arrow_back
Brochure
Cyber Security Program
Notes for Cybersecurity
Networking_Basics_Notes
Network_Communication_and_Addressing_Notes
Introduction to Cybersecurity
Introduction to Cybersecurity & Information Security
Road-Map to become a Cybersecurity Expert
Introduction to Networking
Types of Network (LAN, MAN, WAN, PAN)
Network Topologies & Media
MAC Address, IP Addressing (Public, Private, Static, Dynamic)
Network Devices (Hub, Switch, Router)
OSI Model (7 Layers)
TCP/IP Model & Packet Flow
Ports, Protocols & services
Firewall, VPN Concepts
GNS3 (Installation & Setup)
Basic Routing Configuration (Assigning IPs)
Interconnecting Device, Remote Access (SSH, Telnet), Ping & Troubelshoot
Introduction to Ethical Hacking
Types of Hackers
Phases of Ethical Hacking
Google Dorking, WHOIS, DNS Enumeration
Footprinting & Reconnaissance
Social Engineering & OSINT Techniques
Scanning & Enumeration
Network Scanning (Nmap, Netdiscover)
Port scanning, service enumeration, banner grabbing
Introduction to IDS/IPS
Exploiting misconfigurations and weak protocols
Network Security, Phishing Attacks & Cyber Threats
Network Enumeration (using Nmap)
Exploiting Netwrok vulnerabilities
SocialPhish(Social Engineering Toolkit)
Types of Cyber Threats
Creating Keylogger (using Python)
Advanced Web & Network Security
VAPT Life Cycle
OWASP Top 10 Overview
VAPT Labs (using TryHackMe Platform
CTF (Capture the Flag) Rooms
DVWA setup and configuration
Command Injection, File Inclusion, SQL Injection, XSS, CSRF, Brute Force
Hands on Practice with Portswigger labs
Metasploit Framework
Gaining Shell Access (Reverse Shell, Blind Shell
Secure Coding Practices
Input validation, authentication/authorization controls
Firewalls, IDS/IPS systems
VPNs, Proxy Servers, DMZ design
Principles, Implementation, Reporting & Documentation
Compliance, Governance & Risk Management
Data Protection Laws & Compliance
GDPR, HIPAA, ISO 27001 overview
Cybersecurity audit and controls
Cyber Laws in India
IT Act 2000, CERT-In guidelines
Legal obligations and penalties
Governance & Risk Frameworks
Risk Assessment Methodologies (Qualitative/Quantitative)
Business Continuity and Disaster Recovery Planning
Cybersecurity Tools and Technologies
Kali Linux Environment Setup
Command-line basics, package installation
Network & Packet Analysis
Wireshark (sniffing, filtering, analyzing)
Vulnerability Scanning Tools
Nmap (scripts, OS detection), OpenVAS
Metasploit basics and module usage
Web Application Security Tools
Burp Suite (intercepting, scanning, attacking)
OWASP ZAP for vulnerability assessment
Incident Response & Digital Forensics
Incident Detection and Handling
Event correlation, SIEM basics
ISO27001 Compliance
SOC and log monitoring workflows
Reverse Engineering Basics
Digital Forensics
Threat Intelligence
Capstone Project & Career Preparation
Real-Time Industry Projects
Simulated security assessment for an organization
Simulated security assessment for an organization
Resume Building
Cybersecurity-specific formatting, keyword optimization
Mock Interviews & HR Training
Technical + HR rounds
Confidence-building and articulation tips
One-on-One Mentorship
Personalized career guidance
LinkedIn optimization and certification roadmap
Python
Python 1 (Introduction) 04-06-2025
Python 2, (Syntax) 05-06-2025
python 3, (Data Types) 06-06-2025
Interview preparation-3 june 22
new soft skill
interview questions - 2 june 29
Interview preparation june 15
Introduction to soft skill June 14
Interview preparation-2 june 21
interview preparation june 22
interview questions june 28
Resume july 26
Resume-2 / 27 july
Interview questions(23/11/25) by Lahar Mam
Interview questions (30/11/25) by Lahar Mam
Interview Prep (07/12/25)
Cybersecurity by Tushar Sir
Introduction to Cybersecurity 11th June 2025
CISSP Security Domains
SIEM Tools
Networking Basics
Networking Basics
Networking basics_1
Networking Basics_1
Networking Basics_2
OSI Model
OSI Model
OSI Model_1
Packets and Frames
Linux
Linux_1
Linux_2
Linux_3
Linux_3
Windows
Windows_1
