Explore our cybersecurity training plan tailored for organizations
Level 1 (First Week)
Module 1: Network Defense Fundamental
Module 2: Understanding Cyber Threats
Module 3: Cybersecurity Policies and Procedures
Level 2 (Second Week)
Module 4: Safe Computing Practices
Module 5: Top 20 Vulnerabilities and Mitigations
Module 6: Email Security
Level 3 (Third Week)
Module 7: Mobile and Remote Work Security
Module 8: Incident Response and Management
Module 9: Password Management
Level 4 (Fourth Week)
Module 10: Network Scanning
Module 11: Brute force Attack
Module 12: Social Engineering Attacks
Level 5 (Fifth Week)
Module13: Database Security
Module14: Cloud Security
Module15: Data Protection
Level 6 (Sixth Week)
Module16: SQL Injection attack
Module 17: Sniffing and Spoofing
Module 18: Denial of Service
Explore Ethical Hacking training plan for Individuals interested ethical hacking Career
Level 1 (First Week)
Module 1: Network Defense Fundamental
Module 2: Basic Networking
Module 3: Fundamentals of Ethical Hacking
Level 2 (Second Week)
Module 5: Pentest Lab setup
Module 6: Top 20 Vulnerabilities and Mitigations
Module 6: Reconnaissance
Level 3 (Third Week)
Module 7: Network Scanning
Module 8: Enumeration
Module 9: Post Exploitation
Level 4 (Fourth Week)
Module 10: Web Hacking
Module 11: Brute force Attack
Module 12: Social Engineering Attacks
Module13: Mobile/System Hacking
Level 5 (Fifth Week)
Module14: SQL Injection attack
Module 15: Sniffing and Spoofing
Module 16: Denial of Service
Level 6 (Third Month)
Module17: Database Security
Module18: Cloud SecurityModule19: Data Protection