Skip to Content
Cybersecurity (Ethical Hacking)

Cybersecurity (Ethical Hacking)

Delve into a world of Hackers. Learn what is takes to kill it in the Cyber Security Industry..

350,000.00 ₦
350000.0 NGN 350,000.00 ₦
350,000.00 ₦
Responsible Victory Okoroma
Last Update 02/28/2025
Completion Time 1 hour 15 minutes
Members 0
  • Introduction to Cyber Security
    6Lessons · 1 hr 15 min
    • Week 1: Getting Started
    • Introduction to Cybersecurity and Ethical hacking
    • Types of hackers and Phases of hacking
    • The CIA Triad and Kill-Chain
    • Practical on making a pendrive bootable and a live view of Linux
    • Basic Terminologies in Hacking and basic pendrive hack(Practical)
  • Week 2: Introduction to Hacking
    4Lessons ·
    • Introduction to Linux, it’s distributions and why we use it.
    • Setting up Kali Linux and Virtual Machines(practical )
    • Basic Linux commands and installation of tools(practical)
    • Network Interfaces and User Permissions (practical)
  • Week 3: Staying Anonymous and Scripting
    4Lessons ·
    • Proxychains (practical) and Virtual private networks
    • Private Browsers and Private Search Engines
    • Introduction to Bash Scripting and its likes
    • Tips for staying safe online (practical)
  • Week 4: Cryptography and Firewalls
    3Lessons ·
    • Introduction to cryptography, Forms of Cryptographic Attacks and practical
    • Firewalls, types and setting it up on Linux
    • Introduction to Hackthebox free labs practical(tier 0,1 and 2)
  • Week 5: Malware Analysis
    3Lessons ·
    • Definition of malwares and its types
    • Practical view of the keylogger kind of malwares
    • Spotting malware presence on devices
  • Week 6: Basic Networking
    3Lessons ·
    • IP Address (practical)
    • Mac Address (practical)
    • Network topology and Network Sniffing using Bettercap (practical) and Steganography (practical)
  • Week 7: Social Engineering
    4Lessons ·
    • Introduction to Social Engineering
    • Types and forms of social engineering(practical )
    • How to identify social engineering
    • Why social engineering works
  • Week 8: Reconnaissance and Foot-Printing Phase
    4Lessons ·
    • Introduction to Reconnaissance/Foot--printing and Types
    • Google Dorks (practical)
    • Dumpster Diving and use of tools(Practical)
    • Giving a target to footprint (Presentation)
  • Week 9: Vulnerability Research and Scanning Phase
    4Lessons ·
    • Nmap (practical)
    • Nikto (practical)
    • Owasp zap (practical)
    • Gobuster(Practical)
  • Week 10: Exploiting and Gaining Access Phase
    4Lessons ·
    • MySQL injection (practical)
    • Man-in-the-middle-attack (practical)
    • Social Engineering Toolkit (practical)
    • Wireshark(http and Sniffing) (practical)