Fundamental Safeguard: Information protection is the cornerstone of cybersecurity, providing the primary defense against a wide range of cyber threats.
Data Vitality: In today's digital age, data is a critical asset for organizations and individuals, making its protection imperative for business continuity and personal privacy.
Confidentiality, Integrity, and Availability: Information protection ensures the confidentiality of sensitive data, maintains its integrity, and ensures it's available when needed, forming the CIA triad of cybersecurity.
Cyber Threats: Cybercriminals continually seek to exploit vulnerabilities in information security. Breaches can result in severe consequences, including financial losses, reputational damage, and legal repercussions.
Preventing Data Breaches: Effective information protection measures, such as encryption, access controls, and regular data backups, are essential for preventing data breaches and unauthorized access.
Trust Building: Information protection fosters trust in the digital world, both among organizations and between individuals and online services, contributing to a secure and resilient cyberspace.
Training Duration: 3 Months
Training Fees: ₹3000
Certificate: Yes
Membership: Lifetime
#1 Computer Basics
Basics of Computer System/Peripherals
Motherboard Ports & Sockets
Machine/Binary {0,1} Language Processing
System Software vs Application Software
I/O Operations & Devices
#2 Networking Basics
Network Topologies
LAN/MAN/WAN
Client-Server Architecture
DNS Server
Internet vs Intranet
Packets
Resource Sharing
#3 Cyber Laws in India
Types of Cyber Crimes
Information Technology Act 2000
Sections & IPCs
#4 Victim Checking Tools
Have I been pwned?
Pwned Passwords
Avast Check
F-Secure Identity Theft Checker
F-Secure Strong Password Generator
F-Secure Router Checker
F-Secure IP Checker
1Password
Account Security
#5 Study of Hacked Organizations
Truecaller
Attacker 404
Birla Group
Canva
Internet Traffic
Famous Hacker's Website got Hacked
Hacking for Religious & Political Matters
Mirai Botnet
#6 Frauds & Scams
How Fraud Works?
How to Detect Frauds?
Work from Home Scam
SMS Types & Scams
Promotional SMS
Transactional SMS
SMS API & Dashboard
Chinese Application Scams
OLX Scams
OTP Scams
Airtel Money & other Wallet Applications Scams
#7 Windows Security Geeks & Hacks
File/Data Properties (Read Only & Hidden)
Data Recovery Concepts & Tools
Batch Programming Hacks
VBScript Shell Scripting
Keyloggers
Virus/Trojan Horse/Malware/Adware
Block Viruses without Anti-Virus
Create Virus & Study of Anti-Virus Software
Windows Exploitations
Mount Suspicious Files
SFX Hacks
#8 Full Stack Development & GIT
Git Bash & Github
Basics of HTML & Bootstrap CSS
PHP Programming
MySQL
Web Development & CRUD Operations
Website Designing using Framework
Web Hosting - cPanel/Plesk Panel/VestaCP Panel
#9 Active & Passive Attacks
Active Attack Examples
Passive Attack Examples
#10 The Public Network (Surface/Deep/Dark Web)
Surface Web
Deep Web
Dark Web
Brave Browser
Onion Routing with TOR
Register New Onion Domain
Dark Web Market
The Hidden Wiki
Peer-to-Peer Communication in Dark Web
Torrent Sites & Torrent Network
Dark Web Deployment
Z-Library
Science Hub
#11 Introduction to VMs, Kali Linux & CLI
VMware
Virtual Box
Kali Linux Installations
Basic Linux Commands
#12 Cyber Attacks (Penetration Testing Only)
SQL Injection Attack
Wi-Fi Password Crack
Windows Password Crack
DoS Attack
Social Engineering Attack
Phishing Attack with Deployment
HOST File Attack
NMAP Port Scanning
Network Jammer/Blocker with Defender
CamPhish
Clickjacking
Android Phone Hacking (Optional)
#13 Cryptography & X.509 Certificate
Secure Hash Algorithm - 1
Secure Hash Algorithm - 256
Secure Hash Algorithm - 512
Base64
OpenSSL
Deploy Secret Encrypted Messaging Application in the Dark Web
Full SQL Database Encryption using Hybrid Cryptography