Windows_2
Windows_3
SIEM Tools
Networking basics_2
Sahil sir Cyber introduction
test
Footprinting & Reconnaissance
Overview of Tryhavkme Labs
Network Services lab
Network Simulation
Network services lab-2
Networking overview
Network services lab-3
Footprinting & reconnaissance
Socialphish tool
Scanning
Footprinting 2
Brute forcing & hidden files
Scanning 2
Basic pentesting
Socialphish
Basic pentesting 2
CEH
Stegnography
Socialphish 2
Network services
Exploiting SMB
Enumerating Telnet
Reverse shell
FTP 2
Agent sudo
Reverse shell 2
Agent sudo 2
Basic pentesting
SQL injection
Wifi spoofing
Agent sudo 2
Discussion
Cryptoraphy
viva
Authorization and Authentication & Real case studies related to Breach
crack the hash
crack the hash2
Vpn & Proxy in detail
Cyber Kill Chain
cyber kill chain
Unified kill chain
diamond model
viva
MITRE ATT&CK FRAMEWORK
MITRE ATT&CK FRAMEWORK-2
owasp top 10
cyber security assignment-1
OWASP top 10
Nmap commands
Nmap Commands-2
Nmap-3
nmap
Project Discussion
Project
class
GRC concepts
GDPR
HIPAA Compliance
ISO 27001
cyber security audits and controls
IT Act 2000
CERT-In guidelines
Cert-in guidelines
offensive security
progress
Burpsuite intro and setup
Burpsuit - 2
burpsuite
Burpsuite +. Questionaire
Class
grc ques
DVWA Install
DVWA
DVWA
DVWA - SQL INJECTION
DVWA,DOUBT,REVISION AND TASK
cyber Jagrons
class
class
SIEM
incident response
soc lab
recordings
Recording - test
Introduction to Cybersecurity - Sahil Sir (23rd july 5:00 PM)
Cybersecurity overview
Introduction to Networking
Mac & IP address
Networking Protocols
OSI Model
Port & Protocols
Network security
GNS3 installation
GNS3 installation 2
GNS3 labs
Router Configuration
Ping connection
Router Remote Access
Telnet Access
Network End
Introduction to CEH
Footprinting
OS
Kali
Introduction to Cryptography
crpytography-2(Hashing)
cyber security career path discussion.
Discussion
Doubt class
revision for previous
authentication & authorisation
Vpn & Proxy
DNS Lab
http lab
http lab
Lab
LAB
how does web works
web Servers
cyber kill chain
Cyber kill chain -1
Cyber Kill Chain -2
CyberSecurity Assignment -1
cyber security assignment-1
assignment
Discussion
Linux commands
Linux-2
Linux -3
Linux-4
Linux-5
project
GRC concepts
Grc concepts
Networking project
Crack the hash
Crack the Hash-2
Doubt Class
Project
class
Unfied kill chain
Resume Building
Resume
Resume
Resume and linkedin creation
Nmap
class
OWASP Top 10
doubt class and revision
Nmap
nmap -2
nmap -3
nmap
Interview questions
burp suite installation
interaction session
Information gathering
Campus Drive
Python 1
Cybersecurity by Lahar Ma'am (Saturday & Sunday)
Introduction
Introduction to Cyber Security
Introduction to Crpytography
Introduction to Networking
Networking labs
DNS with lab + AAA model
http
how does web works
how does web works-2
Cyber Kill Chain
Cyber Kill Chain - 2
Linux commands
MITRE ATTACK FRAMEWORK
MITRE ATTACK Framework
Class
Linux commands
Linux -2(hashcat)
Crack the hash
Cryptography question and project
Project & Nmap
Nmap-2
nmap and burpsuite intro
Class
owasp top 10
Owasp 10
Burpsuite
burpsuite
Burpsuite- OTP bypass
DVWA
DVWA
Class
Class
interaction
reconnaisance
reconnaisance
reconnaisance final
wireshark
Test
Cyber Security by Lahar Ma'am( 4 pm)
Introduction to cyber security
Networking
networking 2
Protocols & Ports
Protocols and ports
DNS
DHCP and its working
Client Server Model and 3 way handshake
Networking Assignment
Networking viva
How does web works
Networking project
Networking Project explanation by students
Cryptography
Hashing
Cyber Kill Chain -1
Linux
Cryptography questions
VPN
Proxy
Cyber kill chain -2
Cyber kill chain -3
Diamond Model
Unified kill chain
Questions Cyber security
MITRE ATTACK
MITRE ATTACK FRAMEWORK
Linux installation and commands
Linux
Linux
Linux-2
Linux-3
Linux -4
Linux - 5
linux-6
linux-7
linux-8
linux-9
linux-10
linux 11
linux-12
linux 13
linux last
linux Assignment
linux hardening
Test
Bash Scripting
bash scripting day 2
bash scripting day 2
bash day-3
bash day-3
bash day-4
