About Avanteia Courses

At Avanteia Courses, we provide premier IT training with a focus on cybersecurity, digital marketing, blockchain development, and web development. Our expert instructors deliver hands-on learning experiences to equip students with the skills needed for success in the digital world.

Follow Us

Cybersecurity

Avanteia Courses Course Details
shape
shape

Cybersecurity: Level-01

(1,230 reviews)
author
Created by
Avanteia

Total Enrolled

12,580

Last Update

15 September 2024

Category

Cybersecurity

Introduction to Cybersecurity Level-01

Overview:

  • Intermediate cybersecurity skills focusing on threat detection, risk management, and security controls.
  • Duration: 2 Months

Topics Covered:

  • Basics
  • Wireshark
  • Kali Linux
  • Network
  • Scanning
  • Burp Suite

Syllabus

Module 1: Exploring Ethical Hacking
  • Introduction
  • Commonly used terms Related to Ethical Hacking
  • Information Security
  • The Security, Functionality and Usability Triangle
  • Information Security Threats and Attack Vectors
  • Information Security Threats
  • Network Threat
  • Host Threat
  • Application Threat
  • Motives and Objectives of an Information Security Attack
  • Types of Hacking Attacks
  • Information Warfare
  • Offensive Information Warfare
  • Defensive Information Warfare

LAB 1
  • Camphish
  • zphisher
  • haveibeenpwned
  • tbomb
  • Bevigil
  • Stopncii
  • Darkweb

MODULE 2: Associated Protocols
  • Networking Models
  • The Layered Approach
  • Advantages of layered Architecture

LAB 2
  • Cisco Packet Tracer

Module 3: Gathering Information About Target Computer Systems Footprinting And Investinagtion
  • Foot printing Concepts
  • Foot printing Objectives
  • Footprinting Methodology
  • Footprinting Through Search Engine
  • Footprinting Using Advanced Google Hacking Techniques
  • Footprinting Through Social Networking Websites

LAB 3
  • Whois
  • GHDB
  • Archive.org
  • Shodan
  • Httrack

Module 4: Scanning Computers In The Networks
  • Network Scanning
  • Scanning Methodology
  • Live Systems Scanning
  • Port scanning
  • Scanning beyond IDS

LAB 4
  • Colasoft
  • Fping
  • Nmap

Module 5: Vulnerabilities Associated With Systems
  • What is a Vulnerability Assessment?
  • Benefits of Vulnerability Assessment
  • Type of Vulnerability Assessments

LAB 5
  • Nikto

Module 6: :Exploring Malware Threats And Their Countermeasures
  • Introduction to Malware
  • Malware Examples
  • Malware Propagation
  • Trojan Concepts
  • Virus and Worms

LAB 6
  • Metaspolit
  • I Love You Virus

Module 7: Enumeration-Listing The System/Users And Connecting Them
  • Enumeration in Ethical Hacking
  • Enumeration Techniques
  • Enumeration Types

LAB 7
  • Nmap

Module 8: Gaining Access To Systems-Hacking
  • Goals and Methodology of Hacking
  • Password Cracking
  • Types of Password Attacks
  • Microsoft Authentication Platforms
  • Password Salting
  • Escalating Privileges
  • Executing Applications

LAB 8
  • Colasoft
  • (SET)
  • Hydra

Module 9: Monitoring And Capturing Data Packets Using Sniffing
  • Network Sniffing
  • Types of Sniffing
  • Wiretapping
  • MAC Attacks
  • DHCP Starvation Attack
  • ARP Poisoning

LAB 9
  • Glasswiresetup
  • Wireshark
  • tcpdump

Module 10: Restricting The System Access - Denial Of Service (Dos Attack)
  • DoS/DDoS Concepts
  • Distributed Denial of Service Attack
  • Working of Distributed Denial of Service Attack
  • Techniques of DoS/DDoS Attack
  • Service Request Flood Attack
  • ICMP Attack
  • peer-to-peer Attack
  • Program- and Application-Level Attack
  • Permanent DoS Attack
  • Distributed Reflection Denial of service (DRDoS)

LAB 10
  • DOS tools slowloris
  • Hping3

Module 11: Tricking People To Gather Confidential Information - Social Engineering
  • Social Engineering
  • Impact of Attack on a Company
  • Behaviours Vulnerable to Attacks
  • Factors that Make Organisations Vulnerable to Attacks.
  • Why Social Engineering is Effective
  • Phases in Social Engineering Attack

LAB 11
  • BeEF

Module 12: Web Servers And Threats Associated With It
  • Web Server Concepts
  • Architecture of Service
  • Web Server Attack
  • Attack Methodology

