Ethical Hacking & Cyber Security Course by Sachin Govind Kadlag
Duration:4 months
Batch Type:Weekend and Weekdays
Languages:English, Hindi, Marathi
Class Type:Online and Offline
Address:Sangamner College, Nashik
Course Fee:
Course Content
The Ethical Hacking and Cyber Security course is a structured online program designed to introduce learners to modern cyber threats, ethical hacking techniques, and defensive security practices. This course helps students understand how hackers exploit systems and how organizations secure networks, applications, and data using ethical and legal methods.
Learners are trained in network security, web application security, Kali Linux tools, OWASP Top 10 vulnerabilities, and Vulnerability Assessment and Penetration Testing (VAPT). The course includes practical exposure to information gathering, password attacks, SQL injection, phishing concepts, wireless security, and bug bounty basics. With a strong focus on real-world scenarios, reporting, and compliance, this program prepares students for entry-level cybersecurity roles and certification-oriented learning paths such as CEH.
What Students Will Learn: Cyber Security & Ethical Hacking – Detailed Course Content
M1: Introduction & Basics (Week 1 – 5 Hours)
• Introduction to Hackers: Types of hackers (White, Black, Grey), hacker mindset, ethics and legality.
• Email Security: Email threats, phishing basics, spoofing, and protection mechanisms.
• Location Tracking: IP tracking, geolocation concepts, limitations and privacy concerns.
• Network Basics: OSI & TCP/IP models, network types, protocols, IP addressing.
• Types of Domains: TLD, ccTLD, gTLD, DNS working.
• Sending Fake Emails: Conceptual understanding of email spoofing (educational purpose).
M2: Password & Network Attacks (Week 2 – 5 Hours)
• Password Cracking: Brute force, dictionary attacks, hashing concepts.
• Port Scanning: TCP/UDP scans, open/closed ports, scanning tools.
• Steganography & Cryptography: Data hiding techniques and basic encryption concepts.
• Sniffing, Types of Sniffers & Call Spoofing: Packet sniffing basics, VoIP spoofing concepts.
M3: Information Gathering & Google Hacking (Week 3 – 5 Hours)
• Types of Google Dorks: Advanced Google search operators.
• Website Hacking Using Google Dorks: Footprinting and reconnaissance.
• Introduction to Kali Linux: Kali OS overview and usage.
• DoS & DDoS Attacks: Types, impact, and prevention.
• Techniques of Basic Information Gathering: WHOIS, DNS lookup, footprinting tools.
M4: Web & Kali Linux Fundamentals (Week 4 – 5 Hours)
• Basic SQL Injection + Advanced Concepts: Error-based, union-based, blind SQLi.
• Kali Linux – Basic Commands: File handling, networking, permissions.
• Kali Linux – Pre-installed Tools: Nmap, Nikto, SQLMap introduction.
M5: System & Application Attacks (Week 5 – 5 Hours)
• Phishing: Attack lifecycle, tools, defense strategies.
• Honeypot: Types of honeypots and detection.
• Android Hacking: Mobile threats, malware concepts.
• Windows Hacking: System vulnerabilities, password attacks.
• VAPT Introduction: Vulnerability Assessment vs Penetration Testing.
• Types of Website Scanners: Automated scanning tools overview.
M6: Web Application Testing Tools (Week 6 – 5 Hours)
• Use of Automated Tools: Advantages and limitations.
• Burp Suite: Proxy, repeater, intruder, scanner usage.
• Website Enumeration: Directory brute-forcing, subdomain discovery.
M7: OWASP Top 10 (Week 7–9 – 15 Hours)
• Detailed study of OWASP Top 10 vulnerabilities:
Injection, Broken Authentication, Sensitive Data Exposure,
XML External Entities, Broken Access Control,
Security Misconfiguration, XSS, Insecure Deserialization,
Using Components with Known Vulnerabilities, Insufficient Logging & Monitoring.
M8: Advanced Web & Wireless Security (Week 10 – 5 Hours)
• Website Advanced Bugs: Business logic flaws, authentication bypass.
• Wireless Security: WEP, WPA, WPA2 attacks and mitigation.
• Deleted Data Recovery: Forensics basics and recovery tools.
M9: Reporting & Documentation (Week 11 – 5 Hours)
• VAPT Reporting: Risk rating, executive summary, technical report writing.
• Compliance and best practices in reporting.
M10: Advanced Kali & Bug Bounty (Week 12 – 5 Hours)
• Advanced Concepts in Kali Linux.
• Case Study on Web VAPT.
• Introduction to Bug Bounty.
• Capture The Flag (CTF): Hands-on practical challenges.
M11: Network Security & Exploitation (Week 13 – 5 Hours)
• Network Security Fundamentals.
• Metasploit Framework: Exploitation basics, payloads.
• Exploit Writing Introduction.
• Network VAPT Reporting.
M12: Firewalls & Network VAPT (Week 14 – 5 Hours)
• Introduction to Firewalls: Types, architecture.
• Writing Protocols & Rules.
• Case Study on Network VAPT.
Teaching Method:
Mode: Online live sessions with structured, module-wise coverage
Concept-first teaching followed by practical demonstrations
Hands-on tool exposure using Kali Linux and security tools
Real-world attack and defense scenarios explained ethically
Step-by-step learning progression from basics to advanced topics
Case studies and practical examples for better understanding
Focus on OWASP Top 10 and VAPT workflows
Guidance on professional reporting and documentation
Interactive learning with Q&A and doubt clarification
Why This Tutor:
Sachin Govind Kadlag follows a structured, security-focused teaching approach, emphasizing ethical practices, conceptual clarity, and real-world relevance. The course content is aligned with industry practices and certification-oriented learning paths without making exaggerated claims.
Benefits and Outcomes:
Strong foundation in ethical hacking and cyber security
Hands-on exposure to industry-standard tools and techniques
Clear understanding of web and network vulnerabilities
Practical knowledge of Kali Linux and penetration testing workflows
Readiness for entry-level cybersecurity and VAPT roles
Improved awareness of cyber threats and defensive strategies
Structured learning aligned with CEH and similar certifications
Flexible online learning suitable for students and professionals
Skills
Kali Linux, Ceh (certified Ethical Hacker V9), Cyber Security, Ethical Hacking, Owasp Top 10, Web Application Penetration Testing, Web Application Security, Network Security, Ethical Hacking
Tutor
0.0 Average Ratings
0 Reviews
5 Years Experience
jawale kadlag






