Vulnerability Assessment & Ethical Hacking
Vulnerability Assessment & Ethical Hacking teaches you how to find security weaknesses and protect systems from attacks. Perfect for beginners and professionals.
Course Modules
Module 1: The Cybersecurity Mindset: Think Like an Attacker, Defend Like a Pro
Topics:
- The Cybersecurity Mindset
- Risk Management and Threat Modeling
- The Cybersecurity Mindset – Attacking and Defending
- CIA Triad, types of hackers (black/white/grey hat), ethics, legal frameworks (GDPR, HIPAA, PCI-DSS).
- Common attack vectors (phishing, malware, ransomware).
- Virtualization basics (Virtual Box, VMware).
Module 2: Kali Linux: Power, Precision, and Penetration Testing Mastery
Topics:
- VMware: Powering Virtualization, Empowering Innovation
- What is Kali Linux, The OS for Hackers
- Parrot OS: Security, Privacy, and ForensicsโAll in One
- Ubuntu: Linux for Human Beings, Power for Everyone
Module 3: Digital Footprints Unmasked: Mastering Recon & Subdomain Discovery
Topics:
What is Footprint?
What is Recon?
Subdomain concepts in cybersecurity?
DNS concepts?
Module 4: Master the Terminal: Shell Scripting for Power and Automation
Topics:
- How Sweet Is the Terminal?
- Commanding the Command Line Top 30 Linux Commands
- Stick to the Script
- GUI vs CLI
Module 5: Kali Linux: Power, Precision, and Penetration Testing Mastery
Topics:
- Advanced Bash
- Introduction to cron and Scheduled Job
- Sysadmin Essentials โ Monitoringย Logย File
- Linux Scavenger Hunt
Module 6: PowerShell & Networking: Automate, Secure, and Dominate
Topics:
- Introduction to Windows and CMD
- PowerShell Scripting
- Introduction to Networking
- Ports, Protocols, and the OSI Model
Module 7: Networking and Web Fundamentals
Topics:
- What is Bruteforce?
- What is Dirbuster?
- Nmap Scan, the art of network scan, advanced network Scan
- Email Networks and Security
- Introduction to Firewalls and Network Security
- ย
Module 8: Revision
Topics:
- Nessus Scan
- Revision
- Introduction to CTF : Project
Module 9: OWASP Top 10 (SQLi, XSS, CSRF, IDOR)
Topics:
- Web app architecture (APIs, cookies, sessions).
- Tools: Burp Suite (interception, repeater, intruder), SQLmap.
- Exploit DVWA (Damn Vulnerable Web App): SQLi, XSS, file upload flaws.
Module 10: Web Security Fundamentals
Topics:
- LFI,RFI
- Directory Travarsal
Module 11:
Topics:
Scripting for Automation
Python basics: Sockets, HTTP requests, regex.ย
Automate scans (Nmap)
Labs
– Build a port scanner in Python
Module 12: Revised
Topics:
Web Project: OWASP Juice Shop Demo Report
Module 13: Mobile Security
Topics:
Mobile app testing: APK decompilation, MobSF, runtime analysis.ย
Reverse-engineer an APK to find hardcoded secrets.ย
Module 14: AD security
Topics:
Kerberoasting, Pass-the-Hash, Golden Ticket attacks.ย
BloodHound for AD mapping, lateral movement.ย
Module 15:
Topics:
- Certifications & Reporting
- OSCP/CEH/PenTest+ exam strategies.
- Professional report writing (executive summaries, technical details).
- Write a pentest report for a mock fintech startup.
- Solve OSCP-like machines on Hack the Box.
- ย
Module 16: Job Preparation
Topics:
Build a LinkedIn profile, GitHub portfolio, and resume.ย
Mock interviews with industry professionals.ย
Boost Your Career with Ethical Hacking Course
๐ Live Online Batch โ Secure Your Spot Now!
Grow your career with SOC
Meet Your Instructor Sumit

SUMIT DAS
๐จโ๐ผ Assistant Manager, Red Team (USA)
๐ก๏ธ OSCP (Offensive Security Certified Professional)
๐ก๏ธ OffSec Certified Professional
๐ Phishing Countermeasures
โ Charles Sturt University
๐ฅ Top 1% on(THM)
๐น Experience
๐จโ๐ผ Assistant Manager, Red Team (USA)
โย 2020- Present
๐ Certifications
๐ก๏ธ OSCP โ Offensive Security Certified Professional
๐ฏ CRTP โ Certified Red Team Professional
๐ ๏ธ CNSS โ Committee on National Security Systems Certification
๐ต๏ธโโ๏ธ CEH v11 โ Certified Ethical Hacker Version 11
๐ ISO 27001LA โ ISO 27001 Lead Auditor
๐งพ ISO 27001LI โ ISO 27001 Lead Implementer
๐ AZ-500 โ Microsoft Azure Security Engineer Associate
โ๏ธ AZ-900 โ Microsoft Azure Fundamentals
โ๏ธ AWS CCP โ AWS Certified Cloud Practitioner
๐ CyberArk Trustee
๐ Python Basic
๐ Qualys Vulnerability Management
๐ API Security Architect
๐ Introduction to Packet Tracer(Cisco)
๐ก๏ธ Learn Burp Suite, the Nr. 1 Web Hacking Tool
๐น Education
- Bachelor of Science in Computer Scienceย
- Master of Technology in Cyber Security
๐ Phishing Countermeasures
โ Charles Sturt University
๐ง Ethical Hacker
๐ฅ Top 1% on TryHackMe (THM)
ย
Penetration Testing ๐ต๏ธโโ๏ธ, Vulnerability Assessment ๐ก๏ธ, Application Security ๐, Cybersecurity ๐ก๏ธ, Network Security ๐, Python (Programming Language) ๐, Kali Linux ๐ง, OWASP ZAP ๐ ๏ธ, Postman API ๐ฆ, Tenable Nessus ๐พ, Wireshark ๐ฆ, nmap ๐บ๏ธ, OWASP ๐, XSS ๐ป, CSRF ๐ต๏ธโโ๏ธ, mobsf ๐ฑ, genymotion ๐ฎ, API Testing ๐, VAPT ๐ก๏ธ, Burp Suite ๐, Hydra ๐, dirbuster ๐งโ๐ป, bandit ๐ฆนโโ๏ธ, Acunetix ๐ฅ๏ธ, IBM app ๐ผ, Source Intelligence ๐, Forensic Analysis ๐, dast ๐งช, sast ๐, Ethical Hacking ๐จโ๐ป, CTF ๐ฏ, Vulnerability Management ๐ ๏ธ, Threat & Vulnerability Management ๐จ, Cyber Threat Intelligence (CTI) ๐, Threat Modeling ๐ญ, Bug Tracking ๐, Security Awareness ๐ง , Metasploit ๐ฅ.

