Vulnerability Assessment & Ethical Hacking

Vulnerability Assessment & Ethical Hacking teaches you how to find security weaknesses and protect systems from attacks. Perfect for beginners and professionals.

Course Modules

Module 1: The Cybersecurity Mindset: Think Like an Attacker, Defend Like a Pro

Topics:
  • The Cybersecurity Mindset
  • Risk Management and Threat Modeling
  • The Cybersecurity Mindset – Attacking and Defending
  • CIA Triad, types of hackers (black/white/grey hat), ethics, legal frameworks (GDPR, HIPAA, PCI-DSS).
  • Common attack vectors (phishing, malware, ransomware).
  • Virtualization basics (Virtual Box, VMware).

Module 2: Kali Linux: Power, Precision, and Penetration Testing Mastery

Topics:
  • VMware: Powering Virtualization, Empowering Innovation
  • What is Kali Linux, The OS for Hackers
  • Parrot OS: Security, Privacy, and Forensicsโ€”All in One
  • Ubuntu: Linux for Human Beings, Power for Everyone

Module 3: Digital Footprints Unmasked: Mastering Recon & Subdomain Discovery

Topics:
  • What is Footprint?

    What is Recon?

    Subdomain concepts in cybersecurity?

    DNS concepts?

Module 4: Master the Terminal: Shell Scripting for Power and Automation

Topics:
  • How Sweet Is the Terminal?
  • Commanding the Command Line Top 30 Linux Commands
  • Stick to the Script
  • GUI vs CLI

Module 5: Kali Linux: Power, Precision, and Penetration Testing Mastery

Topics:
  • Advanced Bash
  • Introduction to cron and Scheduled Job
  • Sysadmin Essentials โ€“ Monitoringย Logย File
  • Linux Scavenger Hunt

Module 6: PowerShell & Networking: Automate, Secure, and Dominate

Topics:
  • Introduction to Windows and CMD
  • PowerShell Scripting
  • Introduction to Networking
  • Ports, Protocols, and the OSI Model

Module 7: Networking and Web Fundamentals

Topics:
  • What is Bruteforce?
  • What is Dirbuster?
  • Nmap Scan, the art of network scan, advanced network Scan
  • Email Networks and Security
  • Introduction to Firewalls and Network Security
  • ย 

Module 8: Revision

Topics:
    • Nessus Scan
    • Revision
    • Introduction to CTF : Project

Module 9: OWASP Top 10 (SQLi, XSS, CSRF, IDOR)

Topics:
  • Web app architecture (APIs, cookies, sessions).
  • Tools: Burp Suite (interception, repeater, intruder), SQLmap.
  • Exploit DVWA (Damn Vulnerable Web App): SQLi, XSS, file upload flaws.

Module 10: Web Security Fundamentals

Topics:
  • LFI,RFI
  • Directory Travarsal

Module 11:

Topics:
  • Scripting for Automation

    Python basics: Sockets, HTTP requests, regex.ย 

    Automate scans (Nmap)

    Labs

    – Build a port scanner in Python

Module 12: Revised

Topics:
  • Web Project: OWASP Juice Shop Demo Report

Module 13: Mobile Security

Topics:
  • Mobile app testing: APK decompilation, MobSF, runtime analysis.ย 

  • Reverse-engineer an APK to find hardcoded secrets.ย 

Module 14: AD security

Topics:
  • Kerberoasting, Pass-the-Hash, Golden Ticket attacks.ย 

  • BloodHound for AD mapping, lateral movement.ย 

Module 15:

Topics:
  • Certifications & Reporting
  • OSCP/CEH/PenTest+ exam strategies.
  • Professional report writing (executive summaries, technical details).
  • Write a pentest report for a mock fintech startup.
  • Solve OSCP-like machines on Hack the Box.
  • ย 

Module 16: Job Preparation

Topics:
  • Build a LinkedIn profile, GitHub portfolio, and resume.ย 

  • Mock interviews with industry professionals.ย 

Boost Your Career with Ethical Hacking Course

๐Ÿ’ฐ Course Fee: 4,706 USD ๐Ÿ”ฅ Discount: 15% โœ… Final Fee: 4,000 USD

๐Ÿ’ณ Payment Options: One-time Payment Installment Payment

๐ŸŒ Live Online Batch โ€“ Secure Your Spot Now!

