Skip to content
Home
About
Professional Courses
Web Development
Cyber Security
Graphic & Animation
Digital Marketing
Business & Accounts
Cloud Computing
Kids Courses
Short Courses
Kids Bootcamp
Workshops
Professional Workshops
Winter / Summer Bootcamp
Contact
X
Free Demo
Home
All Courses
Cyber Security
Mastering Cybersecurity: From Fundamentals to Advanced Techniques
Mastering Cybersecurity: From Fundamentals to Advanced Techniques
Curriculum
12 Sections
72 Lessons
144 Hours
Expand all sections
Collapse all sections
Module 1: Information Security Fundamentals
7
1.0
Session 1
1.1
Session 2
1.2
Session 3
1.3
Session 4
1.4
Session 5
1.5
Session 6
1.6
Session 7
Module 2: Advanced Cybersecurity Research
6
2.0
Session 8
2.1
Session 9
2.2
Session 10
2.3
Session 11
2.4
Session 12
2.5
Session 13
Module 3: Website Security
6
3.0
Session 14
3.1
Session 15
3.2
Session 16
3.3
Session 17
3.4
Session 18
3.5
Session 19
Module 4: CCNA - Basic to Advanced Networking
6
4.0
Session 20
4.1
Session 21
4.2
Session 22
4.3
Session 23
4.4
Session 24
4.5
Session 25
Module 5: MCSA 2012 (Basic to Pro)
6
5.0
Session 26
5.1
Session 27
5.2
Session 28
5.3
Session 29
5.4
Session 30
5.5
Session 31
Module 6: Cisco & MikroTik Configuration
6
6.0
Session 32
6.1
Session 33
6.2
Session 34
6.3
Session 35
6.4
Session 36
6.5
Session 37
Module 7: Penetration Testing Setup
6
7.0
Session 38
7.1
Session 39
7.2
Session 40
7.3
Session 41
7.4
Session 42
7.5
Session 43
Module 8: Bash Scripting for Cybersecurity
6
8.0
Session 44
8.1
Session 45
8.2
Session 46
8.3
Session 47
8.4
Session 48
8.5
Session 49
Module 9: Python for Hacking
6
9.0
Session 50
9.1
Session 51
9.2
Session 52
9.3
Session 53
9.4
Session 54
9.5
Session 55
Module 10: Bug Bounty Programs
6
10.0
Session 56
10.1
Session 57
10.2
Session 58
10.3
Session 59
10.4
Session 60
10.5
Session 61
Module 11: Security Standards & Management
6
11.0
Session 62
11.1
Session 63
11.2
Session 64
11.3
Session 65
11.4
Session 66
11.5
Session 67
Module 12: Capstone Project
5
12.0
Session 68
12.1
Session 69
12.2
Session 70
12.3
Session 71
12.4
Session 72
Session 57
Ethical Hacking and Legal Boundaries
Modal title
Main Content