whatsapp icon

Course Highlights

One Year Diploma Program In Cybersecurity

After extensive research, we found that there are a lot of courses and data on cybersecurity, but no platform exists that lets you start from scratch and move forward. We designed the best cybersecurity and ethical hacking course in India which covers almost all cybersecurity certifications of the world like CompTIA A+, CompTIA Security +, CEH CHFI CPENT CCNA CISSP RHSCA OSCP, etc. We assure your success after completing this course.

Book Your Free Cybersecurity Demo Class in Rohtak

Phone
Already have an account? Sign In

Course Syllabus

Foundation for Cyber Security

Microsoft Windows Essential

Networking Essentials

Linux Essentials

Computer Hardware and Essentials

Mastery in Operating System: Linux & Windows

Linux

Linux System Monitoring

Analyzing and Storing Logs

Service and Process Management

Configuring and Securing Services

Introduction to Linux Server

IP Table & IP Rules

Environment Variable

Bash Scripting

Windows

Shell & Kernel

Bypass Windows Password

Introduction to Programming Languages & Logics

PowerShell Scripting

In-Depth Advanced Networking

Internet, Intranet & Networking

Demilitarized (DMZ)

Protocol & Servers

DNS Security Extension & DHCP

Telnet & SSH

Firewall (IDS, IPS & IDPS)

VPN & Tunnelling

Network Ports

Port Security

Proxy Server & Proxy Chaining

Classes of Routing Protocols

Access Control List (ACL)

VLAN Trunking Protocol

Networking Address Translation (NAT & PAT)

Spanning Tree Protocol

Concept of Real-World Networks

Addressing & Subnetting

Introduction to Cisco Packet Tracer

Concept of Real World Network

Configure Your Own LAN & WAN

Full Stack Web Understanding

HTML Essential

CSS Essential

Java Script

SQL

PHP

Ethical Hacking

Cyber Laws & Legal Complexities

Hacking Lab Setup for Exploitation

Foot Printing and Reconnaissance

OSINT (Open Source Intelligence)

Internal & External Network Scanning

Enumeration of System & Web App

Security Flaws Analysis – Vulnerability Assessment with Metasploit

Malware Threats & Analysis

Password & Data Sniffing

Social Engineering Techniques

DOS – Denial of Service & DDOS Attacks

Prevention from IDS, IPS, Firewall

Hacking Web Server

Honeypot

SQL Injection Attacks – Database Exploitation

Attacking Wireless Networks

Cloud Computing & Security

Cryptography – Art of Encryption & Decryption

Worm GPT & AI Tools in Ethical Hacking

Anonymity Unleashed: The Art of Staying Incognito

Google Dorking

Password Cracking

End Point Security

Python Essentials

Introduction, History & Importance of Python

Installation and Setup

Data Types in Python

Input and Output in Python

Python Type Casting

Data Types and Methods

Conditions in Python

Loops in Python

Creating Functions

File Handling in Python

Error Handling in Python

Classes and Objects

Python Package Manager

Creating and Importing Modules

Working with Python Modules to Create Your Own Applications

Black Hat Python

Introduction to Black Hat Python

Discover Host in Your Network (Responder Tool)

Build Your Own MAC Address Change Tool

Create Your OWN NETCAT Tool

Make Your Own Key logger with Python

Create Your Own ARP Spoofer with Python

Injecting Malicious CODE in Packets

Create Your Own SSH Tunnelling

Capture & Decode ICMP Packets

Decoding ICMP (Internet Control Message Protocol) Packets

Computer Hacking Forensic Investigator CHFI

Importance of Digital Forensics

Cyber Crime Investigation Laws

Computer Forensics Investigation Process

Computer File System & Data Acquisition

Defeating Anti-Forensics Techniques

Steganography Investigation

Windows Forensics

Linux & Mac Forensics

Networking Forensics

Web Attacks Investigation

Dark Web Forensics

Security Operation Center (SOC)

Cloud Forensics

Social Media Investigation

Email Investigation

OSINT

GEO OSINT

Investigation with Artificial Intelligence

Computer Malware Forensics

Android Malware Forensics

Drone Forensics

CCTV Camera Forensics

Advanced Penetration Testing

Penetration Testing: Introduction

Reconnaissance: Advanced Information Gathering

Vulnerability Analysis: Identifying the weakness and logical flaws

Exploitation: Network and other Services or Applications Exploitation

Exploitation: Gaining the Initial Access

Exploitation: Generating Malicious Payloads for Exploitation

Exploitation: Automated and manual Exploitation of System Vulnerabilities Mitigate the identified vulnerabilities and Re-testing

Exploitation: Windows Privilege Escalation: Owning the Windows server

Exploitation: Linux Privilege Escalation: Owning the Linux server

Post Exploitation: Compromising the Network

Post Exploitation: Pivoting and Tunnelling: Access the Hidden Corners of Network Securely

Post Exploitation: Controlling the Compromised devices using C2 server

Reporting and Remediation

Antivirus Evasion: Bypass the Security to deliver Payloads

Active Directory: Exploiting the Infrastructure

Penetration Testing Standards (PTES)

NIST Cyber Security Framework

Payment Card Industry Data Security Standard (PCIDSS)

