Course Title: Ethical Hacking & Cybersecurity Fundamentals
Course Duration: 10 Weeks
Difficulty: Beginner to Intermediate
Format: Video Lectures + Labs + Assignments + Quizzes
Week 1: Introduction to Cybersecurity
• What is Cybersecurity?
• Types of Threats (Malware, Phishing, Ransomware)
• CIA Triad: Confidentiality, Integrity, Availability
• Basic Terminology and Concepts
Week 2: Networking Essentials
• OSI & TCP/IP Models
• IP Addressing, Subnetting, and Routing Basics
• Protocols: HTTP, HTTPS, FTP, DNS, ARP
• Tools: Wireshark Basics
Week 3: Linux for Hackers
• Basic Linux Commands
• File System, Permissions, and Processes
• Bash Scripting Intro
• Using Kali Linux & Terminal Tools
Week 4: Footprinting & Reconnaissance
• Active vs Passive Reconnaissance
• Google Dorking, WHOIS, DNS Enumeration
• Tools: Nmap, Maltego, Recon-ng
Week 5: Scanning & Enumeration
• Port Scanning & Banner Grabbing
• Network Mapping & Service Detection
• Tools: Nmap, Netcat, Nikto
Week 6: Vulnerability Analysis
• What are Vulnerabilities?
• CVE, CVSS, Vulnerability Databases
• Tools: Nessus, OpenVAS, Searchsploit
Week 7: Exploitation Basics
• Understanding Exploits & Payloads
• Intro to Metasploit Framework
• Exploiting Windows/Linux Machines (Lab)
• Post Exploitation Concepts
Week 8: Web Application Hacking
• OWASP Top 10 (XSS, SQLi, CSRF, etc.)
• Burp Suite Essentials
• Manual vs Automated Testing
• Hands-on: DVWA or Juice Shop
Week 9: Wireless & Social Engineering Attacks
• Cracking Wi-Fi Passwords (WEP/WPA2)
• Evil Twin Attacks & Rogue APs
• Phishing Campaigns & Pretexting
• Tools: Aircrack-ng, SET Toolkit
Week 10: Cyber Laws, Careers & Final Assessment
• Ethics of Hacking: White Hat vs Black Hat
• Introduction to Cyber Laws (India, US, GDPR)
• Certifications Path: CEH, OSCP, CompTIA Security+
• Final Project & Quiz
Optional Bonus Labs:
• Capture the Flag (CTF) Practice Challenges
• Malware Analysis Basics
• Setting up a Virtual Pentesting Lab
Outcome:
• Ability to identify & test vulnerabilities responsibly
• Understand ethical hacking practices
• Prepare for beginner-level certification exams
Use Nmap to perform a reconnaissance scan on a local network. Identify open ports, services, and OS fingerprints. Document your findings.
Install Kali Linux on VirtualBox and set up DVWA (Damn Vulnerable Web App) as a target system. Submit screenshots and system details.
Use Metasploit to find and exploit a vulnerability in the DVWA machine. Capture a screenshot of a successful shell or session.
Locked • 18 min
Locked • 22 min
Locked • 26 min
Locked • 35 min
Locked • 29 min
Locked • 34 min
Locked • 31 min
Locked • 33 min
Locked • 24 min
Locked • 38 min
PDF • 2.4 MB • Updated today
Link • usabilityhub.com
ZIP • 5.1 MB • Templates & Assets
Design System • Community File
New Session • June 17, 2025
Complete Chapter 2 to unlock Certificate