Ethical Hacking & Cyber Security Course by Sachin Govind Kadlag

DurationDuration:4 months

Batch TypeBatch Type:Weekend and Weekdays

LanguagesLanguages:English, Hindi, Marathi

Class TypeClass Type:Online and Offline

Class TypeAddress:Sangamner College, Nashik

Class Type Course Fee:

₹20,000.00Full Course

Course Content

The Ethical Hacking and Cyber Security course is a structured online program designed to introduce learners to modern cyber threats, ethical hacking techniques, and defensive security practices. This course helps students understand how hackers exploit systems and how organizations secure networks, applications, and data using ethical and legal methods.

Learners are trained in network security, web application security, Kali Linux tools, OWASP Top 10 vulnerabilities, and Vulnerability Assessment and Penetration Testing (VAPT). The course includes practical exposure to information gathering, password attacks, SQL injection, phishing concepts, wireless security, and bug bounty basics. With a strong focus on real-world scenarios, reporting, and compliance, this program prepares students for entry-level cybersecurity roles and certification-oriented learning paths such as CEH.

What Students Will Learn: Cyber Security & Ethical Hacking – Detailed Course Content

M1: Introduction & Basics (Week 1 – 5 Hours)

• Introduction to Hackers: Types of hackers (White, Black, Grey), hacker mindset, ethics and legality.
• Email Security: Email threats, phishing basics, spoofing, and protection mechanisms.
• Location Tracking: IP tracking, geolocation concepts, limitations and privacy concerns.
• Network Basics: OSI & TCP/IP models, network types, protocols, IP addressing.
• Types of Domains: TLD, ccTLD, gTLD, DNS working.
• Sending Fake Emails: Conceptual understanding of email spoofing (educational purpose).

M2: Password & Network Attacks (Week 2 – 5 Hours)

• Password Cracking: Brute force, dictionary attacks, hashing concepts.
• Port Scanning: TCP/UDP scans, open/closed ports, scanning tools.
• Steganography & Cryptography: Data hiding techniques and basic encryption concepts.
• Sniffing, Types of Sniffers & Call Spoofing: Packet sniffing basics, VoIP spoofing concepts.

M3: Information Gathering & Google Hacking (Week 3 – 5 Hours)

• Types of Google Dorks: Advanced Google search operators.
• Website Hacking Using Google Dorks: Footprinting and reconnaissance.
• Introduction to Kali Linux: Kali OS overview and usage.
• DoS & DDoS Attacks: Types, impact, and prevention.
• Techniques of Basic Information Gathering: WHOIS, DNS lookup, footprinting tools.

M4: Web & Kali Linux Fundamentals (Week 4 – 5 Hours)

• Basic SQL Injection + Advanced Concepts: Error-based, union-based, blind SQLi.
• Kali Linux – Basic Commands: File handling, networking, permissions.
• Kali Linux – Pre-installed Tools: Nmap, Nikto, SQLMap introduction.

M5: System & Application Attacks (Week 5 – 5 Hours)

• Phishing: Attack lifecycle, tools, defense strategies.
• Honeypot: Types of honeypots and detection.
• Android Hacking: Mobile threats, malware concepts.
• Windows Hacking: System vulnerabilities, password attacks.
• VAPT Introduction: Vulnerability Assessment vs Penetration Testing.
• Types of Website Scanners: Automated scanning tools overview.

M6: Web Application Testing Tools (Week 6 – 5 Hours)

• Use of Automated Tools: Advantages and limitations.
• Burp Suite: Proxy, repeater, intruder, scanner usage.
• Website Enumeration: Directory brute-forcing, subdomain discovery.

M7: OWASP Top 10 (Week 7–9 – 15 Hours)

• Detailed study of OWASP Top 10 vulnerabilities:
  Injection, Broken Authentication, Sensitive Data Exposure,
  XML External Entities, Broken Access Control,
  Security Misconfiguration, XSS, Insecure Deserialization,
  Using Components with Known Vulnerabilities, Insufficient Logging & Monitoring.

M8: Advanced Web & Wireless Security (Week 10 – 5 Hours)

• Website Advanced Bugs: Business logic flaws, authentication bypass.
• Wireless Security: WEP, WPA, WPA2 attacks and mitigation.
• Deleted Data Recovery: Forensics basics and recovery tools.

M9: Reporting & Documentation (Week 11 – 5 Hours)

• VAPT Reporting: Risk rating, executive summary, technical report writing.
• Compliance and best practices in reporting.

M10: Advanced Kali & Bug Bounty (Week 12 – 5 Hours)

• Advanced Concepts in Kali Linux.
• Case Study on Web VAPT.
• Introduction to Bug Bounty.
• Capture The Flag (CTF): Hands-on practical challenges.

M11: Network Security & Exploitation (Week 13 – 5 Hours)

• Network Security Fundamentals.
• Metasploit Framework: Exploitation basics, payloads.
• Exploit Writing Introduction.
• Network VAPT Reporting.

M12: Firewalls & Network VAPT (Week 14 – 5 Hours)

• Introduction to Firewalls: Types, architecture.
• Writing Protocols & Rules.
• Case Study on Network VAPT.

Teaching Method:

Mode: Online live sessions with structured, module-wise coverage

  • Concept-first teaching followed by practical demonstrations

  • Hands-on tool exposure using Kali Linux and security tools

  • Real-world attack and defense scenarios explained ethically

  • Step-by-step learning progression from basics to advanced topics

  • Case studies and practical examples for better understanding

  • Focus on OWASP Top 10 and VAPT workflows

  • Guidance on professional reporting and documentation

  • Interactive learning with Q&A and doubt clarification

Why This Tutor:

Sachin Govind Kadlag follows a structured, security-focused teaching approach, emphasizing ethical practices, conceptual clarity, and real-world relevance. The course content is aligned with industry practices and certification-oriented learning paths without making exaggerated claims.

Benefits and Outcomes:

  • Strong foundation in ethical hacking and cyber security

  • Hands-on exposure to industry-standard tools and techniques

  • Clear understanding of web and network vulnerabilities

  • Practical knowledge of Kali Linux and penetration testing workflows

  • Readiness for entry-level cybersecurity and VAPT roles

  • Improved awareness of cyber threats and defensive strategies

  • Structured learning aligned with CEH and similar certifications

  • Flexible online learning suitable for students and professionals

Skills

Kali Linux, Ceh (certified Ethical Hacker V9), Cyber Security, Ethical Hacking, Owasp Top 10, Web Application Penetration Testing, Web Application Security, Network Security, Ethical Hacking

Tutor

0.0 Average Ratings

0 Reviews

5 Years Experience

jawale kadlag

Students Rating

0.0

Course Rating

Blogs

Explore All
arrow
arrow