Grow your career with SOC

Please enable JavaScript in your browser to complete this form.
For

For payment info please contact with us. Contact | WhatsApp
bKash (Bangladesh), PayPal, Credit Card andย  Bank Transfer Available For USA.

Meet Your Instructor Sumit

Picture of SUMIT DAS

SUMIT DAS

๐Ÿ‘จโ€๐Ÿ’ผ Assistant Manager, Red Team (USA)

๐Ÿ›ก๏ธ OSCP (Offensive Security Certified Professional)
๐Ÿ›ก๏ธ OffSec Certified Professional
๐ŸŽ“ Phishing Countermeasures
โ†’ Charles Sturt University
๐Ÿฅ‡ Top 1% on(THM)

๐Ÿ”น Experience

๐Ÿ‘จโ€๐Ÿ’ผ Assistant Manager, Red Team (USA)
โ†’ย  2020- Present

๐ŸŽ“ Certifications

๐Ÿ›ก๏ธ OSCP โ€“ Offensive Security Certified Professional

๐ŸŽฏ CRTP โ€“ Certified Red Team Professional

๐Ÿ› ๏ธ CNSS โ€“ Committee on National Security Systems Certification

๐Ÿ•ต๏ธโ€โ™‚๏ธ CEH v11 โ€“ Certified Ethical Hacker Version 11

๐Ÿ“‹ ISO 27001LA โ€“ ISO 27001 Lead Auditor

๐Ÿงพ ISO 27001LI โ€“ ISO 27001 Lead Implementer

๐Ÿ” AZ-500 โ€“ Microsoft Azure Security Engineer Associate

โ˜๏ธ AZ-900 โ€“ Microsoft Azure Fundamentals

โ˜๏ธ AWS CCP โ€“ AWS Certified Cloud Practitioner

๐Ÿ”’ CyberArk Trustee

๐Ÿ Python Basic

๐Ÿ” Qualys Vulnerability Management

๐Ÿ” API Security Architect

๐ŸŒ Introduction to Packet Tracer(Cisco)

๐Ÿ›ก๏ธ Learn Burp Suite, the Nr. 1 Web Hacking Tool

๐Ÿ”น Education

  • Bachelor of Science in Computer Scienceย 
  • Master of Technology in Cyber Security

๐ŸŽ“ Phishing Countermeasures
โ†’ Charles Sturt University

๐Ÿง  Ethical Hacker

๐Ÿฅ‡ Top 1% on TryHackMe (THM)

ย 

Penetration Testing ๐Ÿ•ต๏ธโ€โ™‚๏ธ, Vulnerability Assessment ๐Ÿ›ก๏ธ, Application Security ๐Ÿ”, Cybersecurity ๐Ÿ›ก๏ธ, Network Security ๐ŸŒ, Python (Programming Language) ๐Ÿ, Kali Linux ๐Ÿง, OWASP ZAP ๐Ÿ› ๏ธ, Postman API ๐Ÿ“ฆ, Tenable Nessus ๐Ÿพ, Wireshark ๐Ÿฆˆ, nmap ๐Ÿ—บ๏ธ, OWASP ๐ŸŒ, XSS ๐Ÿ’ป, CSRF ๐Ÿ•ต๏ธโ€โ™‚๏ธ, mobsf ๐Ÿ“ฑ, genymotion ๐ŸŽฎ, API Testing ๐Ÿ”, VAPT ๐Ÿ›ก๏ธ, Burp Suite ๐Ÿ”, Hydra ๐Ÿ, dirbuster ๐Ÿง‘โ€๐Ÿ’ป, bandit ๐Ÿฆนโ€โ™‚๏ธ, Acunetix ๐Ÿ–ฅ๏ธ, IBM app ๐Ÿ’ผ, Source Intelligence ๐ŸŒ, Forensic Analysis ๐Ÿ”, dast ๐Ÿงช, sast ๐Ÿ”, Ethical Hacking ๐Ÿ‘จโ€๐Ÿ’ป, CTF ๐ŸŽฏ, Vulnerability Management ๐Ÿ› ๏ธ, Threat & Vulnerability Management ๐Ÿšจ, Cyber Threat Intelligence (CTI) ๐ŸŒ, Threat Modeling ๐ŸŽญ, Bug Tracking ๐Ÿž, Security Awareness ๐Ÿง , Metasploit ๐Ÿ’ฅ.

Scroll to Top