whatsapp icon

Course Highlights

Six months certification course in cybersecurity

A comprehensive and focused educational course designed to equip students with the knowledge and practical skills necessary to protect computer systems, networks, and digital assets from cyber threats and attacks. This program aims to provide a solid foundation in cybersecurity principles and practices while emphasizing hands-on learning and real-world applications.

Book Your Free Cybersecurity Demo Class in Rohtak

Phone
Already have an account? Sign In

Course Syllabus

Microsoft Windows Essential

Introduction to Windows

How Binary Works

User and Permissions

Disk Management

Intro. to Task Management

Event Viewer

Network Sharing

Window Registry

Policy Editor

Batch Scripting

Creating Virus for Fun

BIOS

Virtualizations

Networking Essentials

Computer Networking

What is Networking & Its Importance in Connecting Computers?

How Internet Works?

Computer Network and Types of Network

Network Topologies

Network Components and Devices

OSI and TCP/IP Model

IP and MAC Address

IPv4 and IPv6 Packet Structure

Linux Essentials

Basics of Addressing and Subnetting

Web Server

Network Protocols + Ports

Network Services

Computer Hardware and Essentials

History and Feature of Linux

Architecture of Linux OS & Linux File System

Software Package Management

Linux Tools and Arguments

User and File Permissions

Special Permission

Network Config, Logs and Text Processor Commands

File Transfer and Archiving

BASH Scripting

Types of Peripheral Devices

PC Expansion Cards

Identify Common PC Ports & Connectors Types and Associated

Storage Devices

Mother Board Components and Its Properties

Mastery in Operating System: Linux & Windows

LINUX

Linux System Monitoring

Analyzing and Storing Logs

Service and Process Management

Configuring and Securing Services

Introduction to Linux Server

IP Table & IP Rules

Environment Variable

Bash Scripting

WINDOWS

Shell & Kernel

Bypass Windows Password

Introduction to Programming Languages & Logics

Powershell Scripting

In-Depth Advanced Networking

Internet, Intranet & Networking

Demilitarized (DMZ)

Protocol & Servers

DNS Security Extension & DHCP

Telnet & SSH

Firewall (IDS, IPS & IDPS)

VPN & Tunneling

Network Ports

Port Security

Proxy Server & Proxy Chaining

Classes of Routing Protocols

Access Control List (ACL)

VLan Trunking Protocol

Networking Address Translation (NAT & PAT)

Spanning Tree Protocol

Concept of Real-World Networks

Addressing & Subnetting

Introduction to Cisco Packet Tracer

Concept of Real World Network

Configure Your Own LAN & WAN

Ethical Hacking

Cyber Laws & Legal Complexities

Hacking Lab Setup for Exploitation

Foot printing and Reconnaissance

OSINT (Open Source Intelligence)

Internal & External Network Scanning

Enumeration of System & Web App

Security Flaws Analysis - Vulnerability Assessment with Metasploit, Exploit DB and More

Malware Threats & Analysis

Password & Data Sniffing

Social Engineering Techniques

DOS - Denial of Service & DDOS Attacks

Prevention from IDS, IPS, Firewall

Hacking Web Server

HoneyPot

SQL Injection Attacks - Database Exploitation

Attacking Wireless Networks

Cloud Computing & Security

Cryptography - Art of Encryption & Decryption

Worm GPT & AI Tools in Ethical Hacking

Anonymity Unleashed: The Art of Staying Incognito

Google Dorking

Password Cracking

End Point Security

Practical Networking Penetration

Penetration Testing: Introduction

Reconnaissance: Advanced Information Gathering

Vulnerability Analysis: Identifying the Weakness and Logical Flaws

Exploitation: Network and Other Services or Applications Exploitation

Exploitation: Gaining the Initial Access

Exploitation: Generating Malicious Payloads for Exploitation

Exploitation: Automated and Manual Exploitation of System Vulnerabilities

Mitigate the Identified Vulnerabilities and Re-testing

Exploitation: Windows Privilege Escalation - Owning the Windows Server

Exploitation: Linux Privilege Escalation - Owning the Linux Server

Post Exploitation: Compromising the Network

Post Exploitation: Pivoting and Tunneling - Access the Hidden Corners of Network Securely

Post Exploitation: Controlling the Compromised Devices using C2 Server

Reporting and Remediation

Antivirus Evasion: Bypass the Security to Deliver Payloads

Active Directory: Exploiting the Infrastructure

Penetration Testing Standards (PTES)

NIST Cyber Security Framework

Payment Card Industry Data Security Standard (PCIDSS)

Mitre & ATTCK Framework

Choose Your Preferred Learning Mode

1-To-1 Training

1-To-1 Training

Cyber threats on the rise? Get a personalized training plan (free consultation).

Online Training

Online Training

Become a Cyber Hero: Train Online, Secure Your Future!

Offline Training

Offline Training

Unplug & Focus: Master Cybersecurity Skills in an Immersive Learning Environment.

Course Features

Advanced Techniques

Diverse Course Categories

Cybersecurity Threats Evolving? We Have the Courses to Stay Ahead!

Networking Skills

Self-Paced Learning

Become a Self-Made Security Pro: Start Your Cybersecurity Journey Today!

Ethical Hacking

Certified Instructors

Get Certified, Get Ahead: Train with Cybersecurity Experts!

Hundred Percent Job Assurance  Program

Hundred Percent Job Assurance Program

 Internship Opportunities with Enforcement Agencies

Internship Opportunities with Enforcement Agencies

Career support via a dedicated Placement cell alumni network etc.

Career support via a dedicated Placement cell alumni network etc.

Practical work Experience through real - world hacking

Practical work Experience through real - world hacking

A vibrant Hybrid Learning platform for you

M Cyber Academy is your gateway to a thrilling career in cybersecurity. We offer an engaging and dynamic e-learning platform packed with Interactive courses, Real-world scenarios, Expert instructors, Vibrant community.

Affiliated With

partner1
partner2
partner3
partner4

What Student's Say

student image

Himanshu

6 Months course in digital forensics

Overall I had a great learning session while pursuing the diploma course from M Cyber Academy as I hands on training provided on well-equipped digital forensics tools and workstations

Our
Hired Students

Akshay
Akshay

Victoria Secrete Pvt Ltd – 27 LPA

Ujjawal Kasturi
Ujjawal Kasturi

Tempe AZ Private Ltd – 18 LPA

Deepak Kumar
Deepak Kumar

Seamless Infoech – 6.9 LPA

Harkesh
Harkesh

Intern at Telangana Cybercell

Rishabh
Rishabh

3rd Eye Private Limited – 5.5 LPA

Manish
Manish

Intern at Infotech Solutions – 15k/month

Anjali
Anjali

Higher Education in Cybersecurity – Canada

Sachin
Sachin

Shahi Pvt Ltd – 13 LPA

Amit
Amit

Onremote Technologies Pvt Ltd – 5.9 LPA

Rudra Chauhan
Rudra Chauhan

Flabs Private Limited – 9 LPA

Pawan
Pawan

Seamless Infoech – 6.2 LPA

Komal
Komal

ACE IT Solution – 7.2 LPA

Piyush
Piyush

Web Mok Private Limited – 4 LPA

FAQ