Payment Options (Indian Students)
Below checkout is only for Indian Students.
Students outside India can pay via Paypal from above Buy $2 Button or at checkout page.
Pay with UPI, Credit & Debit Card
NOTE : You will not see the course onto the dashboard instantly. Enrolment process will take up to 2 hrs from the purchase time.
If you are not able to access after 24 hrs of purchase please write us at [email protected] attaching your transaction id or reach out to us on WhatsApp for instant support +91-8160206309/ +91 9106147779
Course curriculum
-
1
1. Introduction
-
Introduction to the course
-
-
2
2. Introduction to Hacking
-
What is Hacking
-
What are the types of hackers
-
More Types of Hackers
-
Have I been pwned
-
History of Hacking
-
Breaking the Myth
-
Not Being a Noob
-
-
3
3. Principles of Information Security
-
CIA Triad
-
Integrity Practical
-
-
4
4. Dive in Hacking
-
USB Stealer
-
Zip Bomb
-
Fork Bombs
-
Fork Bomb Practical
-
-
5
5. Ports and Protocols
-
What are Ports & Protocols
-
Hyper Text Transfer Protocol (HTTP & HTTPS)
-
File Transfer Protocol
-
Secure Shell
-
Telnet, RDP and Telnet vs SSH
-
-
6
6. Communication Models
-
TCP IP and OSI Model
-
OSI Model in day to day Life
-
-
7
7. Types of Networks
-
Network Types
-
Local Area Network
-
Metropolitan Area Network
-
Wide Area Network
-
Personal Area Network
-
-
8
8. Malware
-
Introduction to Malware Family
-
-
9
9. Introduction to Linux
-
Introduction to Linux
-
Linux Boot Process
-
Windows Boot Process
-
Linux System Information Commands
-
Linux Hardware Information
-
Performance Monitoring
-
Performance Monitoring-2
-
Userinfo and Management
-
File, Directory and Deletion
-
Directory Management
-
Rename,Move and Case Sensitive
-
Symbolic Links
-
File Reading
-
Process and Kill
-
Process and Killall
-
Background and Foreground
-
Linux Permissions
-
Adding Permissions
-
Removing Permissions
-
Execution of Permissions
-
Linux Octal Permissions
-
Linux Networking Management -1
-
Linux Networking Management -2
-
Linux Networking Management -3
-
Linux Networking Management -4
-
Linux Networking Management -5
-
Linux Networking Management -6
-
Linux Archive Management
-
Linux Search & Pattern
-
-
10
10. Phishing-Social Engineering
-
What is Social Engineering & Types
-
What is Phishing
-
-
11
11. Cryptography
-
What is Cryptography
-
Cryptography Breakdown
-
What is Encryption
-
Symmetric Encryption
-
Asymmetric Encryption
-
Asymmetric Encryption Working
-
Asymmetric Encryption Practical
-
-
12
12. Final Video
-
Final Video
-
-
13
Get Your Certificate
-
Get Your Certificate
-
Feedback/Testimonial
-
-
14
Snapshot of Introduction to Cyber Security & Ethical Hacking
-
Snapshot of Ports & Protocols
-
Snapshot of TCP/IP vs OSI Model
-
Snapshot of HTTP & HTTPS
-
Snapshot of OSI model
-
Understanding Network and their types
-
Instructor(s)
Founder at Hacktify Cyber Security
Rohit Gautam
Founder at Hacktify Cyber Security
Shifa Cyclewala
Some of our happy students
Placed at KPMG (Security Consultant)
Placed at Progist (Threat Hunter)
Placed at Media.net (Security Consultant)
Placed at Progist (Security Consultant)
FAQ
Frequently asked questions
-
How long is the course access?
Yes, Absolutely you will have the access for lifetime
-
Does this course contain live practicals?
Yes, we have curated the course content with live simulations of practicals which is 100% inclined practicals with industry standards.
-
Can I get a Internship/Hall of Fame/ Bounty with this course?
Yes, most of our students who have enrolled the course has been successful and have been acknowledged with many HoF, Bounties, Internships & Jobs. Don't take our words check our Linkedin Handle for student reviews and their acknowledgements - linkedin.com/in/shifa