1. Programme Overview
The Cyber Security skill course is a comprehensive 3-month programme designed to provide foundational and practical knowledge in ethical hacking and information security. The course consists of 20 instructor-led modules, covering key aspects of cybersecurity from basic concepts to advanced attack and defence techniques.
The programme begins with fundamental concepts such as the CIA triad, networking basics, Linux commands, and lab setup for ethical hacking. It then progresses through critical stages of cybersecurity including foot printing, reconnaissance, network scanning, and enumeration techniques used to identify vulnerabilities. Learners will gain hands-on experience in vulnerability analysis using industry standards like CVE, CVSS, and tools such as NESSUS.
The course also covers system hacking, malware threats, sniffing, social engineering, and denial-of-service attacks, providing real-world exposure to cyber threats. Advanced modules focus on web server and web application security, SQL injection, session hijacking, and mobile, IoT, and cloud security. The course also introduces cryptography concepts and Wi-Fi security techniques. By the end of the programme, learners will be equipped with practical skills to identify, analyse, and mitigate security risks in modern computing environments.
2. Programme at a Glance
3. Programme Objectives
4. Syllabus
The programme comprises 20 instructor-led training modules covering the full spectrum of ethical hacking and information security:
Ethical Hacking & Cyber Security
Mod 1: Intro to Ethical Hacking
- Basic concepts & theory, CIA triad
- Lab setup & Linux essential commands
- Networking concepts, Proxy, TOR
Mod 2: Foot Printing & Reconnaissance
- Enumeration & TTL
- Google Dorking, Grabify, Whois
- theHarvester, Wappalyzer, exiftool
Mod 3: Scanning Network
- OSI model & TCP/IP model
- Network Scanning & 3-way handshake
- Port scanning & Nmap, DMZ & NAT
Mod 4: Enumeration
- FTP Enumeration
- Wordlist tools & Brute force tools
- SMB & DNS enumeration
Mod 5: Vulnerability Analysis
- CVE, CWE, CVSS
- NIST & MITRE frameworks
- NESSUS vulnerability scanner
Mod 6: System Hacking
- Metasploit framework
- SMB, Server & client-side hacking
- Post exploitation & Persistence
Mod 7: Malware Threats
- VirusTotal, encoding, Honeypot
- TCPview, Revshells & Hashes
- Malware analysis
Mod 8 & 9: Sniffing & Social Engineering
- Wireshark & filters
- MITM attack, http.cat
- SEToolkit, quiz tech, SE methodology
Mod 10-12: DoS, Firewalls, Web Servers
- Volumetric, DoS & DDoS attacks
- Iptables, Snort IDS
- Enumerate web servers, Curl, WAF
Mod 13-15: Web Apps, SQLi, Sessions
- XSS Reflected/Stored, LFI/RFI
- SQL Injection workflow & Sqlmap
- Session hijacking, steal cookies
Mod 16-18: Mobile, IoT, Crypto
- Mobile emulator, Evil-Droid
- Shodan.io, IoT/OT Hacking
- Encryption, Encoding, Hashing, SSL
Mod 19-20: Cloud & Wi-Fi Hacking
- Cloud attacks & enumeration
- Wi-Fi adapters, airodump-ng
- Attacking WPA/WPA2, WPS exploit
5. Mode of Assessment & Certification
Examination: Internal Assessment 1 (15 Marks), Internal Assessment 2 (15 Marks), External Assessment - 3 Hours (70 Marks).
External breakdown (70 Marks): CTF (Capture the Flag) Test (50 Marks), Documentation (10 Marks), Viva-Voce (10 Marks).
What is a CTF Test? You will get multiple flags hidden in different places. Your job is to find and submit those flags. More difficult flags earn more marks.
Certification: A University Certificate will be awarded upon successful completion of the online external assessment. The certificate is issued by Dr. B.R. Ambedkar Open University, Hyderabad.
6. Job & Career Prospects
Completing this course opens entry-level and intermediate opportunities in the cybersecurity domain:
- Cyber Security Analyst (Entry Level) — Monitoring and analysing security threats and vulnerabilities.
- Ethical Hacker (Beginner Level) — Performing penetration testing and security assessments.
- Network Security Engineer (Trainee) — Supporting network protection and security operations.
- Security Operations Center (SOC) Analyst — Detecting and responding to cyber incidents.
- Information Security Assistant — Assisting in implementing and maintaining security policies.
7. Further Opportunities