This course provides a structured, hands-on introduction to offensive cybersecurity following the CEH (Certified Ethical Hacker) framework. Students’ progress from foundational concepts through practical exploitation techniques, building both theoretical knowledge and real-world skills.
Audience profile
People from different IT or programming backgrounds can learn can start a career in Cyber Security. Even a fresher with basic knowledge of Linux and one scripting language can start Cyber Security.
Learning Objectives
• Understand the ethical and legal framework of penetration testing
• Master foundational networking, Linux, and reconnaissance skills
• Perform vulnerability assessments and interpret CVE data
• Conduct web application security testing using industry tools (Burp Suite, Caido)
• Use Metasploit, Hydra, and John the Ripper for exploitation and password attacks
• Understand threat landscapes for wireless, mobile, IoT, and cloud environments
• Produce a professional penetration testing report
Required Lab Environment
• Kali Linux (VM recommended: VirtualBox or VMware)
• Intentionally vulnerable lab machines for exploitation practice
• OWASP Juice Shop (web application vulnerability lab)
• Minimum 8GB RAM, 60GB disk for host machine