Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Syllabus 3 Month Internship _240916_224053

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

3 MONTH INTERNSHIP CURRICULUM

Module I
Cyber Security Fundamentals
Total Duration : 20 Hours

SECTION 1: Introduction to Cyber Security


1. Intro to Offensive Security
2. Intro to Defensive Security
3. Careers in Cyber

SECTION 2: Network Fundamentals

1. What is Networking?
2. Intro to LAN
3. OSI Model
4. Packets & Frames
5. Extending Your Network

SECTION 3: How The Web Works

1. DNS in detail
2. HTTP in Detail
3. How Websites Work
4. Putting it all together

SECTION 4: Linux Fundamentals

1. Linux Fundamentals Part 1


2. Linux Fundamentals Part 2
3. Linux Fundamentals Part 3

SECTION 5: Windows Fundamentals

1. Windows Fundamentals 1
2. Windows Fundamentals 2
3. Windows Fundamentals 3

Assignment 1 : Complete this learning path and earn a certificate of completion


Module II
Introduction to Cyber Security
Total Duration : 20 Hours

Section 1:Introduction to Offensive Security


1. Web Application Security
2. Operating System Security
3. Network Security

Section 2: Introduction to Defensive Security


1. Intro to Digital Forensics
2. Security Operations

Assignment 2: Complete this learning path and earn a certificate of completion

Module III
Junior Penetration Tester
Total Duration: 20 Hours

Section 1 : Revision Module I & II

Section 2:Introduction to Pentesting


1. Pentesting Fundamentals
2. Principles of Security

Section 3:Introduction to Web Hacking


1. Walking An Application
2. Content Discovery
3. Subdomain Enumeration
4. Authentication Bypass
5. IDOR
6. File Inclusion
7. Intro to SSRF
8. Intro to Cross-site Scripting
9. Command Injection
10. SQL Injection

Section 4: Burp Suite


1. Burp Suite: The Basics
2. Burp Suite: Repeater
3. Burp Suite: Intruder
4. Burp Suite: Other Modules
5. Burp Suite: Extensions

Section 5: Network Security


1. Passive Reconnaissance
2. Active Reconnaissance
3. Nmap Live Host Discovery
4. Nmap Basic Port Scans
5. Nmap Advanced Port Scans
6. Nmap Post Port Scans
7. Protocols and Servers
8. Protocols and Servers 2
9. Net Sec Challenge

Section 6: Vulnerability Research


1. Vulnerabilities 101
2. Exploit Vulnerabilities
3. Vulnerability Capstone

Section 7: Metasploit
1. Metasploit: Introduction
2. Metasploit: Exploitation
3. Metasploit: Meterpreter

Section 8: Privilege Escalation


1. What the Shell?
2. Linux Privilege Escalation
3. Windows Privilege Escalation

Assignment 3: Complete this learning path and earn a certificate of completion


Project 1: Metasploitable linux 2 - PT Report

You might also like