πŸ” Cybersecurity

Advanced Cybersecurity
Program

A 13-week project-based program delivering a complete, job-ready cybersecurity skill set β€” from Linux fundamentals and network security through web application pentesting, Metasploit exploitation, and career preparation.

13wks
Duration
130hrs
Total Hours
4
Projects
5d/wk
Schedule
Beginner–Advanced
Cybersecurity
β‚Ή25,000
πŸ“…
13-Week Program Β· 130 Hours
πŸ§ͺ
Hands-on Lab Environment
πŸ†
3 Projects + 1 Capstone
πŸ“„
Completion Certificate
πŸ’Ό
Portfolio & Career Prep Included
πŸ”„
Lifetime Access to Content

What You'll Learn

βœ“
Linux administration & command-line proficiency
βœ“
Network analysis, scanning & vulnerability assessment
βœ“
Web application security across OWASP Top 10
βœ“
Manual & automated exploitation techniques
βœ“
Post-exploitation: privilege escalation & lateral movement
βœ“
OSINT & reconnaissance methodology
βœ“
Password attacks & cryptography fundamentals
βœ“
Professional penetration test report writing

Tools & Technologies

πŸ‰ Kali Linux
πŸ—ΊοΈ Nmap
πŸ” OpenVAS / GVM
🦈 Wireshark
πŸ’₯ Metasploit
πŸ•΅οΈ Burp Suite
⚑ OWASP ZAP
πŸ’‰ sqlmap
πŸ”‘ Hashcat
πŸ”‘ John the Ripper
🌐 theHarvester
πŸ“‘ Shodan
🎯 DVWA
πŸ§ƒ Juice Shop
πŸ–₯️ Metasploitable2
🧩 TryHackMe