bash day-5
bash day-6
bash last day
cyber intro
cybersecurity introduction
cybersecurity fundamentals
cybersecurity
practical information gathering
practical information gathering
scanning
network concepts
networking concept-II
Networking concept
networking concept
Networking concept
Networking
Networking concept last
CYBER SECURITY 6PM
Introduction
Introduction to Cyber Security
Introduction to cyber security
Cyber security career
Networking
cyber jargons
jagron -2
Networking
networking (osi model)
networking
interaction session
Introduction to Cyber Security
Networking
Osi model
TCP/IP model
IP Addressing
Ports and protocol
Resume and LinkedIn
Dhcp
VPN
proxyy
class
class
IDS & firewall
networking
ports and protocols
Ports and protocol
sairm sir 21/12/25
intro test
interaction
cybersecurity 11 am
networking
Networking
networking
test
Networking
Networking
Networking
Networking
Networking
Routing Protocol
Routing Protocols
Linux Day 1
linux day2
linux day-3
linux day-4
linux day-5
linux day 6
linux day-7
linux day-8
linux day-9
linux day-10
linux day-11
Test
bash
bash-1
bash day-2
bash day-3
bash-4
bash last
intro to cybersecurity
cybersecurity
Information gathering
practical information gathering
practical information gathering
scanning
scanning day-2
test
Enumeration
enumeration day-2
VA Day-1
va day2
VA Day-3 Nessus
DNS Configuration
DHCP Configuration
Metasploit day-1
metasploit day-2
Test
Malware analysis
metasploit_last
Network security day-1 wireshark
wireshark day-2
Network security day-3
Network security day-4
DOS & DDOS Attack
cybersecurity 5pm
networking
Networking 2
networking3
networking-4
networking 5
networking-5
networking-6
linux
linux
linux
linux
linux test
linux
linux
linux
linux
linux
linux
linux
linux_9
linux_10
linux day-11
linux-12
bash day-1
bash day-1
bash day-2
bash
bash
cybersecurity
cybersecurity
Information gathering
cybersecurity 6pm
TCP/IP model
ports and protocols
networking
networking1
test
networking
Networking
Networking
Networking
networking
networking
Routing Protocol
HTTP packet structure
routing protocol
Routing Protocol
Routing Protocol
test
networking
Networking
networking
networking
SSL & TLS
SSL & TLS
Test
ip address
ip address
Q/A session
linux day-1
linux day-2
linux day-3
linux day-4
linux day-5
linux day-6
linux day-7
linux day-8
test
DNS Configuration
DNS Configuration
DHCP and Star toplogy configuration
lab documentaion
DHCP Configuration
DHCP configuration
class
linux
linux
linux
Linux test
cybersecurity fundamentals
cybersecurity fundamentals
cybersecurity fundamentals
Information gathering
information gathering
information gathering last
Module-2 Scanning
scanning
cybersecurity 7pm
interaction
splunk
log analysis
log analysis
linux file system
linux log analysis
test
test
Wireshark
wireshark practical
linux hardening
Incident response
incident response
Project phishing email analysis
SIEM introduction
SIEM and Splunk
Splunk and project
splunk project
SPL and Splunk Dashboard
VA
VA
EDR XDR Besics
Wazuh -1
test
Test 2
wazuh
wazuh
wazuh
installing wazuh
wazuh practical
Intro to threat intelligence
Threat Inteligence
threat intelligence
threat intelligence practical
threat intelligence lab
test
lab
SOAR
dhcp setup
Dns , DHCP setup
class
metasploit day-2
metasploit-3
metasploit-4
cybersecurity weekend 3pm
introduction
Networking
Networking
Networking
TCP/IP model
Networking
revision and test
Networking
Networking
Networking
threat intelligence
Test
networking
Networking
Networking
networking
networking-DHCP Configuration
Networking
networking
Networking
test
linux-day1
linux day-2
Scanning
scanning
saturday sunday 5 pm
Networking
osi model
test
Vulnerability Management
practical VA
task
VA Practicle
Enumeration
Enumeration
enumeration
Enumeration and intro to pentesting
intro to pentesting
metasploit
metasploit-2
lab
dns lab
DNS configuration
DHCP , Star topology configuration
malware analysis
network security
Preview - CYBERSECURITY CAREER PROGRAM
Discuss (
0
)
navigate_before
Previous
Next
navigate_next