Curriculum
- 8 Sections
- 66 Lessons
- 8 Weeks
Expand all sectionsCollapse all sections
- Week 1Ethical Hacking & Advanced Reconnaissance6
- Week 2System Exploitation & Privilege Escalation7
- Week 3Web Application Security & Exploitation8
- 3.1Deep Dive into OWASP Top 10 Vulnerabilities
- 3.2SQL Injection (SQLi), Cross-Site Scripting (XSS)
- 3.3Local & Remote File Inclusion (LFI/RFI)
- 3.4XML External Entity (XXE) Injection
- 3.5Bypassing Web Application Firewalls (WAFs)
- 3.6API & Cloud Security Penetration Testing
- 3.7Broken Authentication & Session Management
- 3.8Cross-Site Request Forgery (CSRF)
- Week 4Network Security & Wireless Hacking9
- 4.1Network Penetration Testing
- 4.2Advanced Nmap & Nessus Scanning Techniques
- 4.3Exploiting SMB, RDP, and Network Protocols
- 4.4Wireless Security & Wi-Fi Hacking
- 4.5WPA2/WPA3 Exploitation, Evil Twin Attacks
- 4.6Capturing & Cracking WPA2 Handshakes
- 4.7Post-Exploitation & Privilege Escalation
- 4.8Bluetooth & RFID/NFC Exploitation
- 4.9DNS & DHCP Attacks
- Week 5IoT, Dark Web & Advanced Anonymity8
- Week 6Malware Analysis & Digital Forensics8
- 6.1Static vs. Dynamic Malware Analysis
- 6.2Memory Forensics & Threat Hunting
- 6.3Sandboxing & Behavioral Analysis
- 6.4Reverse Engineering Ransomware
- 6.5Log Analysis & SIEM (Security Information & Event Management)
- 6.6Digital Forensics Techniques
- 6.7Advanced Threat Detection & Response
- 6.8IoT & Cloud Forensics
- Week 7Red Teaming & Advanced Exploitation10
- 7.1Red Team vs. Blue Team Methodologies
- 7.2Initial Access & Reconnaissance
- 7.3Active Directory Exploitation & Lateral Movement
- 7.4Bypassing AVs & EDRs (Endpoint Detection & Response)
- 7.5Post-Exploitation Techniques & Data Exfiltration
- 7.6Privilege Escalation Techniques
- 7.7C2 (Command & Control) Infrastructure
- 7.8Web & Cloud Exploitation in Red Teaming
- 7.9Physical & Wireless Red Teaming
- 7.10Advanced Threat Simulation & Reporting
- Week 8Final Project, CTF Challenge & Reporting10
- 8.1Real-World Penetration Testing Project
- 8.2Live Capture The Flag (CTF) Challenge
- 8.3Professional Penetration Testing Report Writing
- 8.4Red Team vs. Blue Team Final Exercise
- 8.5Advanced Cybersecurity Research & Tool Development
- 8.6Cyber Range & Adversary Emulation Labs
- 8.7Security Certifications & Career Guidance
- 8.8Bug Bounty & Responsible Disclosure Programs
- 8.9Ethical Hacking & Security Community Engagement
- 8.10Final Cybersecurity Capstone Project & Presentation
Ethical Hacking & Security Community Engagement
Prev