The Mohansh Technology Cyber Security Course in Hyderabad equips students with the most effective techniques for infrastructure and business protection.
In today’s digital landscape, cybersecurity is paramount. Our Ethical Hacking course is meticulously designed to equip you with the skills to identify and rectify security vulnerabilities in systems, networks, and applications. By adopting the mindset of a hacker, you’ll learn to think proactively and defend effectively.
Day 1: Introduction to Ethical Hacking, Rules of Engagement, Legal & Ethic
Day 2: Linux Fundamentals for Hackers
Day 3: Windows Fundamentals & PowerShell Overview
Day 4: Networking Basics (TCP/IP, Ports, Protocols)
Day 5: OSI Model & Common Network Protocols
Day 6: Virtual Labs, VM Setup & Environment Design (Overview)
Day 7: Report Writing & Findings Format (Introduction)
Day 8: Passive Reconnaissance & OSINT Techniques
Day 9: Active Reconnaissance and Scanning Concepts
Day 10: Subdomain Enumeration & DNS Fundamentals
Day 11: Web Footprinting: Sitemaps, Robots, Archives
Day 12: Port/Service Enumeration and Service Fingerprinting
Day 13: Vulnerability Scanning Theory (Nikto, OpenVAS, Nessus concepts)
Day 14: Turning Reconnaissance into an Attack Plan (Methodology)
Day 15: HTTP fundamentals — cookies, sessions, authentication
Day 16: SQL injection — concepts and types
Day 17: Cross-site scripting (XSS) — reflected, stored, DOM
Day 18: Cross-site request forgery (CSRF) & clickjacking — overview
Day 19: Broken authentication and session management issues
Day 20: Insecure Direct Object References (IDOR) & access control failures
Day 21: Web application assessment methodology — scoping & reporting
Day 22: Advanced SQL Injection (blind, time-based) & WAF considerations
Day 23: Server-Side Request Forgery (SSRF) concepts
Day 24: API security fundamentals (REST, GraphQL) and common flaws
Day 25: XML External Entities (XXE) & deserialization issues
Day 26: File upload & path traversal vulnerabilities
Day 27: Web shells & Remote Code Execution (RCE) theory
Day 28: Retesting and remediation validation approaches
Day 29: Exploit basics and Metasploit architecture (overview)
Day 30: Privilege escalation techniques — Windows & Linux (theory)
Day 31: Password attacks, hashing, and cracking concepts
Day 32: Lateral movement techniques and post‑exploitation overview
Day 33: Persistence mechanisms and their detection
Day 34: Network pivoting & tunneling concepts
Day 35: Logging, monitoring & indicators of compromise (defensive view)
Day 36: Wireless Security Basics (WEP/WPA/WPA2/WPA3 Concepts)
Day 37: Wi-Fi Attack Vectors & Capture Concepts (Theory)
Day 38: Mobile Application Security Fundamentals (Android/iOS)
Day 39: Mobile Backend/API Security Considerations
Day 40: Cloud Security Fundamentals (IAM, Storage, Compute Risks)
Day 41: Container & Docker Security Concepts
Day 42: Secure Coding Principles and Vulnerability Mitigation
Â
Day 43 — Red team tactics & adversary emulation (MITRE ATT&CK mapping)Â
Day 44 — Social engineering & phishing awareness (theory & planning)Â
Day 45 — Capstone overview: end‑to‑end penetration test methodology & reporting
Come and discuss your objectives with us.