Week-by-Week Syllabus

Month 1 β€” Foundation & Network Security
Weeks 1–4 Β· Linux, TCP/IP, Nmap, OpenVAS
40 Hours
Week 1Cybersecurity Fundamentals & Linux Basics
β–Ό
CIA Triad, threat landscape & attack surfaces
Linux file system, permissions, users & shell basics
Lab environment setup β€” Kali VM & DVWA
Basic risk assessment & asset classification
Mini CTF challenge on PicoCTF (beginner room)
Week 2Network Fundamentals
β–Ό
TCP/IP stack, OSI model & common protocols
IPv4/IPv6, CIDR notation & subnetting
Routers, switches, firewalls, DMZ & VLANs
Wireshark β€” packet capture, filters & protocol dissectors
Traffic analysis lab β€” identify suspicious patterns in .pcap
Week 3Network Scanning & Enumeration
β–Ό
Nmap scan types (-sS, -sV, -A), OS fingerprinting & NSE
OpenVAS/GVM vulnerability scanning & CVSS scoring
Banner grabbing, netcat, enum4linux β€” SMB/FTP/SSH
Firewall evasion basics & Nmap XML report generation
Assessment report writing: executive summary, findings, remediation
Week 4Network Assessment Project
β–Ό
Rules of engagement, scope definition & methodology
Passive & active recon β€” Nmap, Netdiscover
Full vulnerability scan & CVE correlation
Draft & finalize Phase 1 vulnerability assessment report
Deliverable: Network Vulnerability Assessment Report
Month 2 β€” Web Application Security
Weeks 5–8 Β· OWASP, Burp Suite, SQLi, Cryptography
40 Hours
Week 5Web Application Security Basics
β–Ό
HTTP/HTTPS, request/response cycle, cookies & sessions
OWASP Top 10 Part 1 β€” Injection, Broken Auth, XXE
OWASP Top 10 Part 2 β€” XSS, Broken Access Control, SSRF
OWASP Top 10 Part 3 β€” Insecure Components, Logging, CSRF
Burp Suite proxy setup β€” intercept & spider DVWA
Week 6Manual Web Testing Techniques
β–Ό
SQL Injection β€” error-based, blind, time-based & UNION
sqlmap β€” extract data & dump credentials from DVWA
XSS β€” reflected, stored, DOM; CSP bypass basics
Authentication bypass β€” Burp Intruder, session hijacking, CSRF
Directory traversal & IDOR exploitation on Juice Shop
Week 7Automated Testing & Cryptography
β–Ό
Burp Suite active/passive scanning & issue triage
OWASP ZAP spider, active scan & API testing
Cryptography β€” AES, RSA, MD5/SHA; encrypt/decrypt with OpenSSL
SSL/TLS audit using testssl.sh & SSLyze
Password attacks β€” Hashcat & John the Ripper
Week 8Web Application Pentest Project
β–Ό
Recon β€” directory brute force & tech fingerprinting with Gobuster
Systematic OWASP Top 10 testing on Juice Shop
Chain 3+ vulnerabilities; document impact with PoC
Draft & finalize Phase 2 web pentest report
Deliverable: Web Application Penetration Test Report
Month 3 β€” Offensive Operations & Career Prep
Weeks 9–13 Β· OSINT, Metasploit, Post-Exploitation, Capstone
50 Hours
Week 9Penetration Testing Methodology & OSINT
β–Ό
PTES framework β€” black/grey/white box, legal considerations
Passive OSINT β€” Shodan, Google dorking, WHOIS, cert transparency
Active OSINT β€” theHarvester, Maltego, metadata extraction with Exiftool
Social engineering concepts β€” phishing, pretexting, GoPhish
Produce target reconnaissance report
Week 10Exploitation with Metasploit
β–Ό
Metasploit modules β€” exploits, payloads, auxiliary, encoders
Exploitation basics β€” staged vs stageless payloads, LHOST/LPORT
Exploit Metasploitable2 β€” ms08-067, vsftpd vulnerability
Meterpreter β€” session management, hashdump, pivoting
Complete 3 Metasploit exploits on TryHackMe beginner room
Week 11Post-Exploitation Techniques
β–Ό
Linux privilege escalation β€” SUID, cron jobs, sudo misconfig, LinPEAS
Windows privilege escalation β€” token impersonation, WinPEAS
Persistence, backdoors & lateral movement β€” pass-the-hash
Covering tracks, evidence handling & chain of custody
Mini full pentest simulation β€” recon through post-exploitation
Week 12Capstone β€” Full Security Assessment
β–Ό
Capstone scope definition & attack surface planning
Full recon β€” OSINT + active scanning on isolated lab
Exploitation β€” chaining web & network vulnerabilities
Post-exploitation β€” achieve domain/root, document full attack chain
Evidence collection β€” screenshots, log exports & artifact organization
Week 13Portfolio, Reporting & Career Preparation
β–Ό
Write full capstone penetration test report
GitHub portfolio β€” upload all 3 project reports & writeups
ATS-optimized cybersecurity resume & LinkedIn update
Certification roadmap β€” Security+, eJPT, CEH, OSCP
Mock technical interview & final project demo
πŸ† Final Capstone Project

Conduct a complete, end-to-end penetration test on an isolated lab environment β€” covering reconnaissance, exploitation, post-exploitation, and professional report writing. This capstone mirrors real-world engagements and forms the centrepiece of your portfolio.

🌐 OSINT Recon
β†’
πŸ—ΊοΈ Nmap Scan
β†’
πŸ’₯ Metasploit
β†’
πŸ•΅οΈ Burp Suite
β†’
πŸ”‘ Post-Exploit
β†’
πŸ“„ Pentest Report

Certification Pathway

# Certification Focus Area Level
1 CompTIA Security+ Broad cybersecurity fundamentals Beginner
2 eJPT (eLearnSecurity) Junior penetration testing Beginner–Inter.
3 CEH (EC-Council) Ethical hacking methodology Intermediate
4 OSCP (Offensive Security) Hands-on offensive operations Advanced
πŸ“‹ Prerequisites
Basic computer literacy & comfort with command-line
Fundamental understanding of networks & the internet
Machine capable of running 2 VMs (8 GB RAM recommended)
Commitment to 2 focused hours/day, 5 days/week
🎯 Career Outcomes
βœ“Penetration Tester / Ethical Hacker
βœ“Security Analyst
βœ“Vulnerability Assessment Engineer
βœ“Bug Bounty Hunter
βœ“Junior SOC Analyst
πŸ“¦ What You'll Build
πŸ“‹Network Vulnerability Assessment Report
🌐Web Application Penetration Test Report
πŸ†Full Penetration Test Report (Capstone)
πŸ™Professional GitHub Portfolio
πŸ’ΌATS-Optimized Resume & Career Materials
πŸ’¬ Chat or Call us!
Chat on WhatsApp
+91 9187135171