Curriculum
- 8 Sections
- 66 Lessons
- 8 Weeks
Expand all sectionsCollapse all sections
- Week 1Ethical Hacking & Advanced Reconnaissance6
- Week 2System Exploitation & Privilege Escalation7
- Week 3Web Application Security & Exploitation8
- 3.0Deep Dive into OWASP Top 10 Vulnerabilities
- 3.1SQL Injection (SQLi), Cross-Site Scripting (XSS)
- 3.2Local & Remote File Inclusion (LFI/RFI)
- 3.3XML External Entity (XXE) Injection
- 3.4Bypassing Web Application Firewalls (WAFs)
- 3.5API & Cloud Security Penetration Testing
- 3.6Broken Authentication & Session Management
- 3.7Cross-Site Request Forgery (CSRF)
- Week 4Network Security & Wireless Hacking9
- 4.0Network Penetration Testing
- 4.1Advanced Nmap & Nessus Scanning Techniques
- 4.2Exploiting SMB, RDP, and Network Protocols
- 4.3Wireless Security & Wi-Fi Hacking
- 4.4WPA2/WPA3 Exploitation, Evil Twin Attacks
- 4.5Capturing & Cracking WPA2 Handshakes
- 4.6Post-Exploitation & Privilege Escalation
- 4.7Bluetooth & RFID/NFC Exploitation
- 4.8DNS & DHCP Attacks
- Week 5IoT, Dark Web & Advanced Anonymity8
- Week 6Malware Analysis & Digital Forensics8
- 6.0Static vs. Dynamic Malware Analysis
- 6.1Memory Forensics & Threat Hunting
- 6.2Sandboxing & Behavioral Analysis
- 6.3Reverse Engineering Ransomware
- 6.4Log Analysis & SIEM (Security Information & Event Management)
- 6.5Digital Forensics Techniques
- 6.6Advanced Threat Detection & Response
- 6.7IoT & Cloud Forensics
- Week 7Red Teaming & Advanced Exploitation10
- 7.0Red Team vs. Blue Team Methodologies
- 7.1Initial Access & Reconnaissance
- 7.2Active Directory Exploitation & Lateral Movement
- 7.3Bypassing AVs & EDRs (Endpoint Detection & Response)
- 7.4Post-Exploitation Techniques & Data Exfiltration
- 7.5Privilege Escalation Techniques
- 7.6C2 (Command & Control) Infrastructure
- 7.7Web & Cloud Exploitation in Red Teaming
- 7.8Physical & Wireless Red Teaming
- 7.9Advanced Threat Simulation & Reporting
- Week 8Final Project, CTF Challenge & Reporting10
- 8.0Real-World Penetration Testing Project
- 8.1Live Capture The Flag (CTF) Challenge
- 8.2Professional Penetration Testing Report Writing
- 8.3Red Team vs. Blue Team Final Exercise
- 8.4Advanced Cybersecurity Research & Tool Development
- 8.5Cyber Range & Adversary Emulation Labs
- 8.6Security Certifications & Career Guidance
- 8.7Bug Bounty & Responsible Disclosure Programs
- 8.8Ethical Hacking & Security Community Engagement
- 8.9Final Cybersecurity Capstone Project & Presentation
Understanding Cybersecurity Laws & Compliance
Next