The Cyber Security Diploma provides end-to-end training in networking, Linux administration, penetration testing, web security, cryptography, and social engineering. Participants gain hands-on experience using professional tools like Kali Linux, Wireshark, Nmap, Nessus, and Burp Suite. Real-world labs and projects prepare learners to identify vulnerabilities, secure systems, and pursue careers as ethical hackers and cybersecurity specialists.
Course Overview
Course Syllabus
01 Module 1: Core Networking & System Foundations
- Computer Networks
- Internet Protocols
- Routing
- OSI vs TCP/IP
- IP/TCP/UDP/ICMP
- DNS
- DHCP
- NAT
- Firewalls
- Wireshark
- Link Layer Devices
- Switching
- Network Protocols (HTTP/S
- FTP
- SSH)
- Server Operations & Maintenance
02 Module 2: Linux for Security Professionals
- Operating System Basics
- Introduction to Linux
- Kali Linux GUI
- Terminal Mastery
- Folder & File Management
- User Management
- Permissions
- File System Navigation
- Common Linux Commands
- Advanced Shell Commands & Utilities
03 Module 3: Cybersecurity Foundations
- Threats
- Vulnerabilities
- Risks
- Attacks & Countermeasures
- Governance/Risk/Compliance (GRC)
- Architecture & Secure System Design
- Defense-in-Depth
- CIA Triad
04 Module 4: Cryptography Essentials
- Hashing & Encoding
- Symmetric & Asymmetric Encryption
- Secure Communications (HTTPS
- TLS)
- HTTP Methods & Headers
- Secure Implementations
05 Module 5: Network Penetration Testing
- Information Gathering & Scanning
- DNS Recon
- Zone Transfers
- Subdomain Enumeration
- Metadata Analysis
- Google Dorks
- Shodan
- Network Sweeping & Tracing
- Port/OS/Version Scanning (Nmap)
- Vulnerability Scanning (Nessus)
- Exploitation & Post-Exploitation
- Reverse & Bind Shells
- Meterpreter
- File Transfers
- Privilege Escalation
- Antivirus Evasion
- Intro to IoT & Cloud Hacking
06 Module 6: Web Application Penetration Testing
- Web Attack Surface
- HTTP Protocols
- Burp Suite
- Netcat/Ncat
- Web Traffic Interception
- Common Web Exploits (Reflected/Stored/DOM XSS
- SQLi
- Subdomain Takeover
- SSRF)
- Web Security Defense
- Input Filtering
- HTTP Security Headers (CSP
- CORS
- SOP)
07 Module 7: Advanced Hacking & Social Engineering
- Social Engineering Techniques (Phishing
- Pretexting
- Impersonation)
- Human Vulnerabilities
- Real-world Scenarios
- Advanced Access & Persistence
- Password Cracking
- Lateral Movement
- Maintaining Access & Covering Tracks