Mitre & ATTCK Framework

Web Application Penetration Testing

WAPT: The Introduction & Importance

WAPT Basics: Client-Server arch,

Status codes, Parameters, Interception

WAPT Basics: Domain, Subdomain and URLs

Advanced Web Recon for Attack

Sub-directory and Sub-domain Fuzzing

Burp-Suite Mastery: Packets

Interception, modification and

OWASP TOP 10: Exploiting the most common attacks

Web basic vulns: Command Injection vuln

Web basic vulns: File Upload vuln

Web basic vulns: Directory Traversal vuln

Web basic vulns: Authentication vuln

Web basic vulns: Information disclosure vuln

Web basic vulns: Business Logic vuln

Web basic vulns: IDOR (Insecure Direct Object Reference)

Master SQL Injection attack

Master XSS attack

Web Intermediate vulns: Clickjacking

Web Intermediate vulns: SSTI (Server Side Template Injection)

Web Intermediate vulns: Admin Access Takeover

Web Intermediate vulns: CSRF (Cross site Request Forgery)

Web Intermediate vulns: XXE Injection

Web Intermediate vulns: Web Cache Deception

Web Intermediate vulns: CORS (Cross Origin Resource Sharing)

Web Intermediate vulns: JWT attacks

Web Intermediate vulns: HTTP Insecure Host Header vuln

Web Advanced vulns: Race Conditions

Web Advanced vulns: Oauth vuln

Web advanced vulns: LLM Exploitation

Web Advanced vulns: GraphQL

Web Advanced vulns: API Testing

Web Advanced vulns: Insecure Deserialization

Web Advanced vulns: Prototype Pollution

Web Advanced vulns: Insecure Web Socket Communication vuln

Practice: Get Hands-on with Insecure Labs

Action: Bypass Web Firewall

Action: Let’s Hack the Websites Ethically

Reporting: Yeah! We Hacked it, Can secure as well

Bonus: Open-source Tools for Automatic Exploitation

IoT (Internet of Things): Project-based Learning

Introduction to the IOT world

Introduction to Arduino

Host Fake AP with ESP8266 to Steal Creds

Wi-Fi Jammer, decoy and MITM attack with ESP8266

Host Fake Internet-enabled Wi-Fi to steal sensitive info

Wi-Fi Pentesting with ESP32

Automatic Wi-Fi Hacking with AI enabled IOT: PwnaGotchi

Hacking Linux, Mac, Windows in seconds with Raspberry pie-Pico

Hacking, Injecting & controlling devices remotely Raspberry pie-Pico W

Hack Android and IOS with Digispark

Making your tiny Portable Hacking machine with Raspberry pie

Host your Cloud servers with Raspberry pie

Bluetooth Jamming with Advanced IOT device

5 GHZ WI-Fi signal Jamming with RTL8720DN

Aircraft Tracking: Listening the Signals

Card Cloning and RFID Cloning

Flipper Zero attacks with IOT

Personality Development Program for Soft Skills

Master Classes to build your CV with a deep understanding of your skillset

Masterclasses to develop personal branding on networking platforms like LinkedIn and GitHub

Master classes to enhance communication skills

Corporate culture to build impressive body language

Masterclasses for interview preparation

Mock interviews sessions to build confidence

Hackers Meetup Events for student network building

Choose Your Preferred Learning Mode

1-To-1 Training

1-To-1 Training

Cyber threats on the rise? Get a personalized training plan (free consultation).

Online Training

Online Training

Become a Cyber Hero: Train Online, Secure Your Future!

Offline Training

Offline Training

Unplug & Focus: Master Cybersecurity Skills in an Immersive Learning Environment.

Course Features

Advanced Techniques

Advanced Techniques

Master the Latest Techniques in Cybersecurity.

Networking Skills

Networking Skills

Enhance Your Networking Skills for Better Security.

Ethical Hacking

Ethical Hacking

Learn Ethical Hacking to Protect and Defend.

Hundred Percent Job Assurance Program

Hundred Percent Job Assurance Program

 Internship Opportunities with Enforcement Agencies

Internship Opportunities with Enforcement Agencies

Career support via a dedicated Placement cell alumni network etc.

Career support via a dedicated Placement cell alumni network etc.

Practical work Experience through real - world hacking

Practical work Experience through real - world hacking

A vibrant Hybrid Learning platform for you

M Cyber Academy is your gateway to a thrilling career in cybersecurity. We offer an engaging and dynamic hybrid-learning platform packed with Interactive courses, Real-world scenarios, Expert instructors and Vibrant community.

Affiliated With

partner1
partner2
partner3
partner4

What Student's Say

student image

Himanshu

6 Months course in digital forensics

Overall I had a great learning session while pursuing the diploma course from M Cyber Academy as I hands on training provided on well-equipped digital forensics tools and workstations

Our
Hired Students

Akshay
Akshay

Victoria Secrete Pvt Ltd – 27 LPA

Ujjawal Kasturi
Ujjawal Kasturi

Tempe AZ Private Ltd – 18 LPA

Deepak Kumar
Deepak Kumar

Seamless Infoech – 6.9 LPA

Harkesh
Harkesh

Intern at Telangana Cybercell

Rishabh
Rishabh

3rd Eye Private Limited – 5.5 LPA

Manish
Manish

Intern at Infotech Solutions – 15k/month

Anjali
Anjali

Higher Education in Cybersecurity – Canada

Sachin
Sachin

Shahi Pvt Ltd – 13 LPA

Amit
Amit

Onremote Technologies Pvt Ltd – 5.9 LPA

Rudra Chauhan
Rudra Chauhan

Flabs Private Limited – 9 LPA

Pawan
Pawan

Seamless Infoech – 6.2 LPA

Komal
Komal

ACE IT Solution – 7.2 LPA

Piyush
Piyush

Web Mok Private Limited – 4 LPA

FAQ