Bug Bounty Course in Ahmedabad
Be the Ultimate Master of Bug Bounty Course.
Cyber Security Curriculum
Introduction to Cyber Security
- Definition of Cyber Security
- History & evolution of cyber threats
- Importance in personal, corporate, and national security
- Role of cybersecurity in business continuity
- Career scope & job roles (SOC Analyst, Penetration Tester, CISO, etc.)
Fundamentals
- CIA Triad (Confidentiality, Integrity, Availability)
- Security Terminologies
- Types of Hackers
- Security Architecture
- Lab setup (Kali Linux, Burp Suite, Browser)
Networking Basics
- IP, DNS, TCP/IP, HTTP, HTTPS
- Deep Dive: OSI Model, Ports, Protocols
- IP Addressing & Subnetting
- Firewalls, Switch, HUBs & VPNs
Web Security
- OWASP Top 10 Vulnerabilities (WEB, MOBILE, API)
- SQL Injection, XSS, CSRF
- Secure Coding Practices
- Authentication & Session Management
- Business Logic Flaws
Threats & Attacks
- Malware (Virus, Worms, Trojans, Ransomware)
- Social Engineering & Phishing
- Denial of Service (DoS/DDoS)
- Injection Attacks (SQL Injection, Command Injection, etc.)
- Man-in-the-Middle (MITM) Attacks
Security Tools
- Wireshark
- Nmap
- Nuclei
- Burp Suite
- Metasploit
- All Tools from Kali Linux
Compliance & Legal Aspects
- GDPR, HIPAA
- PCI DSS, ISO, COBIT
- Policy Making and Implementation
- IT Act, Cyber Laws & Regulations
Ethical Hacking
- Information Gathering
- Penetration Testing Process
- Vulnerability Assessment
- Reporting & Documentation
Cloud Security
- Securing Cloud Infrastructure
- Identity & Access Management (IAM)
- Data Protection in Cloud