disk Imaging & Data Recovery
Email & Network Forensics
Memory Forensics
Mobile Forensics Tools
Evidence Collection & Chain of Custody
Capture the Flag (CTF) Exercises
Live Hacking Simulations
Web App & Mobile App Pentesting Projects
AWS Security Configuration Lab
Forensics Investigation Case Study
CEH, CHFI, OSCP, Security+ Roadmap
Resume Preparation for Cybersecurity Roles
Interview Questions & Practice
Industry Projects for Portfolio
P KARTHIK KUMAR
Experience: 4 Yrs
P KARTHIK KUMAR
Experience: 4 Yrs