LAB 12
  • sqlmap
  • OWASP ZAP
  • Dirb

Module 13: Web Applications And Threats Associated With It
  • Introduction to Web Applications
  • Web Application Architecture
  • Web 2.0 Applications
  • Vulnerability Stack Web App
  • Threats Unvalidated Input
  • Parameter/Form Tampering
  • Directory Traversal Security
  • Misconfiguration Injection Flaws
  • SQL Injection Attacks
  • Cross-Site Request
  • Forgery (CSRF) attack

LAB 13
  • Burp Suite
  • Wapiti
  • Xsstrike

Module 14: Controlling User Session With Authenticated TCP Connection Session Hacking
  • Concepts of Session Hijacking
  • Session Hijacking Process
  • Session Hijacking IOS modole
  • Application Level Session Hijacking
  • Session Sniffing
  • Predicting Session Token
  • Using Man-in-the-Browser Attack

LAB 14
  • Brute Force Attack with Hydra
  • Session Hijacking with Burp Suite
  • Password Cracking with John the Ripper

Module 15: Injecting Code In Data Driven Applications, SQL Injection
  • SQL Injection Concepts
  • Types of SQL Injection (SQLi)
  • Union SQL Injection
  • Blind SQL Injection
  • System Stored Procedures
  • Definition of SQL Injection

LAB 15
  • SQLMap
  • jSQL Injection

Module 16: Hacking Mobile Plateforms And Threats Associated With It
  • Mobile Bussiness Environment:Vulnerable Areas
  • Major Risk for Mobile Platforms
  • Mobile attack: Benifits for hacker
  • Mobile Platform Vulnerabilities and risks
  • Mobile Spam
  • SMS Phishing Attack (SMSishing)

LAB 16
  • The Truth spy
  • Metasploit Creating Android RAT

Module 17: Encrypting And Decrypting The Code Cryptography And Its Types
  • Cryptography
  • Types of Cryptography
  • Government Access to Keys (GAK)
  • Encryption Algorithms: Ciphers
  • Data Encryption Standard (DES)

LAB 17
  • OpenSSL
  • Hashcat
  • GnuPG(GPG)
  • John the Ripper
  • Hashcat

Module 18: Evading IDS, Firewalls and Honeypots
  • Intrusion Detection Systems (IDS)
  • Working of an IDS
  • Network Based Attacks
  • Types of Intrusion Detection Systems
  • Network Intrusion Detection System (NIDS)
  • Types of Firewall

LAB 18
  • TCPick

Module 19: Wireless Networks and Threats Associated with it
  • Wireless Concepts
  • Wireless Local Area Network (WLAN)
  • Wireless Metropolitan Area Networks (WMAN)
  • Wireless Wide Area Network (WWAN)
  • Wireless Personal Area Network (WPAN)
  • Multiple Device Support

LAB 19
  • Wifi hacking using Aircrack-ng

Learning Outcome

  • Implement security measures, manage risks, and respond to security incidents.

Reviews

  • image
    Mansi Manjrekar

    Avanteia offers the best IT courses in Goa! I enrolled for Digital Marketing and my friend joined Web Development – both of us got hands-on training with real projects. Highly recommend for job-seekers and students!

  • image
    Tanraj Simones

    This is the only institute in Goa that truly focuses on career growth. Whether it's Cybersecurity, Blockchain or Digital Marketing, the trainers are super helpful and the learning is very practical.

  • image
    Barkelo Gaonkar

    Avanteia Courses are industry-ready and job-focused. I loved the practical sessions, internship support, and certifications. If you're in Goa and serious about IT skills, this is the place to join.

🚀 Cybersecurity Roadmap (Intermediate Level)

Advance your cybersecurity skills with practical, hands-on steps designed to deepen your expertise.

1
Step 1
📊

Cybersecurity Level 1

Hands-on techniques: gaining access, sniffing, web server attacks and SQL injection.

2
Step 2
🤖

Cybersecurity Level 2

Advanced platform threats: mobile, cloud, virtualization and advanced exploitation.

3
Step 3
🧑‍💻

Internship

1-year free internship — apply tools, run assessments, assist in SOC/playbooks and live projects.

1 year
FREE
4
Step 4
📝

Mini Project

Design and deliver an end-to-end security project: pen-test report, incident playbook or cloud hardening project.

6 Months
5
Step 5
💼

Expected Jobs

Roles you can step into after the course and internships.

Security Analyst
SOC Analyst
Vulnerability Assessor
Junior Penetration Tester
Network Security Associate
🎯

🏆 Career Destinations

Entry-level (India)
₹3–5 LPA
Mid-level (India)
₹6–10 LPA
Senior-level (India)
₹12–20 LPA+
🌎 Global Roles
$30,000–$70,000